Issued Patents All Time
Showing 51–67 of 67 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10554687 | Incident response management based on environmental characteristics | Sourabh Satish, Oliver Friedrichs, Atif Mahadik | 2020-02-04 |
| 10476905 | Security actions for computing assets based on enrichment information | Sourabh Satish, Oliver Friedrichs, Atif Mahadik | 2019-11-12 |
| 10425440 | Implementing security actions in an advisement system based on obtained software characteristics | Sourabh Satish, Oliver Friedrichs, Atif Mahadik | 2019-09-24 |
| 10425441 | Translating security actions to action procedures in an advisement system | Sourabh Satish, Oliver Friedrichs, Atif Mahadik | 2019-09-24 |
| 10320845 | Recommended security action feature sets | Sourabh Satish, Oliver Friedrichs, Atif Mahadik, Ryan Scott Russell | 2019-06-11 |
| 10193920 | Managing security actions in a computing environment based on communication activity of a security threat | Sourabh Satish, Oliver Friedrichs, Atif Mahadik | 2019-01-29 |
| 10158663 | Incident response using asset configuration data | Sourabh Satish, Oliver Friedrichs, Atif Mahadik | 2018-12-18 |
| 10116687 | Management of administrative incident response based on environmental characteristics associated with a security incident | Sourabh Satish, Oliver Friedrichs, Atif Mahadik | 2018-10-30 |
| 10063587 | Management of security actions based on computing asset classification | Sourabh Satish, Oliver Friedrichs, Atif Mahadik | 2018-08-28 |
| 9954888 | Security actions for computing assets based on enrichment information | Sourabh Satish, Oliver Friedrichs, Atif Mahadik | 2018-04-24 |
| 9888029 | Classifying kill-chains for security incidents | Sourabh Satish, Oliver Friedrichs, Atif Mahadik | 2018-02-06 |
| 9871818 | Managing workflows upon a security incident | Sourabh Satish, Oliver Friedrichs, Atif Mahadik | 2018-01-16 |
| 9762607 | Incident response automation engine | Sourabh Satish, Oliver Friedrichs, Atif Mahadik | 2017-09-12 |
| 9712555 | Automated responses to security threats | Sourabh Satish, Oliver Friedrichs, Atif Mahadik | 2017-07-18 |
| 9684705 | Systems and methods for clustering data | Sourabh Satish | 2017-06-20 |
| 7975308 | Method and apparatus to secure user confidential data from untrusted browser extensions | Sourabh Satish, Zulfikar Ramzan | 2011-07-05 |
| 7945953 | Method to identify buffer overflows and RLIBC attacks | Matthew Conover, Sourabh Satish | 2011-05-17 |