2023
|
Invention
|
Cyber security appliance for an operational technology network.
A cyber security appliance has o... |
|
Invention
|
Method for sharing cybersecurity threat analysis and defensive measures amongst a community.
A c... |
|
Invention
|
Automated sandbox generator for a cyber-attack exercise on a mimic network in a cloud environment... |
|
Invention
|
An interactive cyber security user interface. An interactive cyber security user interface is pro... |
|
Invention
|
A cyber security restoration engine. A cyber security restoration engine prioritizes nodes in a g... |
|
Invention
|
Interactive cyber security user interface.
An interactive cyber security user interface is provi... |
|
Invention
|
Cyber security restoration engine.
A cyber security restoration engine prioritizes nodes in a gr... |
|
Invention
|
Malicious site detection for a cyber threat response system.
The cyber security appliance can ha... |
|
Invention
|
Intelligent adversary simulator.
An intelligent-adversary simulator can construct a graph of a v... |
|
Invention
|
Autonomous report composer.
An autonomous report composer composes a type of report on cyber thr... |
|
Invention
|
Incorporating software-as-a-service data into a cyber threat defense system.
A cyber threat defe... |
|
Invention
|
Endpoint agents and scalable cloud architecture for low latency classification.
A classifier det... |
|
Invention
|
Unifying of the network device entity and the user entity for better cyber security modeling alon... |
|
Invention
|
Analyses and aggregation of domain behavior for email threat detection by a cyber security system... |
|
Invention
|
Endpoint agents and scalable cloud architecture for low latency classification. A classifier dete... |
|
Invention
|
A unifying of the network device entity and the user entity for better cyber security modeling al... |
|
Invention
|
Automated vulnerability and threat landscape analysis.
An open-source intelligence (OSINT) monit... |
|
Invention
|
System to detect malicious emails and email campaigns.
The email campaign detector checks whethe... |
2022
|
Invention
|
Cyber security restoration engine.
A cyber security restoration engine takes one or more autonom... |
|
Invention
|
Interactive artificial intelligence-based response loop to a cyberattack.
An intelligent orchest... |
|
Invention
|
Artificial intelligence based cybersecurity system monitoring telecommunications networks.
The c... |
|
Invention
|
Helper agent and system.
Aspects of the invention relate to a cyber security system that may ena... |
|
Invention
|
Capturing importance in a network using graph theory.
A cyber security system includes an import... |
|
Invention
|
Educational tool for business and enterprise risk management.
An automated training apparatus ca... |
|
Invention
|
Endpoint agent and system.
The endpoint agent detects a cyber threat on an end-point computing d... |
|
Invention
|
Cyber threat defense system protecting email networks with machine learning models using a range ... |
|
Invention
|
Cyber security using one or more models trained on a normal behavior.
Disclosed herein is a meth... |
|
Invention
|
Method, apparatus, and system to map network reachability. The network reachability module maps a... |
|
Invention
|
Intelligent prioritization of assessment and remediation of common vulnerabilities and exposures ... |
|
Invention
|
Cyber security system utilizing interactions between detected and hypothesize cyber-incidents. An... |
|
Invention
|
Cyber security sandbox environment.
A virtual computing environment cloning method is used to al... |
|
Invention
|
Method for cyber threat risk analysis and mitigation in development environments.
A method for a... |
|
Invention
|
Method for determining likely malicious behavior based on abnormal behavior pattern comparison.
... |
|
Invention
|
A method and system for determining and acting on an email cyber threat campaign.
A cyber securi... |
|
Invention
|
Cyber security system utilizing interactions between detected and hypothesize cyber-incidents.
A... |
|
Invention
|
Artificial intelligence cyber security analyst.
An analyzer module forms a hypothesis on what ar... |
|
Invention
|
Secure communication platform for a cybersecurity system. An expert interface component can autom... |
|
Invention
|
An ai cybersecurity system monitoring wireless data transmissions. A coordinator module, a cyber ... |
|
Invention
|
Ai cybersecurity system monitoring wireless data transmissions.
A coordinator module, a cyber th... |
|
Invention
|
User agent inference and active endpoint fingerprinting for encrypted connections.
A cyber secur... |
|
Invention
|
Artificial intelligence based analyst as an evaluator.
Methods, systems, and apparatus are discl... |
2021
|
P/S
|
Computer software; computer hardware; computer programs; data banks; computer systems for monitor... |
|
P/S
|
Computer hardware; downloadable computer software and computer hardware for monitoring computer n... |
|
P/S
|
Computer software; computer hardware; computer programs;
data banks; computer systems for monito... |
|
Invention
|
Endpoint client sensors for extending network visibility. Endpoint agent cSensors can be used to ... |
|
Invention
|
Cyber security for instant messaging across platforms.
A cyber threat defense system can incorpo... |
|
Invention
|
Endpoint agent client sensors (csensors) and associated infrastructures for extending network vis... |
|
Invention
|
Software as a service (saas) user interface (ui) for displaying user activities in an artificial ... |
|
Invention
|
Cyber security system applying network sequence prediction using transformers. A cyber threat def... |
|
Invention
|
Cyber security using one or more models trained on a normal behavior. Disclosed herein is a metho... |
2020
|
Invention
|
Anomaly alert system for cyber threat detection.
Disclosed herein is a method for use in detecti... |
|
Invention
|
Autonomous email report generator.
An autonomous email-report composer composes a type of report... |
2018
|
P/S
|
Computer hardware; data banks; computer hardware and recorded software systems for monitoring com... |
|
P/S
|
Computer hardware; computer hardware and recorded software systems for monitoring computer networ... |
|
P/S
|
Computer software; computer hardware; computer programs;
data banks (terms considered too vague ... |
|
P/S
|
Computer software; computer hardware; computer programs;
data banks (term considered too vague b... |
2016
|
P/S
|
Computer software and computer systems comprised of computer hardware and computer peripherals fo... |
2015
|
P/S
|
Computer software and computer systems for monitoring, measuring, tracking and reporting computer... |
2013
|
P/S
|
Computer software and computer systems for monitoring computer network behavioural patterns to de... |