2023
|
Invention
|
Cloud resource risk scenario assessment and remediation. An illustrative method for performing a ... |
|
Invention
|
Approval workflows for anomalous user behavior. Detecting anomalous behavior using a browser exte... |
|
Invention
|
Offline workflows in an edge-based data platform.
Methods, systems, and products for offline wor... |
|
Invention
|
Detecting threats against computing resources based on user behavior changes.
An illustrative me... |
|
Invention
|
Identifying an attack surface of a cloud deployment. Identifying an attack surface of a cloud dep... |
|
Invention
|
Identifying an attack surface of a cloud deployment.
Identifying an attack surface of a cloud de... |
|
Invention
|
Cloud resource risk scenario assessment and remediation.
An illustrative method for performing a... |
|
Invention
|
Graph-based query composition for monitoring an environment. In some embodiments, a data platform... |
|
Invention
|
Distinguishing user-initiated activity from application-initiated activity.
Distinguishing user-... |
|
Invention
|
Monitoring a cloud environment. An illustrative method for monitoring a cloud environment may inc... |
|
Invention
|
Guided anomaly detection framework. A guided anomaly detection framework, including: gathering da... |
2022
|
Invention
|
Data lake-enabled security platform. Providing a data lake-enabled security platform, including: ... |
|
P/S
|
Downloadable computer software for computer network security and for monitoring and identifying c... |
|
Invention
|
Agentless workload assessment by a data platform. An illustrative method for performing an agentl... |
|
Invention
|
Approval workflows for anomalous user behavior.
Detecting anomalous behavior using a browser ext... |
|
Invention
|
Using a logical graph to model activity in a network environment. A data platform receives data a... |
|
Invention
|
Monitoring a software development pipeline. Monitoring a software development pipeline, including... |
|
Invention
|
Detecting anomalous behavior of a device. Detecting anomalous behavior of a device, including: ge... |
|
Invention
|
Generating user-specific polygraphs for network activity. Generating user-specific polygraphs for... |
|
P/S
|
Downloadable computer software for computer network security
and for monitoring and identifying ... |
|
Invention
|
Detecting anomalous behavior using a browser extension.
Detecting anomalous behavior using a bro... |
|
Invention
|
Detecting deviations from typical user behavior. Detecting deviations from typical user behavior,... |
|
Invention
|
Using static analysis for vulnerability detection.
Using static analysis for vulnerability detec... |
|
Invention
|
Monitoring a software development pipeline.
Monitoring a software development pipeline, includin... |
|
Invention
|
Monitoring a cloud environment.
An illustrative method for monitoring a cloud environment may in... |
|
Invention
|
Annotating changes in software across computing environments.
Annotating changes in software acr... |
|
Invention
|
Ingesting event data into a data warehouse.
Ingesting event data into a data warehouse, includin... |
|
Invention
|
Detecting deviations from typical user behavior.
Detecting deviations from typical user behavior... |
|
Invention
|
Detecting anomalous behavior of a device.
Detecting anomalous behavior of a device, including: g... |
|
Invention
|
Establishing a location profile for a user device.
Establishing a location profile for a user de... |
|
Invention
|
Using real-time monitoring to inform static analysis. Using real-time monitoring to inform static... |
|
Invention
|
Facilitating developer efficiency and application quality. Improving developer efficiency and app... |
|
Invention
|
Learning from similar cloud deployments. Learning from similar cloud deployments, including: iden... |
|
Invention
|
Configuring cloud deployments based on learnings obtained by monitoring other cloud deployments. ... |
|
Invention
|
Using data transformations for monitoring a cloud compute environment. Example systems and method... |
|
Invention
|
Agentless workload assessment by a data platform.
An illustrative method for performing an agent... |
|
Invention
|
Dynamically generating monitoring tools for software applications. Dynamically generating monitor... |
2021
|
Invention
|
Monitoring communications in a containerized environment. A frame is received at an agent. The fr... |
|
Invention
|
Alerting based on pod communication-based logical graph. A logical graph is generated using at le... |
|
P/S
|
Business consultation; business data analysis; data processing services; database management; com... |
|
Invention
|
Graph-based query composition. In some embodiments, a request to filter information associated wi... |
|
Invention
|
Using graph-based models to identify anomalies in a network environment. Activities within a netw... |
|
Invention
|
User session-based generation of logical graphs and detection of anomalies. Log data associated w... |
|
Invention
|
Using network connections to monitor a data center. An agent executes in user space on a machine ... |
2020
|
Invention
|
Using a logical graph of a containerized network environment. Log data associated with an environ... |
|
Invention
|
Extensible query interface for dynamic data compositions and filter applications. A request to fi... |
2019
|
Invention
|
Hierarchical graph analysis. A logical graph is generated using at least a portion of log data re... |
|
Invention
|
Agent networking in a containerized environment. A frame is received at an agent. The frame is an... |
|
Invention
|
Pod communication graph. A logical graph is generated using at least a portion of log data receiv... |
|
Invention
|
Using graph-based models to identify datacenter anomalies. Activities within a network environmen... |
|
Invention
|
Extended user session tracking. First information associated with a first user login activity is ... |
2017
|
P/S
|
Software development consulting in the field of network security; Software development consulting... |
|
P/S
|
Software development consulting in the field of network
security; software development consultin... |
2016
|
P/S
|
Software as a service (SAAS) services featuring software for use in computer network security and... |