Issued Patents All Time
Showing 51–75 of 138 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11562088 | Threat response using event vectors | Joseph H. Levy, Daniel Salvatore Schiappa, Kenneth D. Ray | 2023-01-24 |
| 11556664 | Centralized event detection | Joseph H. Levy, Daniel Salvatore Schiappa, Kenneth D. Ray | 2023-01-17 |
| 11550909 | Tracking malicious software movement with an event graph | Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Russell Humphries | 2023-01-10 |
| 11552962 | Computer assisted identification of intermediate level threats | Joshua Daniel Saxe, Russell Humphries, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy | 2023-01-10 |
| 11496445 | Electronic device for secure communications with an automobile | Siva G. Narendra, Pradeep H. Rajashekarappa | 2022-11-08 |
| 11463882 | Endpoint-controlled rogue AP avoidance + rogue AP detection using synchronized security | Anil Kaushik, Shail Talati, Dirk Bolte | 2022-10-04 |
| 11310264 | Using reputation to avoid false malware detections | — | 2022-04-19 |
| 11310275 | Managing admission of unrecognized devices onto an enterprise network | John Edward Tyrone Shaw, Ross McKerchar, Moritz Daniel Grimm, Jan Karl Heinrich Weber, Shail Talati +1 more | 2022-04-19 |
| 11297073 | Forensic query of local event streams in an enterprise network | Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Russell Humphries | 2022-04-05 |
| 11288385 | Chain of custody for enterprise documents | Karl Ackerman, Russell Humphries, Daniel Salvatore Schiappa, Kenneth D. Ray | 2022-03-29 |
| 11277416 | Labeling network flows according to source applications | Kenneth D. Ray, Mark David Harris | 2022-03-15 |
| 11271950 | Securing endpoints in a heterogenous enterprise network | Moritz Daniel Grimm, Daniel Stutz, Kenneth D. Ray | 2022-03-08 |
| 11258821 | Application firewall | Karl Ackerman, James Douglas Bean, Kenneth D. Ray, Daniel Stutz | 2022-02-22 |
| 11244049 | Use of an application controller to monitor and control software file and application environments | — | 2022-02-08 |
| 11194900 | Mitigation of return-oriented programming attacks | Erik Jan Loman, Lute Edwin Engels, Kenneth D. Ray | 2021-12-07 |
| 11184392 | Detecting lateral movement by malicious applications | Daniel Stutz | 2021-11-23 |
| 11184391 | Server-client authentication with integrated status update | Kenneth D. Ray, Karl Ackerman | 2021-11-23 |
| 11165797 | Detecting endpoint compromise based on network usage history | Karl Ackerman, Mark David Harris, Kenneth D. Ray, Daniel Stutz | 2021-11-02 |
| 11157300 | Managing virtual machine security resources | Chloe Bell, Robert William Allsworth, Mark Gill, Timothy Edward Cobley, Trevor Neil McGing +2 more | 2021-10-26 |
| 11140130 | Firewall techniques for colored objects on endpoints | Neil Robert Tyndale Watkiss, Daniel Salvatore Schiappa, Kenneth D. Ray | 2021-10-05 |
| 11140195 | Secure endpoint in a heterogenous enterprise network | Moritz Daniel Grimm, Daniel Stutz, Kenneth D. Ray | 2021-10-05 |
| 11134056 | Portal for managing admission of unrecognized devices to an enterprise network | John Edward Tyrone Shaw, Ross McKerchar, Moritz Daniel Grimm, Jan Karl Heinrich Weber, Shail Talati +1 more | 2021-09-28 |
| 11102238 | Detecting triggering events for distributed denial of service attacks | Karl Ackerman, Mark David Harris, Simon Neil Reed, Kenneth D. Ray | 2021-08-24 |
| 11095669 | Forensic analysis of computing activity | Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Russell Humphries, Kenneth D. Ray | 2021-08-17 |
| 11087014 | Dynamic policy based on user experience | Joseph H. Levy, Daniel Salvatore Schiappa, Kenneth D. Ray | 2021-08-10 |