Issued Patents All Time
Showing 25 most recent of 26 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11665201 | Computer implemented system and method, and computer program product for reversibly remediating a security risk | Ross R. Kinder, William Urbanski, Ryan James Leavengood, Timothy M. Vidas | 2023-05-30 |
| 11632398 | Systems and methods for sharing, distributing, or accessing security data and/or security applications, models, or analytics | Timothy M. Vidas, Aaron Hackworth, Robert Danford, William Urbanski | 2023-04-18 |
| 11418524 | Systems and methods of hierarchical behavior activity modeling and detection for systems-level security | William Urbanski, Timothy M. Vidas, Kyle Soeder, Robert Danford, Aaron Hackworth | 2022-08-16 |
| 11044263 | Systems and methods for threat discovery across distinct organizations | Lewis McLean, Nash Borges | 2021-06-22 |
| 10841337 | Computer implemented system and method, and computer program product for reversibly remediating a security risk | Ross R. Kinder, William Urbanski, Ryan James Leavengood, Timothy M. Vidas | 2020-11-17 |
| 10785238 | Systems and methods for threat discovery across distinct organizations | Lewis McLean, Nash Borges | 2020-09-22 |
| 10735470 | Systems and methods for sharing, distributing, or accessing security data and/or security applications, models, or analytics | Timothy M. Vidas, Aaron Hackworth, Robert Danford, William Urbanski | 2020-08-04 |
| 10659498 | Systems and methods for security configuration | Ross R. Kinder, Timothy M. Vidas, Robert Danford | 2020-05-19 |
| 10645124 | System and method for collection of forensic and event data | Ross R. Kinder, Aaron Hackworth, Matthew K. Geiger, Kevin R. Moore, Timothy M. Vidas +2 more | 2020-05-05 |
| 10594573 | Systems and methods for rule quality estimation | Ross R. Kinder, Timothy M. Vidas, Robert Danford | 2020-03-17 |
| 10333992 | System and method for collection and analysis of endpoint forensic and event data | Ross R. Kinder, Aaron Hackworth, Matthew K. Geiger, Kevin R. Moore, Timothy M. Vidas +2 more | 2019-06-25 |
| 10263788 | Systems and methods for providing a man-in-the-middle proxy | Ross R. Kinder, Timothy M. Vidas, Robert Danford | 2019-04-16 |
| 10116625 | Systems and methods for secure containerization | Ross R. Kinder, Timothy M. Vidas, Robert Danford | 2018-10-30 |
| 10009380 | Systems and methods for security configuration | Ross R. Kinder, Timothy M. Vidas, Robert Danford | 2018-06-26 |
| 9628511 | System and method for identification and blocking of unwanted network traffic | Wayne Haber, Michael Joseph Hubbard, Uday Banerjee | 2017-04-18 |
| 9560062 | System and method for tamper resistant reliable logging of network traffic | Mukund P. Khatri, Theodore S. Webb, Jacqueline Hegedus Wilson | 2017-01-31 |
| 9338180 | System and method for identification and blocking of unwanted network traffic | Wayne Haber, Michael Joseph Hubbard, Uday Banerjee | 2016-05-10 |
| 9319426 | System and method for operating malicious marker detection software on management controller of protected system | Theodore S. Webb, Jacqueline Hegedus Wilson, Mukund P. Khatri | 2016-04-19 |
| 9009828 | System and method for identification and blocking of unwanted network traffic | Wayne Haber, Bill Guerry, Michael Joseph Hubbard, Uday Banerjee | 2015-04-14 |
| 8938802 | System and method for run-time attack prevention | Andy Davenport, Hunter King | 2015-01-20 |
| 8931095 | System and method for assessing whether a communication contains an attack | Jyotish S. Varma, Ashley Thomas, Kevin J. Schmidt, Joseph Neal Stewart, Rudy Alexander Ristich +1 more | 2015-01-06 |
| 8701176 | Integrated computer security management system and method | Kevin Ketts | 2014-04-15 |
| 8621618 | System and method for assessing whether a communication contains an attack | Jyotish S. Varma, Ashley Thomas, Kevin J. Schmidt, Joseph Neal Stewart, Rudy Alexander Ristich +1 more | 2013-12-31 |
| 8522350 | System and method for run-time attack prevention | Andy Davenport, Hunter King | 2013-08-27 |
| 8122495 | Integrated computer security management system and method | Kevin Ketts, Steve Buer | 2012-02-21 |