Issued Patents All Time
Showing 26–50 of 80 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12284197 | Reducing amounts of data ingested into a data warehouse | Jean-Philippe Martin, Ulfar Erlingsson | 2025-04-22 |
| 12267345 | Using user feedback for attack path analysis in an anomaly detection framework | Ulfar Erlingsson, Jay Parikh | 2025-04-01 |
| 12261866 | Time series anomaly detection | Ting-Fang Yen, Isha Singhal, Andrew D. Twigg | 2025-03-25 |
| 12244621 | Using activity monitored by multiple data sources to identify shadow systems | Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more | 2025-03-04 |
| 12206696 | Detecting anomalies in a network environment | Vikram Kapoor, Samuel Joseph Pullara, III, Murat Bog, Sanjay Kalra | 2025-01-21 |
| 12130878 | Deduplication of monitored communications data in a cloud environment | Anil Nanduri, Prakash Jalan, Matti A. Vanninen, Ammar Ekbote, Alex Ramachandran Nirmala | 2024-10-29 |
| 12126695 | Enhancing security of a cloud deployment based on learnings from other cloud deployments | Ulfar Erlingsson | 2024-10-22 |
| 12126643 | Leveraging generative artificial intelligence (‘AI’) for securing a monitored deployment | Njall Skarphedinsson, Pamela Bhattacharya, Ulfar Erlingsson, Jay Parikh, Timothy Chase | 2024-10-22 |
| 12120140 | Detecting threats against computing resources based on user behavior changes | Harish Kumar Bharat Singh, Vikram Kapoor, Murat Bog | 2024-10-15 |
| 12095879 | Identifying encountered and unencountered conditions in software applications | Ulfar Erlingsson | 2024-09-17 |
| 12095794 | Universal cloud data ingestion for stream processing | Gurunatha Karaje, Helgi K. Sigurbjarnarson, Jean-Philippe Martin, Ashwin Jayaprakash, Ulfar Erlingsson +2 more | 2024-09-17 |
| 12095796 | Instruction-level threat assessment | Patrice Godefroid, Curtis Gerald Condra | 2024-09-17 |
| 12058160 | Generating computer code for remediating detected events | Ulfar Erlingsson, Jay Parikh | 2024-08-06 |
| 12034754 | Using static analysis for vulnerability detection | Peter W. O'Hearn, Theodore M. Reed, Robert Schoening | 2024-07-09 |
| 12032634 | Graph reclustering based on different clustering criteria | Harish Kumar Bharat Singh, Murat Bog, Vikram Kapoor | 2024-07-09 |
| 12034750 | Tracking of user login sessions | Murat Bog, Vikram Kapoor, Samuel Joseph Pullara, III, Harish Kumar Bharat Singh | 2024-07-09 |
| 12021888 | Cloud infrastructure entitlement management by a data platform | Theodore M. Reed, Bao Nguyen, Kenneth Beasley, Joshua Vertes, Adin Aoki +3 more | 2024-06-25 |
| 11991198 | User-specific data-driven network security | Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more | 2024-05-21 |
| 11979422 | Elastic privileges in a secure access service edge | Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more | 2024-05-07 |
| 11973784 | Natural language interface for an anomaly detection framework | Ulfar Erlingsson, Jay Parikh | 2024-04-30 |
| 11954130 | Alerting based on pod communication-based logical graph | Harish Kumar Bharat Singh, Murat Bog, Vikram Kapoor | 2024-04-09 |
| 11916947 | Generating user-specific polygraphs for network activity | Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more | 2024-02-27 |
| 11909752 | Detecting deviations from typical user behavior | Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more | 2024-02-20 |
| 11895135 | Detecting anomalous behavior of a device | Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more | 2024-02-06 |
| 11894984 | Configuring cloud deployments based on learnings obtained by monitoring other cloud deployments | Ulfar Erlingsson | 2024-02-06 |