| 12300271 |
System and method for documenting recorded events |
Gerald R. Malan, Lawrence Bruce Huston, III, Ranganathan Gopalan, Jonathan Philip Obley, Jonathan Walters +2 more |
2025-05-13 |
| RE50377 |
DNS misuse detection through attribute cardinality tracking |
Alan Saqui |
2025-04-08 |
| 12052114 |
System and method for documenting and controlling meetings employing bot |
Gerald R. Malan |
2024-07-30 |
| 11902295 |
Using a security analytics map to perform forensic analytics |
Assaf Almaz, David Coffey, Ofir Arkin |
2024-02-13 |
| 11902296 |
Using a security analytics map to trace entity interaction |
Assaf Almaz, David Coffey, Ofir Arkin |
2024-02-13 |
| 11895158 |
Cybersecurity system having security policy visualization |
Lawrence Bruce Huston, III, David Coffey |
2024-02-06 |
| 11785042 |
Real time management of botnet attacks |
Sean O'Hara, Brian St. Pierre |
2023-10-10 |
| 11546266 |
Correlating discarded network traffic with network policy events through augmented flow |
James E. Winquist |
2023-01-03 |
| 11528281 |
Security analytics mapping system |
Assaf Almaz, David Coffey, Ofir Arkin |
2022-12-13 |
| 11451563 |
Dynamic detection of HTTP-based DDoS attacks using estimated cardinality |
Archana A. Rajaram |
2022-09-20 |
| 11343143 |
Using a flow database to automatically configure network traffic visibility systems |
Ronald G. Hay, James E. Winquist, William M. Northway, Jr., Lawrence Bruce Huston, III |
2022-05-24 |
| 11165817 |
Mitigation of network denial of service attacks using IP location services |
Sean O'Hara, Brian St. Pierre |
2021-11-02 |
| 11095671 |
DNS misuse detection through attribute cardinality tracking |
Alan Saqui |
2021-08-17 |
| 11070533 |
Encrypted server name indication inspection |
Olli-Pekka Niemi, Valtteri Rahkonen |
2021-07-20 |
| 10904203 |
Augmenting network flow with passive DNS information |
Lawrence Bruce Huston, III, James E. Winquist, Alex Cole Levine, Ronald G. Hay, Brett Higgins +2 more |
2021-01-26 |
| 10708294 |
System and method to select and apply hypothetical mitigation parameters |
William M. Northway, Jr., James E. Winquist, Ronald G. Hay, Nicholas Scott |
2020-07-07 |