Issued Patents 2024
Showing 1–21 of 21 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12153948 | Distributed zero trust network access | Biju Ramachandra Kaimal, Venkata Suresh Reddy Obulareddy, Mayur Premi, Robert W. Cook, Ramesh Kamath +2 more | 2024-11-26 |
| 12153674 | Tracking malware root causes with an event graph | Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Russell Humphries | 2024-11-26 |
| 12132745 | Composite threat score | Mangal Rakesh Vankadaru, Prakash Kumar Talreja, Timothy Rayment, Biju Nair | 2024-10-29 |
| 12132746 | Incremental enrichment of threat data | Mangal Rakesh Vankadaru, Prakash Kumar Talreja, Timothy Rayment, Biju Nair | 2024-10-29 |
| 12111927 | Use of an application controller to monitor and control software file and application environments | — | 2024-10-08 |
| 12101334 | Augmented threat detection using an attack matrix and data lake queries | Mangal Rakesh Vankadaru, Prakash Kumar Talreja, Timothy Rayment | 2024-09-24 |
| 12095778 | Streaming and filtering event objects into a data lake | Mangal Rakesh Vankadaru, Prakash Kumar Talreja, Timothy Rayment | 2024-09-17 |
| 12093383 | Tracking malware root causes with an event graph | Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Russell Humphries | 2024-09-17 |
| 12079757 | Endpoint with remotely programmable data recorder | Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Russell Humphries | 2024-09-03 |
| 12074904 | Using reputation to avoid false malware detections | — | 2024-08-27 |
| 12052272 | Forensic analysis of computing activity | Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Russell Humphries, Kenneth D. Ray | 2024-07-30 |
| 12050715 | Live discovery of enterprise threats based on security query activity | Karl Ackerman, Kenneth D. Ray | 2024-07-30 |
| 12041067 | Behavior detection and verification | Johan Petter Nordwall, Karl Ackerman, Thomas John Walsh, Christoph Georg Hoyer, Mirco Stratmann +1 more | 2024-07-16 |
| 12026276 | Data augmentation for threat investigation in an enterprise network | Kenneth D. Ray, Karl Ackerman | 2024-07-02 |
| 12021831 | Network security | Mark David Harris, Kenneth D. Ray | 2024-06-25 |
| 11995205 | Centralized event detection | Joseph H. Levy, Daniel Salvatore Schiappa, Kenneth D. Ray | 2024-05-28 |
| 11962621 | Applying network access control configurations with a network switch based on device health | Biju Ramachandra Kaimal, Kerav Vaidya, Yogesh Bansal, Robert Andrews | 2024-04-16 |
| 11928231 | Dynamic multi-factor authentication | Joseph H. Levy, Daniel Salvatore Schiappa, Kenneth D. Ray | 2024-03-12 |
| 11928631 | Threat detection with business impact scoring | Russell Humphries | 2024-03-12 |
| 11924643 | Point-controlled rogue AP avoidance + rogue AP detection using synchronized security | Anil Kaushik, Shail Talati, Dirk Bolte | 2024-03-05 |
| 11916907 | Federated security for multi-enterprise communications | Moritz Daniel Grimm, Thomas Rolf-Werner Eckert, Kenneth D. Ray | 2024-02-27 |