| Attack monitoring service that selectively analyzes connection graphs for … |
2023-5-08 |
2023-8-31 |
|
| Large Scale Response and Generic Endpoint Command Invocation Mechanism |
2023-3-08 |
2023-7-27 |
|
| Lateral Movement Detection Using a Mixture of Online Anomaly Scoring Models |
2023-2-09 |
2023-6-15 |
|
| Repeated collections of vulnerability assessment data from remote machine |
2023-1-26 |
2023-6-08 |
|
| Multiple personality deception systems |
2023-1-25 |
2023-6-01 |
|
| Distributing Search Loads to Optimize Security Event Processing |
2023-1-19 |
2023-5-25 |
|
| Domain Name Permutation |
2023-1-17 |
2023-5-18 |
|
| Passive software identification for vulnerability management |
2022-11-28 |
2023-3-30 |
|
| Machine Learned Chart Recommendation System |
2022-11-10 |
2023-3-09 |
|
| Machined Learned Inference of Protocols from Banner Data |
2022-10-12 |
2023-2-02 |
|
| Recommendation Interface for Remediation Plans for Cyberattack Vulnerabilities |
2022-10-11 |
2023-2-02 |
|
| Search Expression Generation |
2022-9-19 |
2023-1-19 |
|
| Generating Training Data for Machine Learning Models |
2022-9-19 |
2023-1-19 |
|
| Configurable approximate search of character strings |
2022-9-08 |
2023-1-05 |
|
| Dynamic attack path selection during penetration testing |
2022-7-06 |
2022-11-10 |
|
| Secure Configuration of a Network Sensor on a Network Sensor Host |
2022-6-29 |
2023-3-02 |
|
| Routing Log-Based Information |
2022-5-24 |
2022-9-08 |
|
| Programmable framework for distributed computation of statistical functions … |
2022-5-24 |
2022-9-08 |
|
| Honeypot Network with Dynamically Updated Alert Modules for Detecting Anomalous … |
2022-5-20 |
2022-9-08 |
|
| Multi-stage scanning of computer devices from different geographic locations |
2022-4-26 |
2022-12-06 |
2022-12-06 |
| Self-learning data collection of machine characteristics |
2022-3-30 |
2023-1-03 |
2023-1-03 |
| Containing compromised credentials using deception systems |
2022-3-09 |
2022-6-23 |
|
| Optimizing role level identification for resource allocation |
2022-3-09 |
2022-6-23 |
|
| Determining insights in an electronic environment |
2022-2-17 |
2022-6-09 |
|
| Infrastructure as code pre-deployment compliance testing |
2022-2-09 |
2022-11-03 |
|
| Credential renewal continuity for application development |
2022-2-04 |
2022-5-19 |
|
| Anomalous asset detection based on open ports |
2022-2-02 |
2022-5-19 |
|
| Scanning unexposed web applications for vulnerabilities |
2021-12-08 |
2022-5-19 |
|
| Dynamically upgrading java runtime environments with running applications |
2021-12-08 |
2023-2-21 |
2023-2-21 |
| Machine scanning system with distributed credential storage |
2021-12-01 |
2023-8-15 |
2023-8-15 |
| Secure multiplexed routing |
2021-11-08 |
2022-2-24 |
|
| Vulnerability validation using lightweight offensive payloads |
2021-11-08 |
2022-2-24 |
|
| Statistical control rules for detecting anomalies in time series data |
2021-10-28 |
2023-7-04 |
2023-7-04 |
| File System Search Proxying |
2021-9-07 |
2021-12-23 |
|
| Cluster detection and elimination in security environments |
2021-8-24 |
2021-12-09 |
|
| Simplifying networking setup complexity for security agents |
2021-8-18 |
2022-12-06 |
2022-12-06 |
| Vulnerability assessment |
2021-8-02 |
2021-11-18 |
|
| Machine learned network vulnerability assessment |
2021-8-02 |
2023-6-27 |
2023-6-27 |
| Autonomous application of security measures to IoT devices |
2021-8-02 |
2023-7-18 |
2023-7-18 |
| Attack signature generation |
2021-7-23 |
2021-11-11 |
|
| Detection of outliers in text records |
2021-6-29 |
2021-10-21 |
|
| Network resource management devices methods and systems |
2021-6-10 |
2022-8-16 |
2022-8-16 |
| Agent-based throttling of command executions |
2021-6-09 |
2022-6-28 |
2022-6-28 |
| Data exfiltration detector |
2021-6-02 |
2021-9-16 |
|
| Prioritized queue management |
2021-6-01 |
2023-8-29 |
2023-8-29 |
| Behavior management of deception system fleets |
2021-3-24 |
2021-7-08 |
|
| Live state transition using deception systems |
2021-3-23 |
2022-11-15 |
2022-11-15 |
| Honeypot opaque credential recovery |
2021-3-18 |
2022-12-06 |
2022-12-06 |
| Dynamic management of deception systems |
2021-3-17 |
2021-7-08 |
|
| Security orchestration and automation using biometric data |
2021-3-16 |
2021-7-22 |
|
| Orchestrating security operations using bifurcated biometric data |
2021-3-16 |
2023-9-05 |
2023-9-05 |
| Monitoring scan attempts in a network |
2021-3-15 |
2021-9-16 |
|
| Honeypot asset cloning |
2021-3-04 |
2021-6-24 |
|
| Generating thread sensors for extracting side channel information from … |
2021-2-23 |
2023-6-27 |
2023-6-27 |
| Detecting anomalous network behavior |
2020-12-31 |
2022-6-28 |
2022-6-28 |
| Managing conflicts using conflict islands |
2020-11-13 |
2023-6-20 |
2023-6-20 |
| Virtual security appliances for eliciting attacks |
2020-10-29 |
2023-8-15 |
2023-8-15 |
| Network asset correlator for cybersecurity operations |
2020-10-21 |
2022-12-27 |
2022-12-27 |
| Controlled deployment of blended honeypot services |
2020-9-28 |
2023-7-11 |
2023-7-11 |
| Generating machine learning data in salient regions of a feature space |
2020-9-17 |
2022-11-22 |
2022-11-22 |
| Device classification for identifying anomolous activity |
2020-8-06 |
2023-3-14 |
2023-3-14 |
| Single whitelisted ingress endpoint on 1 and 2 way TLS connections |
2020-5-29 |
2022-4-05 |
2022-4-05 |
| Dynamic rate limiting for networked resources |
2020-4-30 |
2023-2-28 |
2023-2-28 |
| Alert management for partially modified log entries |
2020-4-27 |
2023-1-31 |
2023-1-31 |
| Detecting malicious actors |
2020-4-21 |
2021-6-15 |
2021-6-15 |
| Neutralizing malicious locators |
2020-2-11 |
2020-12-01 |
2020-12-01 |
| Exploitability risk model for assessing risk of cyberattacks |
2020-2-03 |
2022-10-11 |
2022-10-11 |
| Classifying locator generation kits |
2020-1-30 |
2022-4-19 |
2022-4-19 |
| Password semantic analysis pipeline |
2020-1-21 |
2022-12-27 |
2022-12-27 |
| Exposure detection by scan telemetry |
2019-12-20 |
2022-12-27 |
2022-12-27 |
| Identifying ephemeral computing assets using machine learning |
2019-12-20 |
2022-12-27 |
2022-12-27 |
| Honeytoken tracker |
2019-12-17 |
2021-7-06 |
2021-7-06 |
| Detecting malicious network activity using time series payload data |
2019-12-12 |
2021-1-26 |
2021-1-26 |
| Workflow trigger generation |
2019-11-21 |
2022-12-06 |
2022-12-06 |
| Incident detection and response using wireless access point data |
2019-10-03 |
2022-8-09 |
2022-8-09 |
| Detecting malicious processes based on process location |
2019-9-18 |
2022-6-07 |
2022-6-07 |
| Verifying asset identity |
2019-7-15 |
2021-4-27 |
2021-4-27 |
| Log parsing using language processing |
2019-6-27 |
2022-11-22 |
2022-11-22 |
| System and method for application software security and auditing |
2019-6-19 |
2021-4-27 |
2021-4-27 |
| Web shell classifier training |
2019-6-17 |
2022-6-07 |
2022-6-07 |
| Multi-baseline unsupervised security-incident and network behavioral anomaly … |
2019-1-31 |
2022-8-23 |
2022-8-23 |
| Stable network user account classifier |
2018-12-27 |
2020-7-02 |
|
| Profiling network entities and behavior |
2018-12-17 |
2020-6-18 |
|
| Profiling network entities and behavior |
2018-12-17 |
2023-9-05 |
2023-9-05 |
| Automating cluster interpretation in security environments |
2018-12-10 |
2023-2-07 |
2023-2-07 |
| Detecting anomalous network activity |
2018-11-28 |
2022-11-22 |
2022-11-22 |
| Efficient metric calculation with recursive data processing |
2018-11-28 |
2021-1-05 |
2021-1-05 |
| Apparatus and method for controlling driving of a vehicle |
2018-11-28 |
2020-3-19 |
|
| Methods and systems for providing recommendations to address security … |
2018-8-03 |
2020-1-28 |
2020-1-28 |
| Vulnerability inference |
2018-6-05 |
2020-8-11 |
2020-8-11 |
| Identifying malicious identifiers |
2016-6-09 |
2017-12-14 |
|
| Detection of code modification |
2015-10-30 |
2017-11-28 |
2017-11-28 |
| Domain age registration alert |
2015-7-22 |
2019-8-13 |
2019-8-13 |
| Preconfigured honey net |
2015-4-29 |
2016-11-03 |
|
| Honey user |
2015-4-01 |
2018-3-13 |
2018-3-13 |
| Lateral account mapping |
2015-2-26 |
2017-10-10 |
2017-10-10 |
| Methods and systems for passively detecting security levels in client devices |
2013-2-20 |
2014-5-15 |
|
| Controlling enterprise access by mobile devices |
2012-3-07 |
2017-7-11 |
2017-7-11 |
| Controlling enterprise access by mobile devices |
2012-3-07 |
2017-5-30 |
2017-5-30 |
| Controlling enterprise access by mobile devices |
2012-3-07 |
2013-9-12 |
|