Issued Patents All Time
Showing 1–20 of 20 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12401626 | Multi-factor network segmentation | Kaushal Bansal, Fiaz Hossain | 2025-08-26 |
| 12282419 | Re-usable web-objects for use with automation tools | Naveen V, Shanavas Madeen S, Ravikanth MALIPEDDU, Santhosh Reddy MEREDDY, Ajith G +2 more | 2025-04-22 |
| 12256039 | Maintaining service availability | Kaushal Bansal | 2025-03-18 |
| 12255925 | Systems and methods for automatically rendering and deploying network security policies | Gianstefano Monni, Jose Lejin P J, Megha Dixit, Praveenkumar Sowpati, Darragh Connaughton +6 more | 2025-03-18 |
| 12250197 | Automated external IP address discovery of services in a public cloud environment | Adam J. Salter, Deepanshu Badola, Stephen Fung, Santhosh Ram Vetrinadar Manohar, Varun Kulkarni Somashekhar +3 more | 2025-03-11 |
| 12170692 | Network security orchestration and management across different clouds | Toan Van Nguyen, Sriram Srinivasan, Syed Abdullah Shah, Santhosh Ram Vetrinadar Manohar, Varun Kulkarni Somashekhar +1 more | 2024-12-17 |
| 11977476 | Incrementally validating security policy code using information from an infrastructure as code repository | Kaushal Bansal, Selim Ciraci | 2024-05-07 |
| 11805021 | Network path recommendations for services executing on cloud platforms | Kaushal Bansal, Amitabh B. Chakrabarty, Alankar Sharma | 2023-10-31 |
| 9852296 | Rollback feature | Nitin Jyoti, Gangadharasa Srinivasa | 2017-12-26 |
| 9703958 | Rollback feature | Nitin Jyoti, Gangadharasa Srinivasa | 2017-07-11 |
| 9639696 | Method and apparatus for analyzing end user license agreements | Sree Hari Nagaralu | 2017-05-02 |
| 9607150 | Rollback feature | Nitin Jyoti, Gangadharasa Srinivasa | 2017-03-28 |
| 9607148 | Method and apparatus for detecting malware on a computer system | Sujit Magar, Anand Bodke, Abhijit Limaye | 2017-03-28 |
| 9577932 | Techniques for managing ternary content-addressable memory (TCAM) resources in heterogeneous systems | Anil Kumar Ravipati, Chirdeep Panduranga, Prateek Tambi | 2017-02-21 |
| 9323928 | System and method for non-signature based detection of malicious processes | Romanch Agarwal, Nitin Jyoti, Harinath Ramachetty Vishwanath, Palasamudram Ramagopal Prashanth | 2016-04-26 |
| 9032523 | Rollback feature | Nitin Jyoti, Gangadharasa Srinivasa | 2015-05-12 |
| 9015849 | Method and apparatus for preventing data leakage of e-discovery data items | Angshuman Bezbaruah, Ankur Panchbudhe | 2015-04-21 |
| 8677493 | Dynamic cleaning for malware using cloud technology | Palasamudram Ramagopal Prashanth, Nitin Jyoti | 2014-03-18 |
| 8539583 | Rollback feature | Nitin Jyoti, Gangadharasa Srinivasa | 2013-09-17 |
| 8306988 | System, method, and computer program product for segmenting a database based, at least in part, on a prevalence associated with known objects included in the database | Nitin Jyoti, Zhenyu Zhong, Guy Roberts, Jeffrey Martin Green, Sven Krasser | 2012-11-06 |