| Computer-implemented systems and methods for application identification and … |
2023-3-09 |
2023-7-06 |
|
| Recovery of state, configuration, and content for virtualized instances |
2023-2-27 |
2023-6-29 |
|
| Native remote access to target resources and secretless connections |
2022-12-21 |
2023-4-20 |
|
| Discovering and remediating hidden secrets in code files |
2022-12-09 |
2023-4-13 |
|
| Static and dynamic correlation of software development pipeline events |
2022-11-10 |
2023-7-04 |
2023-7-04 |
| Securing development and operations pipelines |
2022-9-30 |
2023-9-05 |
2023-9-05 |
| Computer-implemented systems and methods for application identification and … |
2022-9-15 |
2023-4-05 |
|
| Authentication credential with embedded authentication information |
2022-5-23 |
2022-9-08 |
|
| Agent-based detection of fuzzing activity associated with a target program |
2022-5-20 |
2023-4-04 |
2023-4-04 |
| Analyzing scripts to create and enforce security policies in dynamic … |
2022-5-11 |
2023-3-21 |
2023-3-21 |
| Systems and methods for monitoring secure web sessions |
2022-5-02 |
2022-6-29 |
|
| Systems and methods for monitoring secure web sessions |
2022-5-02 |
2023-5-04 |
|
| Static and dynamic correlation of software development pipeline events |
2022-4-28 |
2022-11-15 |
2022-11-15 |
| Analyzing and addressing security threats in network resources |
2022-4-20 |
2022-8-04 |
|
| Mitigation of privilege escalation |
2022-4-05 |
2023-5-30 |
2023-5-30 |
| Deterministic cryptography deidentification with granular data destruction |
2022-2-17 |
2023-8-17 |
|
| Protections against security vulnerabilities associated with temporary access … |
2022-2-16 |
2023-8-01 |
2023-8-01 |
| Identity-based security layer for peripheral computing devices |
2022-1-25 |
2023-8-29 |
2023-8-29 |
| Centralized security analysis and management of source code in network … |
2022-1-03 |
2022-4-28 |
|
| Orchestration and generation of minimal surface optimized unikernels |
2021-12-21 |
2023-6-22 |
|
| Customizable and dynamically mutable operating systems |
2021-12-21 |
2023-6-22 |
|
| Systems and methods for securing virtualized execution instances |
2021-12-20 |
2022-6-16 |
|
| Detecting and preventing unauthorized credential change |
2021-11-24 |
2022-3-17 |
|
| Developing least-privilege permission sets based on global optimization |
2021-10-27 |
2022-6-23 |
|
| Computer-implemented systems and methods for application identification and … |
2021-9-30 |
2023-3-30 |
|
| Improving network security through real-time analysis of character similarities |
2021-9-28 |
2023-6-27 |
2023-6-27 |
| Automatic least-privilege access and control for target resources |
2021-9-07 |
2021-12-30 |
|
| Coordinated management of cryptographic keys for communication with peripheral … |
2021-9-02 |
2022-3-09 |
|
| Verification code injection at build time |
2021-8-16 |
2022-8-09 |
2022-8-09 |
| Decentralized management of data access and verification using data management … |
2021-8-04 |
2022-2-23 |
|
| Native remote access to target resources using secretless connections |
2021-7-20 |
2022-2-23 |
|
| End-to-end secure lifecycle of secrets with minimal footprint |
2021-7-14 |
2022-3-08 |
2022-3-08 |
| Detection of security risks based on secretless connection data |
2021-7-06 |
2022-5-19 |
|
| Recovery of state, configuration, and content for virtualized instances |
2021-6-07 |
2023-3-21 |
2023-3-21 |
| Distributed directory caching techniques for secure and efficient resource … |
2021-5-07 |
2021-12-30 |
|
| Risk assessment for network access control through data analytics |
2021-4-28 |
2021-9-02 |
|
| Coordinated management of cryptographic keys for communication with peripheral … |
2021-3-31 |
2022-2-22 |
2022-2-22 |
| Dynamically generating multi-factor entity risk assessments within virtualized … |
2021-3-11 |
2021-7-01 |
|
| Security protection against threats to network identity providers |
2021-2-25 |
2021-12-09 |
|
| Developing least-privilege permission sets based on global optimization |
2020-12-22 |
2021-11-16 |
2021-11-16 |
| Method and Apparatus for Network Fraud Detection and Remediation Through … |
2020-12-01 |
2021-3-18 |
|
| Secure remote access based on inspection and validation of remote access … |
2020-11-25 |
2022-2-22 |
2022-2-22 |
| Securing privileged virtualized execution instances |
2020-11-17 |
2021-3-11 |
|
| Understanding and mediating among diversely structured operational policies |
2020-10-27 |
2022-3-01 |
2022-3-01 |
| Seamless resource consumption with efficient caching providing reduced lag time |
2020-10-14 |
2021-5-04 |
2021-5-04 |
| Analyzing diversely structured operational policies |
2020-10-14 |
2021-4-28 |
|
| Decentralized management of data access and verification using data management … |
2020-9-10 |
2021-2-23 |
2021-2-23 |
| Decentralized management of data access and verification using data management … |
2020-9-10 |
2021-5-18 |
2021-5-18 |
| Verification of client identities based on non-distributed data |
2020-8-04 |
2021-4-20 |
2021-4-20 |
| Multidimensional vectors for analyzing and visually displaying identity … |
2020-7-23 |
2020-12-29 |
2020-12-29 |
| Agentless management and control of network sessions |
2020-7-08 |
2021-1-21 |
|
| Measuring and comparing security efficiency and importance in virtualized … |
2020-6-15 |
2021-10-05 |
2021-10-05 |
| Automatic detection and protection against file system privilege escalation and … |
2020-6-04 |
2021-3-30 |
2021-3-30 |
| Secure provisioning and validation of access tokens in network environments |
2020-5-26 |
2020-7-29 |
|
| Variable encryption techniques for secure and efficient searchable encryption |
2020-4-30 |
2020-7-22 |
|
| Customizing operating system kernels with secure kernel modules |
2020-4-24 |
2023-7-12 |
2023-7-12 |
| Client microservice for secure and efficient searchable encryption |
2020-4-20 |
2021-1-05 |
2021-1-05 |
| Variable encryption techniques for secure and efficient searchable encryption |
2020-4-20 |
2021-5-04 |
2021-5-04 |
| Secure, efficient, and flexible searchable-encryption techniques |
2020-4-20 |
2022-2-01 |
2022-2-01 |
| Efficient and secure provisioning and updating of identity credentials |
2020-4-13 |
2022-5-10 |
2022-5-10 |
| On-demand and proactive detection of application misconfiguration security … |
2020-4-07 |
2021-10-07 |
|
| Secure provisioning and validation of access tokens in network environments |
2020-4-07 |
2021-6-08 |
2021-6-08 |
| Enhancing secure client experience through selective encryption of cookies |
2020-4-03 |
2021-1-19 |
2021-1-19 |
| Adaptive response generation on an endpoint |
2020-4-02 |
2020-7-23 |
|
| Security risk assessment and control for code |
2020-3-20 |
2020-11-19 |
|
| Discovering and evaluating privileged entities in a network environment |
2020-3-09 |
2020-8-04 |
2020-8-04 |
| Detecting and protecting against security vulnerabilities in dynamic linkers … |
2020-3-06 |
2020-12-08 |
2020-12-08 |
| Centralized security assessments of scripts in network environments |
2020-2-27 |
2020-9-16 |
|
| Understanding and mediating among diversely structured operational policies |
2020-2-26 |
2022-7-19 |
2022-7-19 |
| Analyzing diversely structured operational policies |
2020-2-26 |
2020-8-18 |
2020-8-18 |
| Identifying computing processes on automation servers |
2020-2-11 |
2020-7-01 |
|
| Dynamic display capture to verify encoded visual codes and network address … |
2020-2-05 |
2020-8-04 |
2020-8-04 |
| Dynamic visualization of scripts based on centralized security assessments |
2020-1-28 |
2022-1-25 |
2022-1-25 |
| Analyzing and addressing least-privilege security threats on a composite basis |
2019-12-18 |
2022-5-03 |
2022-5-03 |
| Multi-context encoding and secure communication of data |
2019-12-03 |
2020-6-03 |
|
| Detecting and actively resolving security policy conflicts |
2019-11-27 |
2020-3-24 |
2020-3-24 |
| Secure authentication through visual codes containing unique metadata |
2019-11-11 |
2021-4-06 |
2021-4-06 |
| Automatic least-privilege access and control for target resources |
2019-11-05 |
2021-9-21 |
2021-9-21 |
| Manipulation and secure communication of encoded visual representations of data |
2019-10-30 |
2020-4-28 |
2020-4-28 |
| Multi-context encoding and secure communication of data |
2019-10-30 |
2020-11-17 |
2020-11-17 |
| Identity verification based on electronic file fingerprinting data |
2019-10-15 |
2021-1-28 |
|
| Monitoring and controlling risk compliance in network environments |
2019-10-07 |
2020-8-25 |
2020-8-25 |
| Application control |
2019-10-01 |
2021-2-23 |
2021-2-23 |
| Multi-factor authentication for applications and virtual instance identities |
2019-9-09 |
2020-4-14 |
2020-4-14 |
| Just-in-time and secure activation of software |
2019-8-29 |
2020-3-03 |
2020-3-03 |
| Discovering and controlling sensitive data available in temporary access memory |
2019-8-19 |
2020-8-18 |
2020-8-18 |
| Identification and control of suspicious connected identities and activities |
2019-8-14 |
2021-2-18 |
|
| Systems and methods for dynamically enrolling virtualized execution instances … |
2019-6-25 |
2020-8-04 |
2020-8-04 |
| Authentication based on unique encoded codes |
2019-6-03 |
2020-6-03 |
|
| Securing privileged virtualized execution instances |
2019-5-31 |
2020-6-03 |
|
| Secure transmission of data to systems using scannable codes |
2019-5-31 |
2020-11-18 |
|
| Adaptive and dynamic access control techniques for securely communicating … |
2019-5-29 |
2020-2-13 |
|
| Dynamic and secure coupling between auxiliary devices and endpoint resources |
2019-5-29 |
2020-5-12 |
2020-5-12 |
| Investigating and securing communications with applications having unknown … |
2019-5-20 |
2020-10-27 |
2020-10-27 |
| Secure generation and verification of machine-readable visual codes |
2019-5-13 |
2021-4-06 |
2021-4-06 |
| Secure and reconstructible distribution of data among network resources |
2019-5-01 |
2020-2-04 |
2020-2-04 |
| Secure authentication |
2019-4-02 |
2020-10-21 |
2020-10-21 |
| Dynamic authorization of requested actions using adaptive context-based … |
2019-3-27 |
2021-7-07 |
2021-7-07 |
| Secure offline caching and provisioning of secrets |
2019-3-11 |
2020-2-13 |
|
| Predicting and addressing harmful or sensitive network activity |
2019-2-27 |
2019-10-15 |
2019-10-15 |