| 12361358 |
Enterprise network threat detection |
Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas |
2025-07-15 |
| 12354043 |
Computer augmented threat evaluation |
Joshua Daniel Saxe, Andrew J. Thomas, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy |
2025-07-08 |
| 12153674 |
Tracking malware root causes with an event graph |
Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith |
2024-11-26 |
| 12093383 |
Tracking malware root causes with an event graph |
Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith |
2024-09-17 |
| 12079757 |
Endpoint with remotely programmable data recorder |
Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas |
2024-09-03 |
| 12052272 |
Forensic analysis of computing activity |
Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Kenneth D. Ray |
2024-07-30 |
| 11928631 |
Threat detection with business impact scoring |
Andrew J. Thomas |
2024-03-12 |
| 11836664 |
Enterprise network threat detection |
Karl Ackerman, Mark Russo, Andrew J. Thomas |
2023-12-05 |
| 11755974 |
Computer augmented threat evaluation |
Joshua Daniel Saxe, Andrew J. Thomas, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy |
2023-09-12 |
| 11741222 |
Sandbox environment for document preview and analysis |
Ross McKerchar, John Edward Tyrone Shaw, Andrew J. Thomas, Kenneth D. Ray, Daniel Salvatore Schiappa |
2023-08-29 |
| 11727333 |
Endpoint with remotely programmable data recorder |
Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas |
2023-08-15 |
| 11720844 |
Enterprise network threat detection |
Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas |
2023-08-08 |
| 11716351 |
Intrusion detection with honeypot keys |
Harald Schütz, Andreas Berger, Mark David Harris, Kenneth D. Ray |
2023-08-01 |
| 11552962 |
Computer assisted identification of intermediate level threats |
Joshua Daniel Saxe, Andrew J. Thomas, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy |
2023-01-10 |
| 11550909 |
Tracking malicious software movement with an event graph |
Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith |
2023-01-10 |
| 11297073 |
Forensic query of local event streams in an enterprise network |
Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas |
2022-04-05 |
| 11288385 |
Chain of custody for enterprise documents |
Karl Ackerman, Daniel Salvatore Schiappa, Kenneth D. Ray, Andrew J. Thomas |
2022-03-29 |
| 11095669 |
Forensic analysis of computing activity |
Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Kenneth D. Ray |
2021-08-17 |
| 11089056 |
Intrusion detection with honeypot keys |
Harald Schütz, Andreas Berger, Mark David Harris, Kenneth D. Ray |
2021-08-10 |
| 10979449 |
Key throttling to mitigate unauthorized file access |
Kenneth D. Ray, Anthony John Merry, Harald Schütz |
2021-04-13 |
| 10972485 |
Enterprise network threat detection |
Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas |
2021-04-06 |
| 10938839 |
Threat detection with business impact scoring |
Andrew J. Thomas |
2021-03-02 |
| 10938838 |
Computer augmented threat evaluation |
Joshua Daniel Saxe, Andrew J. Thomas, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy |
2021-03-02 |
| 10896254 |
Sandbox environment for document preview and analysis |
Ross McKerchar, John Edward Tyrone Shaw, Andrew J. Thomas, Kenneth D. Ray, Daniel Salvatore Schiappa |
2021-01-19 |
| 10834061 |
Perimeter enforcement of encryption rules |
Gordon Sullivan, Kenneth D. Ray, Anthony John Merry, Harald Schütz, Andreas Berger |
2020-11-10 |