Issued Patents All Time
Showing 25 most recent of 38 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12309200 | Detecting phishing attacks | Andrew J. Thomas, James Douglas Bean, Kenneth D. Ray, Daniel Stutz | 2025-05-20 |
| 12273382 | Multi-factor authentication | John Edward Tyrone Shaw, Craig Paradis, Andrew J. Thomas, Kenneth D. Ray | 2025-04-08 |
| 12244641 | Application firewall | Andrew J. Thomas, James Douglas Bean, Kenneth D. Ray, Daniel Stutz | 2025-03-04 |
| 12184510 | Implementing a machine-learning model to identify critical systems in an enterprise environment | — | 2024-12-31 |
| 12050715 | Live discovery of enterprise threats based on security query activity | Andrew J. Thomas, Kenneth D. Ray | 2024-07-30 |
| 12041067 | Behavior detection and verification | Andrew J. Thomas, Johan Petter Nordwall, Thomas John Walsh, Christoph Georg Hoyer, Mirco Stratmann +1 more | 2024-07-16 |
| 12026276 | Data augmentation for threat investigation in an enterprise network | Kenneth D. Ray, Andrew J. Thomas | 2024-07-02 |
| 12010133 | Security threat monitoring for network-accessible devices | — | 2024-06-11 |
| 11853425 | Dynamic sandbox scarecrow for malware management | Ross McKerchar, Erik Jan Loman, Simon Neil Reed, Kenneth D. Ray, Andrew J. Thomas | 2023-12-26 |
| 11843631 | Detecting triggering events for distributed denial of service attacks | Mark David Harris, Simon Neil Reed, Andrew J. Thomas, Kenneth D. Ray | 2023-12-12 |
| 11836664 | Enterprise network threat detection | Russell Humphries, Mark Russo, Andrew J. Thomas | 2023-12-05 |
| 11736522 | Server-client authentication with integrated status update | Andrew J. Thomas, Kenneth D. Ray | 2023-08-22 |
| 11727143 | Live discovery of enterprise threats based on security query activity | Andrew J. Thomas, Kenneth D. Ray | 2023-08-15 |
| 11722521 | Application firewall | Andrew J. Thomas, James Douglas Bean, Kenneth D. Ray, Daniel Stutz | 2023-08-08 |
| 11695647 | Implementing a machine-learning model to identify critical systems in an enterprise environment | — | 2023-07-04 |
| 11616811 | Tracking usage of corporate credentials | Andrew J. Thomas, James Douglas Bean, Kenneth D. Ray, Daniel Stutz | 2023-03-28 |
| 11288385 | Chain of custody for enterprise documents | Russell Humphries, Daniel Salvatore Schiappa, Kenneth D. Ray, Andrew J. Thomas | 2022-03-29 |
| 11258821 | Application firewall | Andrew J. Thomas, James Douglas Bean, Kenneth D. Ray, Daniel Stutz | 2022-02-22 |
| 11184391 | Server-client authentication with integrated status update | Andrew J. Thomas, Kenneth D. Ray | 2021-11-23 |
| 11165797 | Detecting endpoint compromise based on network usage history | Mark David Harris, Kenneth D. Ray, Andrew J. Thomas, Daniel Stutz | 2021-11-02 |
| 11102238 | Detecting triggering events for distributed denial of service attacks | Mark David Harris, Simon Neil Reed, Andrew J. Thomas, Kenneth D. Ray | 2021-08-24 |
| 10986109 | Local proxy detection | Fraser Howard, Andrew J. Thomas, Dmitri Samosseiko | 2021-04-20 |
| 9525551 | Randomly skewing secret values as a countermeasure to compromise | Marten Van Dijk, Ari Juels, Emily H. Shen | 2016-12-20 |
| 9305153 | User authentication | Lawrence N. Friedman | 2016-04-05 |
| 9240986 | Managing security and wireless signal detection | William Duane, Yedidya Dotan | 2016-01-19 |