| 12130878 |
Deduplication of monitored communications data in a cloud environment |
Anil Nanduri, Prakash Jalan, Matti A. Vanninen, Ammar Ekbote, Alex Ramachandran Nirmala |
2024-10-29 |
| 12126695 |
Enhancing security of a cloud deployment based on learnings from other cloud deployments |
Ulfar Erlingsson |
2024-10-22 |
| 12126643 |
Leveraging generative artificial intelligence (‘AI’) for securing a monitored deployment |
Njall Skarphedinsson, Pamela Bhattacharya, Ulfar Erlingsson, Jay Parikh, Timothy Chase |
2024-10-22 |
| 12120140 |
Detecting threats against computing resources based on user behavior changes |
Harish Kumar Bharat Singh, Vikram Kapoor, Murat Bog |
2024-10-15 |
| 12095794 |
Universal cloud data ingestion for stream processing |
Gurunatha Karaje, Helgi K. Sigurbjarnarson, Jean-Philippe Martin, Ashwin Jayaprakash, Ulfar Erlingsson +2 more |
2024-09-17 |
| 12095879 |
Identifying encountered and unencountered conditions in software applications |
Ulfar Erlingsson |
2024-09-17 |
| 12095796 |
Instruction-level threat assessment |
Patrice Godefroid, Curtis Gerald Condra |
2024-09-17 |
| 12058160 |
Generating computer code for remediating detected events |
Ulfar Erlingsson, Jay Parikh |
2024-08-06 |
| 12032634 |
Graph reclustering based on different clustering criteria |
Harish Kumar Bharat Singh, Murat Bog, Vikram Kapoor |
2024-07-09 |
| 12034750 |
Tracking of user login sessions |
Murat Bog, Vikram Kapoor, Samuel Joseph Pullara, III, Harish Kumar Bharat Singh |
2024-07-09 |
| 12034754 |
Using static analysis for vulnerability detection |
Peter W. O'Hearn, Theodore M. Reed, Robert Schoening |
2024-07-09 |
| 12021888 |
Cloud infrastructure entitlement management by a data platform |
Theodore M. Reed, Bao Nguyen, Kenneth Beasley, Joshua Vertes, Adin Aoki +3 more |
2024-06-25 |
| 11991198 |
User-specific data-driven network security |
Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more |
2024-05-21 |
| 11979422 |
Elastic privileges in a secure access service edge |
Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more |
2024-05-07 |
| 11973784 |
Natural language interface for an anomaly detection framework |
Ulfar Erlingsson, Jay Parikh |
2024-04-30 |
| 11954130 |
Alerting based on pod communication-based logical graph |
Harish Kumar Bharat Singh, Murat Bog, Vikram Kapoor |
2024-04-09 |
| 11916947 |
Generating user-specific polygraphs for network activity |
Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more |
2024-02-27 |
| 11909752 |
Detecting deviations from typical user behavior |
Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more |
2024-02-20 |
| 11895135 |
Detecting anomalous behavior of a device |
Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more |
2024-02-06 |
| 11894984 |
Configuring cloud deployments based on learnings obtained by monitoring other cloud deployments |
Ulfar Erlingsson |
2024-02-06 |
| 11882141 |
Graph-based query composition for monitoring an environment |
Sanjay Kalra, Vikram Kapoor |
2024-01-23 |