Issued Patents All Time
Showing 25 most recent of 54 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12361358 | Enterprise network threat detection | Beata Ladnai, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries | 2025-07-15 |
| 12153674 | Tracking malware root causes with an event graph | Beata Ladnai, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries | 2024-11-26 |
| 12093383 | Tracking malware root causes with an event graph | Beata Ladnai, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries | 2024-09-17 |
| 12079757 | Endpoint with remotely programmable data recorder | Beata Ladnai, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries | 2024-09-03 |
| 12052272 | Forensic analysis of computing activity | Beata Ladnai, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries, Kenneth D. Ray | 2024-07-30 |
| 12021831 | Network security | Andrew J. Thomas, Kenneth D. Ray | 2024-06-25 |
| 11843631 | Detecting triggering events for distributed denial of service attacks | Karl Ackerman, Simon Neil Reed, Andrew J. Thomas, Kenneth D. Ray | 2023-12-12 |
| 11727333 | Endpoint with remotely programmable data recorder | Beata Ladnai, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries | 2023-08-15 |
| 11720844 | Enterprise network threat detection | Beata Ladnai, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries | 2023-08-08 |
| 11716351 | Intrusion detection with honeypot keys | Harald Schütz, Andreas Berger, Russell Humphries, Kenneth D. Ray | 2023-08-01 |
| 11550909 | Tracking malicious software movement with an event graph | Beata Ladnai, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries | 2023-01-10 |
| 11297073 | Forensic query of local event streams in an enterprise network | Beata Ladnai, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries | 2022-04-05 |
| 11277416 | Labeling network flows according to source applications | Kenneth D. Ray, Andrew J. Thomas | 2022-03-15 |
| 11182486 | Early boot driver for start-up detection of malicious code | Richard Paul Cosgrove, Andrew G. P. Smith | 2021-11-23 |
| 11165797 | Detecting endpoint compromise based on network usage history | Karl Ackerman, Kenneth D. Ray, Andrew J. Thomas, Daniel Stutz | 2021-11-02 |
| 11102238 | Detecting triggering events for distributed denial of service attacks | Karl Ackerman, Simon Neil Reed, Andrew J. Thomas, Kenneth D. Ray | 2021-08-24 |
| 11095669 | Forensic analysis of computing activity | Beata Ladnai, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries, Kenneth D. Ray | 2021-08-17 |
| 11089056 | Intrusion detection with honeypot keys | Harald Schütz, Andreas Berger, Russell Humphries, Kenneth D. Ray | 2021-08-10 |
| 10972485 | Enterprise network threat detection | Beata Ladnai, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries | 2021-04-06 |
| 10963569 | Early boot driver for start-up detection of malicious code | Andrew G. P. Smith, Richard Paul Cosgrove | 2021-03-30 |
| 10951642 | Context-dependent timeout for remote security services | Neil Robert Tyndale Watkiss, Emile Marcus Kenning | 2021-03-16 |
| 10841339 | Normalized indications of compromise | Kenneth D. Ray, Robert W. Cook, Andrew J. Thomas, Dmitri Samosseiko | 2020-11-17 |
| 10817602 | Endpoint malware detection using an event graph | Beata Ladnai, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries | 2020-10-27 |
| 10778725 | Using indications of compromise for reputation based network security | Kenneth D. Ray, Simon Neil Reed, Neil Robert Tyndale Watkiss, Andrew J. Thomas, Robert W. Cook +1 more | 2020-09-15 |
| 10728269 | Method for conditionally hooking endpoint processes with a security agent | Neil Robert Tyndale Watkiss | 2020-07-28 |