| 12079347 |
Systems and methods for assessing cybersecurity risk in a work from home environment |
Daniel Dahlberg, Stephen Boyer |
2024-09-03 |
| 11652834 |
Methods for using organizational behavior for risk ratings |
Alan J. Kirby, John Matthew Truelove, David Feinzeig, Nagarjuna Venna, Stephen Boyer |
2023-05-16 |
| 11627109 |
Methods for mapping IP addresses and domains to organizations using user activity data |
Daniel Dahlberg, Stephen Boyer, Nagarjuna Venna |
2023-04-11 |
| 11182720 |
Relationships among technology assets and services and the entities responsible for them |
Nagarjuna Venna, David Feinzeig, Amy Eastment, Daniel Dahlberg, Stephen Boyer +1 more |
2021-11-23 |
| 10893021 |
Methods for mapping IP addresses and domains to organizations using user activity data |
Daniel Dahlberg, Stephen Boyer, Nagarjuna Venna |
2021-01-12 |
| 10785245 |
Methods for using organizational behavior for risk ratings |
Alan J. Kirby, John Matthew Truelove, David Feinzeig, Nagarjuna Venna, Stephen Boyer |
2020-09-22 |
| 10554619 |
Methods for mapping IP addresses and domains to organizations using user activity data |
Daniel Dahlberg, Stephen Boyer, Nagarjuna Venna |
2020-02-04 |
| 10425380 |
Methods for mapping IP addresses and domains to organizations using user activity data |
Daniel Dahlberg, Stephen Boyer, Nagarjuna Venna |
2019-09-24 |
| 10341370 |
Human-assisted entity mapping |
Alan J. Kirby, John Matthew Truelove, David Feinzeig, Nagarjuna Venna, Stephen Boyer |
2019-07-02 |
| 10326786 |
Methods for using organizational behavior for risk ratings |
Alan J. Kirby, John Matthew Truelove, David Feinzeig, Nagarjuna Venna, Stephen Boyer |
2019-06-18 |
| 10176445 |
Relationships among technology assets and services and the entities responsible for them |
Nagarjuna Venna, David Feinzeig, Amy Eastment, Daniel Dahlberg, Stephen Boyer +1 more |
2019-01-08 |
| 9680858 |
Annotation platform for a security risk system |
Stephen Boyer, Nagarjuna Venna, Nicholas Whalen |
2017-06-13 |
| 9503460 |
System and method for managing access for trusted and untrusted applications |
Morris J. Katz |
2016-11-22 |
| 9438615 |
Security risk management |
Alan J. Kirby, John Matthew Truelove, David Feinzeig, Nagarjuna Venna, Stephen Boyer |
2016-09-06 |
| 9178697 |
Security for remote access VPN |
David McGrew |
2015-11-03 |
| 9077730 |
Restricting network access while connected to an untrusted network |
Vincent E. Parla, Christopher A. Fitzgerald |
2015-07-07 |
| 8806609 |
Security for remote access VPN |
David McGrew |
2014-08-12 |
| 8533780 |
Dynamic content-based routing |
Vincent E. Parla, David J. McCowan, Andrew Zawadowskiy, Christopher A. Fitzgerald |
2013-09-10 |
| 8473757 |
Protecting digital data such as images on a device with image acquisition capabilities |
David McGrew |
2013-06-25 |
| 5377191 |
Network communication system |
John M. Farrell |
1994-12-27 |