| METHOD FOR GENERATING, SHARING AND ENFORCING NETWORK PROFILES FOR IoT DEVICES |
2023-2-02 |
2023-6-08 |
|
| Unified workload runtime protection |
2022-1-10 |
2023-7-13 |
|
| Methods and system for packet control and inspection in containers and meshed … |
2021-12-30 |
2022-4-21 |
|
| On-device protected DNS |
2021-8-31 |
2022-11-01 |
2022-11-01 |
| System and method to detect and prevent Phishing attacks |
2021-4-11 |
2021-7-29 |
|
| Systems and methods for the efficient detection of improperly redacted … |
2021-3-16 |
2022-9-22 |
|
| Method and system to determine device vulnerabilities by scanner analysis |
2021-1-26 |
2021-7-29 |
|
| Method For Detection Of Malicious Applications |
2020-10-27 |
2022-4-28 |
|
| System and method for performing automated security reviews |
2020-9-18 |
2022-3-24 |
|
| Methods and systems for identifying malware enabled by automatically generated … |
2020-6-09 |
2023-3-14 |
2023-3-14 |
| System and method for determining permission profiles for computer executable … |
2020-5-18 |
2020-11-19 |
|
| Method and system for detecting malicious or suspicious activity by baselining … |
2020-4-27 |
2021-10-28 |
|
| Method and system for detecting kernel corruption exploits |
2019-9-16 |
2020-1-09 |
|
| Method and system for modeling all operations and executions of an attack and … |
2019-9-15 |
2021-4-06 |
2021-4-06 |
| Web application security methods and systems |
2019-4-29 |
2019-10-31 |
|
| Method and system for detecting and classifying malware based on families |
2019-4-18 |
2020-10-22 |
|
| Method and system for reducing false positives in web application firewalls |
2019-2-28 |
2021-7-27 |
2021-7-27 |
| Method for performing tls/ssl inspection based on verified subject name |
2018-12-20 |
2020-6-25 |
|
| Method and system for cooperative inspection of encrypted sessions |
2018-11-29 |
2020-6-04 |
|
| Cloud security assessment system using near-natural language compliance rules |
2018-11-19 |
2019-6-20 |
|
| Method and system for detecting and remediating polymorphic attacks across an … |
2018-11-06 |
2019-3-07 |
|
| Network host provided security system for local networks |
2017-11-22 |
2018-6-07 |
|
| Method to identify users behind a shared vpn tunnel |
2017-10-19 |
2019-4-25 |
|
| Method to avoid inspection bypass due to dns poisoning or http host header … |
2017-8-31 |
2019-2-28 |
|
| Elastic policy tuning based upon crowd and cyber threat intelligence |
2017-5-25 |
2018-11-29 |
|
| Method and system for destroying browser-based memory corruption … |
2017-5-15 |
2018-8-14 |
2018-8-14 |
| Key exchange and mutual authentication in low performance devices |
2017-3-30 |
2019-3-26 |
2019-3-26 |
| Account take over prevention |
2017-3-28 |
2020-5-05 |
2020-5-05 |
| Method and system for real time telemonitoring of cardiac activity |
2017-2-20 |
2019-1-02 |
|
| Methods, circuits, apparatus, systems and associated software applications for … |
2016-12-14 |
2017-6-08 |
|
| System and method for determining summary events of an attack |
2016-12-08 |
2017-6-15 |
|
| Method and system for identifying uncorrelated suspicious events during an … |
2016-10-13 |
2019-10-29 |
2019-10-29 |
| Method and system for injecting javascript into a web page |
2016-9-22 |
2020-7-28 |
2020-7-28 |
| Push Based Encryption |
2016-6-30 |
2018-1-04 |
|
| Server and gateway for filtering push notifications according to user … |
2016-6-21 |
2016-10-13 |
|
| Method and system for creating and receiving neutralized data items |
2016-6-09 |
2019-8-13 |
2019-8-13 |
| On-demand authorization of access to protected resources |
2016-5-26 |
2017-5-25 |
|
| Method and system for mitigating the effects of ransomware |
2016-5-03 |
2018-2-06 |
2018-2-06 |
| Anti-malware detection and removal systems and methods |
2016-1-20 |
2019-3-12 |
2019-3-12 |
| Method and system for transparently manipulating downloaded files |
2015-12-28 |
2020-2-18 |
2020-2-18 |
| Method and System for Determining Initial Execution of an Attack |
2015-12-09 |
2017-6-15 |
|
| Web injection protection method and system |
2015-10-13 |
2017-4-13 |
|
| Automatic content inspection system for exploit detection |
2015-8-27 |
2017-11-28 |
2017-11-28 |
| Proxy for mitigation of attacks exploiting misconfigured or compromised web … |
2015-6-28 |
2016-12-29 |
|
| Protection of communication on a vehicular network via a remote security … |
2015-6-15 |
2017-6-20 |
2017-6-20 |
| Detection of potentially malicious web content by emulating user behavior and … |
2015-5-10 |
2016-11-10 |
|
| Method and system for modifying HTTP request headers without terminating the … |
2015-4-01 |
2018-8-21 |
2018-8-21 |
| Method for protection of automotive components in intravehicle communication … |
2015-3-31 |
2017-5-23 |
2017-5-23 |
| Method for mitigation of unauthorized data transfer over domain name service ( … |
2015-2-26 |
2016-9-01 |
|
| Method for file scrubbing in a security gateway for threat prevention |
2014-12-29 |
2016-6-30 |
|
| Optimization of data locks for improved write lock performance and CPU cache … |
2014-10-07 |
2017-2-14 |
2017-2-14 |
| Duplicate-free item creation using EWS by a single client |
2014-9-30 |
2018-4-03 |
2018-4-03 |
| Predictive synchronization for clustered devices |
2014-6-05 |
2014-11-27 |
|
| EWS Optimized Paged Item Loading |
2014-2-06 |
2015-8-06 |
|
| Mobile communicator network routing decision system and method |
2013-10-16 |
2015-4-16 |
|
| Securing an Encryption Key of a User Device While Preserving Simplified User … |
2013-6-27 |
2015-1-01 |
|
| Method for synchronized bgp and vrrp failover of a network device in a network |
2013-6-10 |
2014-12-11 |
|
| Method of defending a computer from malware |
2013-5-26 |
2014-11-27 |
|
| Filtering of applications for access to an enterprise network |
2013-5-26 |
2015-12-08 |
2015-12-08 |
| Location-aware rate-limiting method for mitigation of denial-of-service attacks |
2013-5-23 |
2014-11-27 |
|
| Simultaneous screening of untrusted digital files |
2013-2-17 |
2014-8-21 |
|
| Natural language processing interface for network security administration |
2012-12-06 |
2014-6-12 |
|
| Methods for detecting malicious programs using a multilayered heuristics … |
2012-11-26 |
2013-5-09 |
|
| Penalty box for mitigation of denial-of-service attacks |
2012-11-21 |
2014-5-22 |
|
| Security device used together with commodity |
2012-10-19 |
2013-9-18 |
2013-9-18 |
| Approach for managing access to messages using encryption key management … |
2012-7-19 |
2013-8-20 |
2013-8-20 |
| Reducing false positives in data validation using statistical heuristics |
2012-5-10 |
2015-2-17 |
2015-2-17 |
| Network security smart load balancing |
2012-3-28 |
2014-5-13 |
2014-5-13 |
| Methods for inspecting security certificates by network security devices to … |
2012-3-04 |
2014-9-30 |
2014-9-30 |
| Detection of account hijacking in a social network |
2011-5-18 |
2012-11-22 |
|
| Security assembly for attachment to an object |
2011-4-29 |
2011-11-03 |
|
| Methods for intelligent NIC bonding and load-balancing |
2011-3-31 |
2014-2-04 |
2014-2-04 |
| System used for displaying a plurality of commodities |
2011-3-25 |
2013-7-10 |
2013-7-10 |
| Safety device |
2011-3-10 |
2013-10-30 |
2013-10-30 |
| System, method, and apparatus for triggering alarm |
2010-9-28 |
2013-8-14 |
|
| Scripting language processing engine in data leak prevention application |
2010-7-26 |
2012-1-26 |
|
| Methods and systems for using a vault server in conjunction with a client-side … |
2009-10-20 |
2013-12-11 |
|
| Methods for effective network-security inspection in virtualized environments |
2009-7-23 |
2010-10-21 |
|
| Methods for document-to-template matching for data-leak prevention |
2009-4-02 |
2012-8-28 |
2012-8-28 |
| Methods and device for enforcing network access control utilizing secure packet … |
2009-3-19 |
2009-9-30 |
|
| Methods and devices for packet tagging using ip indexing via dynamic-length … |
2009-1-22 |
2010-7-22 |
|
| Methods for user profiling for detecting insider threats based on internet … |
2008-12-25 |
2010-7-01 |
|
| Methods for automatic categorization of internal and external communication for … |
2008-12-22 |
2011-11-01 |
2011-11-01 |
| Methods for encrypted-traffic url filtering using address-mapping interception |
2008-12-03 |
2010-6-03 |
|
| Methods for protecting against cookie-poisoning attacks in networked- … |
2008-10-28 |
2012-5-08 |
2012-5-08 |
| System and methods providing secure workspace sessions |
2008-7-17 |
2009-1-29 |
|
| Methods for hooking applications to monitor and prevent execution of security- … |
2008-7-02 |
2010-1-07 |
|
| Methods for automatically generating natural-language news items from log files … |
2008-5-20 |
2009-11-26 |
|
| Devices and methods for providing network access control utilizing traffic- … |
2008-5-04 |
2009-11-05 |
|
| Syslog parser |
2007-10-22 |
2016-11-01 |
2016-11-01 |
| Network Security Smart Load Balancing Using A Multiple Processor Device |
2007-3-29 |
2007-8-02 |
|
| Selective passive address resolution learning |
2006-12-15 |
2008-6-19 |
|
| Address resolution request mirroring |
2006-12-15 |
2008-6-19 |
|
| Application Cluster In Security Gateway For High Availability And Load Sharing |
2006-7-11 |
2008-1-17 |
|
| Universal worm catcher |
2006-4-28 |
2007-4-19 |
|
| System and Methodology Protecting Against Key Logger Spyware |
2006-3-30 |
2007-10-11 |
|
| Scan by data direction |
2006-2-24 |
2006-9-07 |
|
| System and Methodology Providing Secure Workspace Environment |
2005-10-14 |
2007-5-03 |
|
| Intrusion management system and method for providing dynamically scaled … |
2005-7-12 |
2006-2-16 |
|
| Component selector |
2005-6-27 |
2006-12-28 |
|