| 12267339 |
Executing modular alerts and associated security actions |
Banipal Shahbaz, Sri Atma Oaklander de Licori, John Robert Coates, David Hazekamp, Devendra Badhani +1 more |
2025-04-01 |
| 12120170 |
Presenting un-deployed features of an application |
Vijay Chauhan, Liu-Yuan Lai, Wenhui Yu, David Hazekamp |
2024-10-15 |
| 11677760 |
Executing modular alerts and associated security actions |
Banipal Shahbaz, Siri Atma Oaklander De Licori, John Robert Coates, David Hazekamp, Devendra Badhani +1 more |
2023-06-13 |
| 11641372 |
Generating investigation timeline displays including user-selected screenshots |
Vijay Chauhan, Cary Glen Noel, Wenhui Yu, Alexander Raitz, David Hazekamp |
2023-05-02 |
| 11477263 |
Identifying un-deployed features of an application |
Vijay Chauhan, Liu-Yuan Lai, Wenhui Yu, David Hazekamp |
2022-10-18 |
| 11363047 |
Generating investigation timeline displays including activity events and investigation workflow events |
Vijay Chauhan, Cary Glen Noel, Wenhui Yu, Alexander Raitz, David Hazekamp |
2022-06-14 |
| 11132111 |
Assigning workflow network security investigation actions to investigation timelines |
Vijay Chauhan, Cary Glen Noel, Wenhui Yu |
2021-09-28 |
| 10812514 |
Configuring the generation of additional time-series event data by remote capture agents |
Vijay Chauhan, Devendra Badhani, David Hazekamp |
2020-10-20 |
| 10778712 |
Displaying network security events and investigation activities across investigation timelines |
Vijay Chauhan, Cary Glen Noel, Wenhui Yu, Alexander Raitz, David Hazekamp |
2020-09-15 |
| 10771479 |
Configuring modular alert actions and reporting action performance information |
Banipal Shahbaz, Siri Atma Oaklander De Licori, John Robert Coates, David Hazekamp, Devendra Badhani +1 more |
2020-09-08 |
| 10735492 |
Reporting un-deployed application features |
Vijay Chauhan, Liu-Yuan Lai, Wenhui Yu, David Hazekamp |
2020-08-04 |
| 10320877 |
Systems and methods for indicating deployment of application features |
Vijay Chauhan, Liu-Yuan Lai, Wenhui Yu, David Hazekamp |
2019-06-11 |
| 10254934 |
Network security investigation workflow logging |
Vijay Chauhan, Cary Glen Noel, Wenhui Yu |
2019-04-09 |
| 10250628 |
Storyboard displays of information technology investigative events along a timeline |
Vijay Chauhan, Cary Glen Noel, Wenhui Yu, Alexander Raitz, David Hazekamp |
2019-04-02 |
| 10193916 |
Configuring the generation of event data based on a triggering search query |
Vijay Chauhan, Devendra Badhani, David Hazekamp |
2019-01-29 |
| 9848008 |
Creating timeline views of information technology event investigations |
Vijay Chauhan, Cary Glen Noel, Wenhui Yu, Alexander Raitz, David Hazekamp |
2017-12-19 |
| 9843598 |
Capture triggers for capturing network data |
Vijay Chauhan, Devendra Badhani, David Hazekamp |
2017-12-12 |
| 9596253 |
Capture triggers for capturing network data |
Vijay Chauhan, Devendra Badhani, David Hazekamp |
2017-03-14 |
| 9516052 |
Timeline displays of network security investigation events |
Vijay Chauhan, Cary Glen Noel, Wenhui Yu, Alexander Raitz, David Hazekamp |
2016-12-06 |