Issued Patents All Time
Showing 1–11 of 11 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12153948 | Distributed zero trust network access | Biju Ramachandra Kaimal, Andrew J. Thomas, Venkata Suresh Reddy Obulareddy, Mayur Premi, Ramesh Kamath +2 more | 2024-11-26 |
| 10841339 | Normalized indications of compromise | Kenneth D. Ray, Andrew J. Thomas, Dmitri Samosseiko, Mark David Harris | 2020-11-17 |
| 10778725 | Using indications of compromise for reputation based network security | Kenneth D. Ray, Simon Neil Reed, Mark David Harris, Neil Robert Tyndale Watkiss, Andrew J. Thomas +1 more | 2020-09-15 |
| 10558800 | Labeling objects on an endpoint for encryption management | Kenneth D. Ray, Daniel Salvatore Schiappa, Simon Neil Reed, Mark David Harris, Neil Robert Tyndale Watkiss +4 more | 2020-02-11 |
| 10382459 | Threat detection using a time-based cache of reputation information on an enterprise endpoint | Mark David Harris, Simon Neil Reed, Kenneth D. Ray, Neil Robert Tyndale Watkiss, Andrew J. Thomas | 2019-08-13 |
| 10225286 | Using indications of compromise for reputation based network security | Kenneth D. Ray, Simon Neil Reed, Mark David Harris, Neil Robert Tyndale Watkiss, Andrew J. Thomas +1 more | 2019-03-05 |
| 9992228 | Using indications of compromise for reputation based network security | Kenneth D. Ray, Simon Neil Reed, Mark David Harris, Neil Robert Tyndale Watkiss, Andrew J. Thomas +1 more | 2018-06-05 |
| 9965627 | Labeling objects on an endpoint for encryption management | Kenneth D. Ray, Daniel Salvatore Schiappa, Simon Neil Reed, Mark David Harris, Neil Robert Tyndale Watkiss +4 more | 2018-05-08 |
| 9967264 | Threat detection using a time-based cache of reputation information on an enterprise endpoint | Mark David Harris, Simon Neil Reed, Kenneth D. Ray, Neil Robert Tyndale Watkiss, Andrew J. Thomas | 2018-05-08 |
| 9967283 | Normalized indications of compromise | Kenneth D. Ray, Andrew J. Thomas, Dmitri Samosseiko, Mark David Harris | 2018-05-08 |
| 8090852 | Managing use of proxies to access restricted network locations | Alexander Ianchici, Cory Michael Roy | 2012-01-03 |