Issued Patents All Time
Showing 1–18 of 18 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12363167 | Deduplication of endpoint images | Jonathan Francis Caine, Timothy Rayment | 2025-07-15 |
| 12261824 | Firewall techniques for colored objects on endpoints | Andrew J. Thomas, Daniel Salvatore Schiappa, Kenneth D. Ray | 2025-03-25 |
| 12260208 | Pausing automatic software updates of virtual machines | Jonathan Francis Caine, Timothy Rayment | 2025-03-25 |
| 11140130 | Firewall techniques for colored objects on endpoints | Andrew J. Thomas, Daniel Salvatore Schiappa, Kenneth D. Ray | 2021-10-05 |
| 10951642 | Context-dependent timeout for remote security services | Emile Marcus Kenning, Mark David Harris | 2021-03-16 |
| 10778725 | Using indications of compromise for reputation based network security | Kenneth D. Ray, Simon Neil Reed, Mark David Harris, Andrew J. Thomas, Robert W. Cook +1 more | 2020-09-15 |
| 10728269 | Method for conditionally hooking endpoint processes with a security agent | Mark David Harris | 2020-07-28 |
| 10673902 | Labeling computing objects for improved threat detection | Andrew J. Thomas, Mark David Harris, Simon Neil Reed, Kenneth D. Ray | 2020-06-02 |
| 10594717 | Context-dependent timeout for remote security services | Emile Marcus Kenning, Mark David Harris | 2020-03-17 |
| 10558800 | Labeling objects on an endpoint for encryption management | Kenneth D. Ray, Daniel Salvatore Schiappa, Simon Neil Reed, Mark David Harris, Andrew J. Thomas +4 more | 2020-02-11 |
| 10382459 | Threat detection using a time-based cache of reputation information on an enterprise endpoint | Mark David Harris, Simon Neil Reed, Kenneth D. Ray, Andrew J. Thomas, Robert W. Cook | 2019-08-13 |
| 10225286 | Using indications of compromise for reputation based network security | Kenneth D. Ray, Simon Neil Reed, Mark David Harris, Andrew J. Thomas, Robert W. Cook +1 more | 2019-03-05 |
| 10122687 | Firewall techniques for colored objects on endpoints | Andrew J. Thomas, Daniel Salvatore Schiappa, Kenneth D. Ray | 2018-11-06 |
| 9992228 | Using indications of compromise for reputation based network security | Kenneth D. Ray, Simon Neil Reed, Mark David Harris, Andrew J. Thomas, Robert W. Cook +1 more | 2018-06-05 |
| 9967264 | Threat detection using a time-based cache of reputation information on an enterprise endpoint | Mark David Harris, Simon Neil Reed, Kenneth D. Ray, Andrew J. Thomas, Robert W. Cook | 2018-05-08 |
| 9967282 | Labeling computing objects for improved threat detection | Andrew J. Thomas, Mark David Harris, Simon Neil Reed, Kenneth D. Ray | 2018-05-08 |
| 9965627 | Labeling objects on an endpoint for encryption management | Kenneth D. Ray, Daniel Salvatore Schiappa, Simon Neil Reed, Mark David Harris, Andrew J. Thomas +4 more | 2018-05-08 |
| 9571512 | Threat detection using endpoint variance | Kenneth D. Ray, Mark David Harris, Simon Neil Reed, Andrew J. Thomas | 2017-02-14 |