| 12074901 |
Security action verification in a computing network |
Sourabh Satish, Oliver Friedrichs, Atif Mahadik |
2024-08-27 |
| 12047407 |
Managing security actions in a computing environment based on movement of a security threat |
Sourabh Satish, Oliver Friedrichs, Atif Mahadik |
2024-07-23 |
| 12045201 |
Automatically configuring connectors of an information technology and security operations application |
Sourabh Satish, Atif Mahadik |
2024-07-23 |
| 12039046 |
Generating suggested courses of actions for incidents based on previous incident handling |
Sourabh Satish, Trenton John Beals, Glenn Gallien |
2024-07-16 |
| 12028222 |
Obtaining simulated results for a course of action executed in an information technology environment |
Atif Mahadik, Ryan Connor Means, Sourabh Satish |
2024-07-02 |
| 11995571 |
Determination of decision step logic for incident response in an information technology environment |
Atif Mahadik, Sourabh Satish |
2024-05-28 |
| 11895143 |
Providing action recommendations based on action effectiveness across information technology environments |
Sourabh Satish, Oliver Friedrichs, Atif Mahadik |
2024-02-06 |
| 11870802 |
Identifying automated responses to security threats based on communication interactions content |
Sourabh Satish, Oliver Friedrichs, Atif Mahadik |
2024-01-09 |
| 11863583 |
Generating action recommendations for courses of action used for incident response |
Oliver Friedrichs, Atif Mahadik, Sourabh Satish |
2024-01-02 |