Issued Patents All Time
Showing 76–100 of 138 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11068615 | Dynamic multi-factor authentication | Joseph H. Levy, Daniel Salvatore Schiappa, Kenneth D. Ray | 2021-07-20 |
| 11037451 | System and method for coordination among a plurality of vehicles | Roderick Buchanan, Richard C. Freeman, David William Clark | 2021-06-15 |
| 11019056 | Managing claiming of unrecognized devices for admission to an enterprise network | John Edward Tyrone Shaw, Ross McKerchar, Moritz Daniel Grimm, Jan Karl Heinrich Weber, Shail Talati +1 more | 2021-05-25 |
| 10986109 | Local proxy detection | Fraser Howard, Karl Ackerman, Dmitri Samosseiko | 2021-04-20 |
| 10984122 | Enterprise document classification | — | 2021-04-20 |
| 10986124 | Baiting endpoints for improved detection of authentication attacks | Daniel Stutz | 2021-04-20 |
| 10972431 | Device management based on groups of network adapters | Moritz Daniel Grimm, Daniel Stutz, Kenneth D. Ray | 2021-04-06 |
| 10972485 | Enterprise network threat detection | Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Russell Humphries | 2021-04-06 |
| 10972483 | Electronic mail security using root cause analysis | David James Mitchell, Paul Murray | 2021-04-06 |
| 10938839 | Threat detection with business impact scoring | Russell Humphries | 2021-03-02 |
| 10938781 | Secure labeling of network flows | Daniel Salvatore Schiappa, Kenneth D. Ray, Joseph H. Levy | 2021-03-02 |
| 10938838 | Computer augmented threat evaluation | Joshua Daniel Saxe, Russell Humphries, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy | 2021-03-02 |
| 10896254 | Sandbox environment for document preview and analysis | Ross McKerchar, John Edward Tyrone Shaw, Russell Humphries, Kenneth D. Ray, Daniel Salvatore Schiappa | 2021-01-19 |
| 10868821 | Electronic mail security using a heartbeat | David James Mitchell, Paul Murray | 2020-12-15 |
| 10862864 | Network device with transparent heartbeat processing | Moritz Daniel Grimm, Daniel Stutz, Kenneth D. Ray | 2020-12-08 |
| 10841339 | Normalized indications of compromise | Kenneth D. Ray, Robert W. Cook, Dmitri Samosseiko, Mark David Harris | 2020-11-17 |
| 10817602 | Endpoint malware detection using an event graph | Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Russell Humphries | 2020-10-27 |
| 10778725 | Using indications of compromise for reputation based network security | Kenneth D. Ray, Simon Neil Reed, Mark David Harris, Neil Robert Tyndale Watkiss, Robert W. Cook +1 more | 2020-09-15 |
| 10721210 | Secure labeling of network flows | Daniel Salvatore Schiappa, Kenneth D. Ray, Joseph H. Levy | 2020-07-21 |
| 10691824 | Behavioral-based control of access to encrypted content by a process | Kenneth D. Ray, Anthony John Merry, Harald Schütz, Andreas Berger, John Edward Tyrone Shaw | 2020-06-23 |
| 10673902 | Labeling computing objects for improved threat detection | Mark David Harris, Simon Neil Reed, Neil Robert Tyndale Watkiss, Kenneth D. Ray | 2020-06-02 |
| 10657277 | Behavioral-based control of access to encrypted content by a process | Kenneth D. Ray, Anthony John Merry, Harald Schütz, Andreas Berger, John Edward Tyrone Shaw | 2020-05-19 |
| 10650141 | Mitigation of return-oriented programming attacks | Erik Jan Loman, Lute Edwin Engels, Kenneth D. Ray | 2020-05-12 |
| 10650154 | Process-level control of encrypted content | Kenneth D. Ray, Anthony John Merry, Harald Schütz, Andreas Berger, John Edward Tyrone Shaw | 2020-05-12 |
| 10616269 | Using reputation to avoid false malware detections | — | 2020-04-07 |