AM

Atif Mahadik

CI Cisco: 53 patents #134 of 13,007Top 2%
PC Phantom Cyber: 5 patents #1 of 4Top 25%
Broadcom: 3 patents #3,175 of 9,346Top 35%
📍 Fremont, CA: #176 of 9,298 inventorsTop 2%
🗺 California: #5,623 of 386,348 inventorsTop 2%
Overall (All Time): #37,387 of 4,157,543Top 1%
61
Patents All Time

Issued Patents All Time

Showing 26–50 of 61 patents

Patent #TitleCo-InventorsDate
11240120 Simulating multiple paths of a course of action executed in an information technology environment Ryan Connor Means, Govind Salinas, Sourabh Satish 2022-02-01
11190539 Modifying incident response time periods based on containment action effectiveness Sourabh Satish, Oliver Friedrichs, Govind Salinas 2021-11-30
11165812 Containment of security threats within a computing environment Sourabh Satish, Oliver Friedrichs, Govind Salinas 2021-11-02
11133977 Anonymizing action implementation data obtained from incident analysis systems Oliver Friedrichs, Govind Salinas, Sourabh Satish 2021-09-28
11038915 Dynamic generation of courses of action for incident response in an information technology environment Oliver Friedrichs, Govind Salinas, Sourabh Satish 2021-06-15
11025664 Identifying security actions for responding to security threats based on threat state information Sourabh Satish, Oliver Friedrichs, Govind Salinas 2021-06-01
11019092 Learning based security threat containment Sourabh Satish, Oliver Friedrichs, Govind Salinas 2021-05-25
11019093 Graphical interface for incident response automation Sourabh Satish, Oliver Friedrichs, Govind Salinas 2021-05-25
10999164 Securely executing custom playbook code in a hybrid execution environment Chakravarthy Sridhar, Minjie Qiu 2021-05-04
10986120 Selecting actions responsive to computing environment incidents based on action impact information Sourabh Satish, Oliver Friedrichs, Govind Salinas 2021-04-20
10985994 Simulated incident response using simulated result when actual result is unavailable Ryan Connor Means, Govind Salinas, Sourabh Satish 2021-04-20
10936488 Incident response in an information technology environment using cached data from external services Brian Robert Earle, Govind Salinas, Sourabh Satish 2021-03-02
10904295 Dynamically updating feature set recommendation databases Sourabh Satish, Oliver Friedrichs, Govind Salinas, Ryan Scott Russell 2021-01-26
10855718 Management of actions in a computing environment based on asset classification Sourabh Satish, Oliver Friedrichs, Govind Salinas 2020-12-01
10834120 Identifying related communication interactions to a security threat in a computing environment Sourabh Satish, Oliver Friedrichs, Govind Salinas 2020-11-10
10742484 Generating action suggestions based on anonymized data from multiple information technology environments Oliver Friedrichs, Govind Salinas, Sourabh Satish 2020-08-11
10630727 Identifying recommended feature sets for software under development Sourabh Satish, Oliver Friedrichs, Govind Salinas, Ryan Scott Russell 2020-04-21
10616264 Incident response management based on asset configurations in a computing environment Oliver Friedrichs, Govind Salinas, Sourabh Satish 2020-04-07
10567424 Determining security actions for security threats using enrichment information Sourabh Satish, Oliver Friedrichs, Govind Salinas 2020-02-18
10554687 Incident response management based on environmental characteristics Sourabh Satish, Oliver Friedrichs, Govind Salinas 2020-02-04
10476905 Security actions for computing assets based on enrichment information Sourabh Satish, Oliver Friedrichs, Govind Salinas 2019-11-12
10425440 Implementing security actions in an advisement system based on obtained software characteristics Sourabh Satish, Oliver Friedrichs, Govind Salinas 2019-09-24
10425441 Translating security actions to action procedures in an advisement system Sourabh Satish, Oliver Friedrichs, Govind Salinas 2019-09-24
10320845 Recommended security action feature sets Sourabh Satish, Oliver Friedrichs, Govind Salinas, Ryan Scott Russell 2019-06-11
10193920 Managing security actions in a computing environment based on communication activity of a security threat Sourabh Satish, Oliver Friedrichs, Govind Salinas 2019-01-29