Issued Patents All Time
Showing 1–25 of 138 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12395499 | Platform for managing threat data | Mangal Rakesh Vankadaru, Prakash Kumar Talreja, Timothy Rayment, Biju Nair | 2025-08-19 |
| 12361358 | Enterprise network threat detection | Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Russell Humphries | 2025-07-15 |
| 12354043 | Computer augmented threat evaluation | Joshua Daniel Saxe, Russell Humphries, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy | 2025-07-08 |
| 12309200 | Detecting phishing attacks | Karl Ackerman, James Douglas Bean, Kenneth D. Ray, Daniel Stutz | 2025-05-20 |
| 12273382 | Multi-factor authentication | Karl Ackerman, John Edward Tyrone Shaw, Craig Paradis, Kenneth D. Ray | 2025-04-08 |
| 12261824 | Firewall techniques for colored objects on endpoints | Neil Robert Tyndale Watkiss, Daniel Salvatore Schiappa, Kenneth D. Ray | 2025-03-25 |
| 12261830 | Electronic device for secure communications with an automobile | Siva G. Narendra, Pradeep H. Rajashekarappa | 2025-03-25 |
| 12244641 | Application firewall | Karl Ackerman, James Douglas Bean, Kenneth D. Ray, Daniel Stutz | 2025-03-04 |
| 12218977 | Managing admission of unrecognized devices onto an enterprise network | John Edward Tyrone Shaw, Ross McKerchar, Moritz Daniel Grimm, Jan Karl Heinrich Weber, Shail Talati +1 more | 2025-02-04 |
| 12153674 | Tracking malware root causes with an event graph | Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Russell Humphries | 2024-11-26 |
| 12153948 | Distributed zero trust network access | Biju Ramachandra Kaimal, Venkata Suresh Reddy Obulareddy, Mayur Premi, Robert W. Cook, Ramesh Kamath +2 more | 2024-11-26 |
| 12132746 | Incremental enrichment of threat data | Mangal Rakesh Vankadaru, Prakash Kumar Talreja, Timothy Rayment, Biju Nair | 2024-10-29 |
| 12132745 | Composite threat score | Mangal Rakesh Vankadaru, Prakash Kumar Talreja, Timothy Rayment, Biju Nair | 2024-10-29 |
| 12111927 | Use of an application controller to monitor and control software file and application environments | — | 2024-10-08 |
| 12101334 | Augmented threat detection using an attack matrix and data lake queries | Mangal Rakesh Vankadaru, Prakash Kumar Talreja, Timothy Rayment | 2024-09-24 |
| 12095778 | Streaming and filtering event objects into a data lake | Mangal Rakesh Vankadaru, Prakash Kumar Talreja, Timothy Rayment | 2024-09-17 |
| 12093383 | Tracking malware root causes with an event graph | Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Russell Humphries | 2024-09-17 |
| 12079757 | Endpoint with remotely programmable data recorder | Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Russell Humphries | 2024-09-03 |
| 12074904 | Using reputation to avoid false malware detections | — | 2024-08-27 |
| 12052272 | Forensic analysis of computing activity | Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Russell Humphries, Kenneth D. Ray | 2024-07-30 |
| 12050715 | Live discovery of enterprise threats based on security query activity | Karl Ackerman, Kenneth D. Ray | 2024-07-30 |
| 12041067 | Behavior detection and verification | Johan Petter Nordwall, Karl Ackerman, Thomas John Walsh, Christoph Georg Hoyer, Mirco Stratmann +1 more | 2024-07-16 |
| 12026276 | Data augmentation for threat investigation in an enterprise network | Kenneth D. Ray, Karl Ackerman | 2024-07-02 |
| 12021831 | Network security | Mark David Harris, Kenneth D. Ray | 2024-06-25 |
| 11995205 | Centralized event detection | Joseph H. Levy, Daniel Salvatore Schiappa, Kenneth D. Ray | 2024-05-28 |