Issued Patents All Time
Showing 1–13 of 13 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12267339 | Executing modular alerts and associated security actions | Banipal Shahbaz, Sri Atma Oaklander de Licori, John Robert Coates, David Hazekamp, Luke Murphey +1 more | 2025-04-01 |
| 11677760 | Executing modular alerts and associated security actions | Banipal Shahbaz, Siri Atma Oaklander De Licori, John Robert Coates, David Hazekamp, Luke Murphey +1 more | 2023-06-13 |
| 10812514 | Configuring the generation of additional time-series event data by remote capture agents | Vijay Chauhan, Luke Murphey, David Hazekamp | 2020-10-20 |
| 10771479 | Configuring modular alert actions and reporting action performance information | Banipal Shahbaz, Siri Atma Oaklander De Licori, John Robert Coates, David Hazekamp, Luke Murphey +1 more | 2020-09-08 |
| 10496816 | Supplementary activity monitoring of a selected subset of network entities | Ravi Iyer, Vijay Chauhan | 2019-12-03 |
| 10193916 | Configuring the generation of event data based on a triggering search query | Vijay Chauhan, Luke Murphey, David Hazekamp | 2019-01-29 |
| 10185821 | User activity monitoring by use of rule-based search queries | Ravi Iyer, Vijay Chauhan | 2019-01-22 |
| 9843598 | Capture triggers for capturing network data | Vijay Chauhan, Luke Murphey, David Hazekamp | 2017-12-12 |
| 9836598 | User activity monitoring | Ravi Iyer, Vijay Chauhan | 2017-12-05 |
| 9596253 | Capture triggers for capturing network data | Vijay Chauhan, Luke Murphey, David Hazekamp | 2017-03-14 |
| 9584422 | Methods and apparatuses for automating return traffic redirection to a service appliance by injecting traffic interception/redirection rules into network nodes | Chao Feng, Samar Sharma, Kalyan Venkataramana | 2017-02-28 |
| 9083709 | Virtual internet protocol migration and load balancing | Daniel G. Moen, Venkataraman Natham, Ali Golshan | 2015-07-14 |
| 8837486 | Methods and apparatuses for automating return traffic redirection to a service appliance by injecting traffic interception/redirection rules into network nodes | Chao Feng, Samar Sharma, Kalyan Venkataramana | 2014-09-16 |