| 12218982 |
Cloud security control platform that enforces scope-based security controls |
Ben A. Wuest, Matthew Aaron Rogers CARLE, Brad Peters, Gregory A. Davis, Joshua Luke Laver +4 more |
2025-02-04 |
| 11930017 |
Cloud security platform with contextual hot-spot permissions analytics |
Veranika Hadun, Ben A. Wuest |
2024-03-12 |
| 11902354 |
Cloud intelligence data model and framework |
Ben A. Wuest, Brad Peters, Albert Lockett |
2024-02-13 |
| 11570231 |
Cloud intelligence data model and framework |
Ben A. Wuest, Brad Peters, Albert Lockett |
2023-01-31 |
| 11134085 |
Cloud least identity privilege and data access framework |
Ben A. Wuest, Brad Peters, Dasharath P. Chavda, Gregory A. Davis |
2021-09-28 |
| 10958672 |
Cognitive offense analysis using contextual data and knowledge graphs |
Suzanne C. Deffeyes, Jiyong Jang, Dhilung Hang Kirat, Youngja Park, Josyula R. Rao +1 more |
2021-03-23 |
| 10887251 |
Fault-tolerant architecture for packet capture |
Wayne F. Tackabury, Russell Couturier, Thomas D. Silliman, Alex Omo Agerholm, Michael Milde Lilja +2 more |
2021-01-05 |
| 10728307 |
Cloud intelligence data model and framework |
Ben A. Wuest, Brad Peters, Albert Lockett |
2020-07-28 |
| 10693796 |
Persistent flow identifiers enabling disparate applications |
Russell Couturier, Vijay Dheap, Patrick V. Johnstone, Ben A. Wuest, Alex Omø Agerholm |
2020-06-23 |
| 10601729 |
Packet capture ring: reliable, scalable packet capture for security applications |
Russell Couturier, Thomas D. Silliman, Wayne F. Tackabury, Alex Omo Agerholm, Michael Milde Lilja +2 more |
2020-03-24 |
| 10542015 |
Cognitive offense analysis using contextual data and knowledge graphs |
Suzanne C. Deffeyes, Jiyong Jang, Dhilung Hang Kirat, Youngja Park, Josyula R. Rao +1 more |
2020-01-21 |
| 10250511 |
Persistent flow identifiers enabling disparate applications |
Russell Couturier, Vijay Dheap, Patrick V. Johnstone, Ben A. Wuest, Alex Omø Agerholm |
2019-04-02 |
| 10044634 |
Packet capture ring: reliable, scalable packet capture for security applications |
Russell Couturier, Thomas D. Silliman, Wayne F. Tackabury, Alex Omo Agerholm, Michael Milde Lilja +2 more |
2018-08-07 |
| 9607144 |
User activity modelling, monitoring, and reporting framework |
Rory F. Bray, Jason D. Keirstead, Dwight E. Spencer, Ben A. Wuest |
2017-03-28 |
| 9600659 |
User activity modelling, monitoring, and reporting framework |
Rory F. Bray, Jason D. Keirstead, Dwight E. Spencer, Ben A. Wuest |
2017-03-21 |
| 9497217 |
Endpoint traffic profiling for early detection of malware spread |
Rory F. Bray, Jody D. Brownell, Ben A. Wuest |
2016-11-15 |
| 9473531 |
Endpoint traffic profiling for early detection of malware spread |
Rory F. Bray, Jody D. Brownell, Ben A. Wuest |
2016-10-18 |
| 9444819 |
Providing context-based visibility of cloud resources in a multi-tenant environment |
Sridhar R. Muppidi, Sreekanth Ramakrishna Iyer, Archana Kumar, Nataraj Nagaratnam |
2016-09-13 |
| 9444820 |
Providing context-based visibility of cloud resources in a multi-tenant environment |
Sridhar R. Muppidi, Sreekanth Ramakrishna Iyer, Archana Kumar, Nataraj Nagaratnam |
2016-09-13 |