Latest Patents

Patents imply intellectual property and it has a $ value that can be associated depending on the field and type of patent that is allocated. Patents also increase the enterprise value of the company and help prevent copy-cats from copying the idea without having royalt payments or licencing deals. We like it when companies get patents awarded!. To protect IP companies aggressively file provisional patents even before they have a working product. The below table provides a way to look at what has been done by companies and use this as a factor to make investment decisions.

     
Title Filing Date Publication Date Grant Date
Attack monitoring service that selectively analyzes connection graphs for … 2023-5-08 2023-8-31
Large Scale Response and Generic Endpoint Command Invocation Mechanism 2023-3-08 2023-7-27
Lateral Movement Detection Using a Mixture of Online Anomaly Scoring Models 2023-2-09 2023-6-15
Repeated collections of vulnerability assessment data from remote machine 2023-1-26 2023-6-08
Multiple personality deception systems 2023-1-25 2023-6-01
Distributing Search Loads to Optimize Security Event Processing 2023-1-19 2023-5-25
Domain Name Permutation 2023-1-17 2023-5-18
Passive software identification for vulnerability management 2022-11-28 2023-3-30
Machine Learned Chart Recommendation System 2022-11-10 2023-3-09
Machined Learned Inference of Protocols from Banner Data 2022-10-12 2023-2-02
Recommendation Interface for Remediation Plans for Cyberattack Vulnerabilities 2022-10-11 2023-2-02
Search Expression Generation 2022-9-19 2023-1-19
Generating Training Data for Machine Learning Models 2022-9-19 2023-1-19
Configurable approximate search of character strings 2022-9-08 2023-1-05
Dynamic attack path selection during penetration testing 2022-7-06 2022-11-10
Secure Configuration of a Network Sensor on a Network Sensor Host 2022-6-29 2023-3-02
Routing Log-Based Information 2022-5-24 2022-9-08
Programmable framework for distributed computation of statistical functions … 2022-5-24 2022-9-08
Honeypot Network with Dynamically Updated Alert Modules for Detecting Anomalous … 2022-5-20 2022-9-08
Multi-stage scanning of computer devices from different geographic locations 2022-4-26 2022-12-06 2022-12-06
Self-learning data collection of machine characteristics 2022-3-30 2023-1-03 2023-1-03
Containing compromised credentials using deception systems 2022-3-09 2022-6-23
Optimizing role level identification for resource allocation 2022-3-09 2022-6-23
Determining insights in an electronic environment 2022-2-17 2022-6-09
Infrastructure as code pre-deployment compliance testing 2022-2-09 2022-11-03
Credential renewal continuity for application development 2022-2-04 2022-5-19
Anomalous asset detection based on open ports 2022-2-02 2022-5-19
Scanning unexposed web applications for vulnerabilities 2021-12-08 2022-5-19
Dynamically upgrading java runtime environments with running applications 2021-12-08 2023-2-21 2023-2-21
Machine scanning system with distributed credential storage 2021-12-01 2023-8-15 2023-8-15
Secure multiplexed routing 2021-11-08 2022-2-24
Vulnerability validation using lightweight offensive payloads 2021-11-08 2022-2-24
Statistical control rules for detecting anomalies in time series data 2021-10-28 2023-7-04 2023-7-04
File System Search Proxying 2021-9-07 2021-12-23
Cluster detection and elimination in security environments 2021-8-24 2021-12-09
Simplifying networking setup complexity for security agents 2021-8-18 2022-12-06 2022-12-06
Vulnerability assessment 2021-8-02 2021-11-18
Machine learned network vulnerability assessment 2021-8-02 2023-6-27 2023-6-27
Autonomous application of security measures to IoT devices 2021-8-02 2023-7-18 2023-7-18
Attack signature generation 2021-7-23 2021-11-11
Detection of outliers in text records 2021-6-29 2021-10-21
Network resource management devices methods and systems 2021-6-10 2022-8-16 2022-8-16
Agent-based throttling of command executions 2021-6-09 2022-6-28 2022-6-28
Data exfiltration detector 2021-6-02 2021-9-16
Prioritized queue management 2021-6-01 2023-8-29 2023-8-29
Behavior management of deception system fleets 2021-3-24 2021-7-08
Live state transition using deception systems 2021-3-23 2022-11-15 2022-11-15
Honeypot opaque credential recovery 2021-3-18 2022-12-06 2022-12-06
Dynamic management of deception systems 2021-3-17 2021-7-08
Security orchestration and automation using biometric data 2021-3-16 2021-7-22
Orchestrating security operations using bifurcated biometric data 2021-3-16 2023-9-05 2023-9-05
Monitoring scan attempts in a network 2021-3-15 2021-9-16
Honeypot asset cloning 2021-3-04 2021-6-24
Generating thread sensors for extracting side channel information from … 2021-2-23 2023-6-27 2023-6-27
Detecting anomalous network behavior 2020-12-31 2022-6-28 2022-6-28
Managing conflicts using conflict islands 2020-11-13 2023-6-20 2023-6-20
Virtual security appliances for eliciting attacks 2020-10-29 2023-8-15 2023-8-15
Network asset correlator for cybersecurity operations 2020-10-21 2022-12-27 2022-12-27
Controlled deployment of blended honeypot services 2020-9-28 2023-7-11 2023-7-11
Generating machine learning data in salient regions of a feature space 2020-9-17 2022-11-22 2022-11-22
Device classification for identifying anomolous activity 2020-8-06 2023-3-14 2023-3-14
Single whitelisted ingress endpoint on 1 and 2 way TLS connections 2020-5-29 2022-4-05 2022-4-05
Dynamic rate limiting for networked resources 2020-4-30 2023-2-28 2023-2-28
Alert management for partially modified log entries 2020-4-27 2023-1-31 2023-1-31
Detecting malicious actors 2020-4-21 2021-6-15 2021-6-15
Neutralizing malicious locators 2020-2-11 2020-12-01 2020-12-01
Exploitability risk model for assessing risk of cyberattacks 2020-2-03 2022-10-11 2022-10-11
Classifying locator generation kits 2020-1-30 2022-4-19 2022-4-19
Password semantic analysis pipeline 2020-1-21 2022-12-27 2022-12-27
Exposure detection by scan telemetry 2019-12-20 2022-12-27 2022-12-27
Identifying ephemeral computing assets using machine learning 2019-12-20 2022-12-27 2022-12-27
Honeytoken tracker 2019-12-17 2021-7-06 2021-7-06
Detecting malicious network activity using time series payload data 2019-12-12 2021-1-26 2021-1-26
Workflow trigger generation 2019-11-21 2022-12-06 2022-12-06
Incident detection and response using wireless access point data 2019-10-03 2022-8-09 2022-8-09
Detecting malicious processes based on process location 2019-9-18 2022-6-07 2022-6-07
Verifying asset identity 2019-7-15 2021-4-27 2021-4-27
Log parsing using language processing 2019-6-27 2022-11-22 2022-11-22
System and method for application software security and auditing 2019-6-19 2021-4-27 2021-4-27
Web shell classifier training 2019-6-17 2022-6-07 2022-6-07
Multi-baseline unsupervised security-incident and network behavioral anomaly … 2019-1-31 2022-8-23 2022-8-23
Stable network user account classifier 2018-12-27 2020-7-02
Profiling network entities and behavior 2018-12-17 2020-6-18
Profiling network entities and behavior 2018-12-17 2023-9-05 2023-9-05
Automating cluster interpretation in security environments 2018-12-10 2023-2-07 2023-2-07
Detecting anomalous network activity 2018-11-28 2022-11-22 2022-11-22
Efficient metric calculation with recursive data processing 2018-11-28 2021-1-05 2021-1-05
Apparatus and method for controlling driving of a vehicle 2018-11-28 2020-3-19
Methods and systems for providing recommendations to address security … 2018-8-03 2020-1-28 2020-1-28
Vulnerability inference 2018-6-05 2020-8-11 2020-8-11
Identifying malicious identifiers 2016-6-09 2017-12-14
Detection of code modification 2015-10-30 2017-11-28 2017-11-28
Domain age registration alert 2015-7-22 2019-8-13 2019-8-13
Preconfigured honey net 2015-4-29 2016-11-03
Honey user 2015-4-01 2018-3-13 2018-3-13
Lateral account mapping 2015-2-26 2017-10-10 2017-10-10
Methods and systems for passively detecting security levels in client devices 2013-2-20 2014-5-15
Controlling enterprise access by mobile devices 2012-3-07 2017-7-11 2017-7-11
Controlling enterprise access by mobile devices 2012-3-07 2017-5-30 2017-5-30
Controlling enterprise access by mobile devices 2012-3-07 2013-9-12