Issued Patents All Time
Showing 25 most recent of 32 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11790080 | Threat detection system with machine models for accounts within an organization unit | Aaron Flatten | 2023-10-17 |
| 11743282 | Enhanced cloud-based entity reputation scoring | MohamadAli Torkamani, Baris Coskun, Jeffrey E. Bickford | 2023-08-29 |
| 11704408 | Threat scanning transplanted containers | Mircea Ciubotariu, Muhammad Wasiq | 2023-07-18 |
| 11474976 | Multi-level data de-duplication using multi-instance storage | Aravind Santhanam | 2022-10-18 |
| 11372811 | Optimizing disk volume scanning using snapshot metadata | Mircea Ciubotariu, Sandeep Kumar, Shlomo Yehezkel, Chakravarthi Valicherla, Tal Eidelman | 2022-06-28 |
| 10944758 | Computer resource vulnerability assessment and remediation | Aparna Nagargadde | 2021-03-09 |
| 10924503 | Identifying false positives in malicious domain data using network traffic data logs | Muhammad Wasiq | 2021-02-16 |
| 10887333 | Multi-tenant threat intelligence service | Stephen Chen, Zhuo Zhang | 2021-01-05 |
| 10803169 | Threat detection system with machine models for accounts within an organization unit | Aaron Flatten | 2020-10-13 |
| 10565372 | Subscription-based multi-tenant threat intelligence service | Thomas Charles Stickle, Adam Schodde | 2020-02-18 |
| 10397273 | Threat intelligence system | Thomas Charles Stickle | 2019-08-27 |
| 9613213 | Using telemetry to reduce malware definition package size | Carey Nachenberg | 2017-04-04 |
| 9378367 | Systems and methods for identifying a source of a suspect event | — | 2016-06-28 |
| 9332030 | Systems and methods for thwarting illegitimate initialization attempts | — | 2016-05-03 |
| 9171154 | Systems and methods for scanning packed programs in response to detecting suspicious behaviors | — | 2015-10-27 |
| 8931086 | Method and apparatus for reducing false positive detection of malware | Mark Kennedy, Pieter Viljoen | 2015-01-06 |
| 8918873 | Systems and methods for exonerating untrusted software components | Sourabh Satish, Wilson Meng, Yoshihiro YASUDA | 2014-12-23 |
| 8914888 | Systems and methods for classifying an unclassified process as a potential trusted process based on dependencies of the unclassified process | Sourabh Satish, Adam Glick | 2014-12-16 |
| 8826431 | Using telemetry to reduce malware definition package size | Carey Nachenberg | 2014-09-02 |
| 8615805 | Systems and methods for determining if a process is a malicious process | Mark Obrecht | 2013-12-24 |
| 8495096 | Decision tree induction that is sensitive to attribute computational complexity | Zulfikar Ramzan, Sourabh Satish | 2013-07-23 |
| 8464345 | Behavioral signature generation using clustering | Sourabh Satish | 2013-06-11 |
| 8381289 | Communication-based host reputation system | Sourabh Satish | 2013-02-19 |
| 8352409 | Systems and methods for improving the effectiveness of decision trees | Sourabh Satish, Nicholas Graf, Lachlan Orr, Scott Charles Sullivan | 2013-01-08 |
| 8321940 | Systems and methods for detecting data-stealing malware | Sourabh Satish | 2012-11-27 |