| Systems and methods for reducing server load with HTTPS cache |
2023-6-30 |
2023-10-26 |
|
| Systems and methods for automatic Secure Sockets Layer (SSL) bypass |
2023-5-16 |
2023-9-28 |
|
| Determining the path of User Datagram Protocol (UDP) traceroute probes |
2023-5-15 |
2023-9-07 |
|
| Disaster recovery for cloud-based monitoring of internet access |
2023-4-26 |
2023-8-17 |
|
| Disaster recovery for cloud-based private application access |
2023-4-26 |
2023-8-24 |
|
| Exploit detection in a cloud-based sandbox |
2023-4-18 |
2023-8-17 |
|
| Browser fingerprinting and control for session protection and private … |
2023-3-24 |
2023-7-20 |
|
| Cloud access security broker systems and methods with an in-memory data store |
2023-3-16 |
2023-7-13 |
|
| Multi-tenant cloud-based firewall systems and methods |
2023-1-27 |
2023-5-25 |
|
| Zero trust private application access for government applications |
2023-1-27 |
2023-8-03 |
|
| Cloud access security broker systems and methods via a distributed worker pool |
2023-1-18 |
2023-5-18 |
|
| Generating zero-trust policy for application access based on sequence-based … |
2023-1-18 |
2023-8-10 |
|
| Semi-Automatic Communication Network Microsegmentation |
2023-1-16 |
2023-5-18 |
|
| Traceroutes through external proxies |
2022-11-17 |
2023-3-09 |
|
| Determining endpoint and application behavior for monitoring user experience |
2022-11-10 |
2023-4-20 |
|
| Automated Estimation of Network Security Policy Risk |
2022-11-02 |
2023-2-23 |
|
| Generating and deploying security policies for microsegmentation |
2022-10-19 |
2023-4-06 |
|
| Machine learning model abstraction layer for runtime efficiency |
2022-9-29 |
2023-1-19 |
|
| Mobile device security, device management, and policy enforcement in a cloud- … |
2022-9-28 |
2023-1-26 |
|
| Endpoint Data Loss Prevention |
2022-9-26 |
2023-9-21 |
|
| Cloud access security broker user interface and analytics systems and methods |
2022-9-21 |
2023-1-19 |
|
| Cloud-based deception technology utilizing zero trust to identify threat … |
2022-8-31 |
2023-5-24 |
|
| Data Loss Prevention via dual mode Indexed Document Matching |
2022-8-23 |
2023-2-09 |
|
| Zero-Trust Enabled Workload Access for User Equipment |
2022-8-17 |
2022-12-22 |
|
| DLP Exact Data Matching |
2022-7-29 |
2022-11-24 |
|
| Generating zero-trust policy for application access using machine learning |
2022-7-27 |
2023-4-19 |
|
| Contextual relationship graph based on user's network transaction patterns for … |
2022-7-27 |
2023-11-02 |
|
| Statistical Network Application Security Policy Generation |
2022-7-13 |
2022-11-03 |
|
| Privileged remote access for OT/IOT/IIOT/ICS infrastructure |
2022-7-13 |
2022-11-03 |
|
| Predefined signatures for inspecting private application access |
2022-6-20 |
2023-1-19 |
|
| Cloud-based man-in-the-middle inspection of encrypted traffic using cloud-based … |
2022-6-17 |
2022-10-13 |
|
| Distributed cloud-based security systems and methods |
2022-5-25 |
2022-9-15 |
|
| Automatic Network Application Security Policy Expansion |
2022-5-18 |
2022-9-01 |
|
| Cloud-based Data Loss Prevention |
2022-4-26 |
2022-8-11 |
|
| Cloud application design for efficient troubleshooting |
2022-4-25 |
2023-5-09 |
2023-5-09 |
| Cloud-based deception technology with auto-decoy and breadcrumb creation |
2022-4-20 |
2023-5-25 |
|
| Machine learning-based malware detection system and method |
2022-4-20 |
2022-8-04 |
|
| Cloud-based deception technology with granular scoring for breach detection |
2022-4-20 |
2023-5-25 |
|
| Encrypted traffic inspection in a cloud-based security system |
2022-4-07 |
2022-7-21 |
|
| Intelligent steering in 5G |
2022-3-21 |
2022-9-08 |
|
| Secure edge workload steering and access |
2022-3-21 |
2022-9-08 |
|
| 5G UDM to IDP federation and identity function |
2022-3-21 |
2022-9-08 |
|
| Automatic analysis of user experience issues to reduce resolution time |
2022-3-21 |
2022-9-01 |
|
| Cloud-based malware detection |
2022-3-07 |
2023-6-27 |
2023-6-27 |
| Stream processing of telemetry for a network topology |
2022-3-07 |
2023-9-07 |
|
| Adaptive tracing with a reduced number of probes to avoid firewall issues |
2022-2-25 |
2023-10-10 |
2023-10-10 |
| Maintaining dependencies in a set of rules for security scanning |
2022-2-18 |
2023-1-19 |
|
| Cloud-based Intrusion Prevention System, Multi-Tenant Firewall, and Stream … |
2022-1-26 |
2022-7-07 |
|
| Software security agent updates via microcode |
2022-1-26 |
2023-7-27 |
|
| Synthetic audit events in workload segmentation |
2022-1-24 |
2023-7-27 |
|
| Cloud-based deception technology utilizing zero trust to identify threat … |
2022-1-08 |
2023-5-25 |
|
| Network traffic identification using machine learning |
2022-1-03 |
2023-5-18 |
|
| Data owner controls in DLP |
2021-12-30 |
2022-6-23 |
|
| Network device identification via similarity of operation and auto-labeling |
2021-12-17 |
2022-4-07 |
|
| Risk based session resumption |
2021-12-01 |
2023-6-01 |
|
| Deep tracing of user experience |
2021-11-16 |
2022-3-10 |
|
| Identity intelligence in cloud-based services |
2021-10-25 |
2023-4-27 |
|
| Real User Monitoring statistics from end users |
2021-10-11 |
2022-1-27 |
|
| Cloud-based 5G security network architectures with secure edge steering |
2021-10-01 |
2022-9-08 |
|
| Cloud-based 5G security network architectures with intelligent steering |
2021-10-01 |
2022-9-08 |
|
| Cloud-based 5G security network architectures with workload isolation |
2021-10-01 |
2022-9-08 |
|
| Scaling private application access support per client |
2021-9-30 |
2022-1-27 |
|
| Adaptive tracing using one of a plurality of protocols |
2021-9-15 |
2022-7-14 |
|
| Cloud access security broker determining risk score of cloud applications based … |
2021-9-07 |
2021-12-30 |
|
| Distributed adaptive probability for population selection of remote devices in … |
2021-8-19 |
2022-5-10 |
2022-5-10 |
| Machine learning to determine domain reputation, content classification, … |
2021-8-18 |
2022-3-09 |
|
| Client to Client and Server to Client communication for private application … |
2021-8-16 |
2021-12-02 |
|
| Fingerprinting to identify devices and applications for use in management and … |
2021-8-16 |
2021-12-02 |
|
| ZTNA approach to secure sensitive mobile applications and prevent attacks |
2021-8-11 |
2021-12-02 |
|
| Distributed network application security policy generation and enforcement for … |
2021-7-14 |
2021-11-04 |
|
| URL risk analysis using heuristics and scanning |
2021-7-13 |
2021-11-04 |
|
| Application identity-based enforcement of datagram protocols |
2021-7-09 |
2023-1-19 |
|
| Cloud-based 5G security network architectures |
2021-7-09 |
2023-9-19 |
2023-9-19 |
| Connector selection through a cloud-based system for private application access |
2021-7-06 |
2021-10-28 |
|
| Cloud-based web application and API protection |
2021-7-06 |
2021-10-28 |
|
| Sub-clouds in a cloud-based system for private application access |
2021-7-06 |
2021-10-28 |
|
| Private service edge nodes in a cloud-based system for private application … |
2021-6-21 |
2021-10-07 |
|
| Detecting unused, abnormal permissions of users for cloud-based applications … |
2021-6-10 |
2023-10-10 |
2023-10-10 |
| REST API provided by a local agent to detect network path of a request |
2021-6-08 |
2021-11-25 |
|
| Machine learning to determine command and control sites |
2021-6-08 |
2021-12-02 |
|
| Machine learning to determine domain reputation, content classification, … |
2021-6-08 |
2021-12-02 |
|
| Distributed Telemetry and Policy Gateway in the cloud for remote devices |
2021-6-04 |
2022-12-08 |
|
| Highly scalable RESTful framework |
2021-6-04 |
2023-2-14 |
2023-2-14 |
| Geo tagging for advanced analytics and policy enforcement on remote devices |
2021-6-02 |
2022-11-15 |
2022-11-15 |
| Utilizing machine learning for smart quarantining of potentially malicious … |
2021-4-29 |
2021-12-22 |
|
| Private application access with browser isolation |
2021-4-29 |
2021-8-12 |
|
| Cached web probes for monitoring user experience |
2021-4-20 |
2022-9-08 |
|
| Securing local network traffic using cloud computing |
2021-4-15 |
2021-7-29 |
|
| Utilizing endpoint security posture, identification, and remote attestation for … |
2021-4-08 |
2022-10-13 |
|
| Identity-based enforcement of network communication in serverless workloads |
2021-3-15 |
2023-2-21 |
2023-2-21 |
| Mobile and IoT device forwarding to the cloud |
2021-3-08 |
2023-2-28 |
2023-2-28 |
| Metric computation for traceroute probes using cached data to prevent a surge … |
2021-3-05 |
2021-10-19 |
2021-10-19 |
| Monitoring and analysis of third-party cloud-based applications |
2021-3-03 |
2021-7-15 |
|
| Proactively detecting failure points in a network |
2021-3-01 |
2023-1-03 |
2023-1-03 |
| System and method for differentiating between human and non-human access to … |
2021-1-27 |
2022-7-28 |
|
| Data loss prevention via indexed document matching |
2021-1-22 |
2021-10-27 |
|
| Cloud access security broker systems and methods for active user identification … |
2021-1-22 |
2021-8-18 |
|
| Disaster recovery for a cloud-based security service |
2021-1-21 |
2021-6-03 |
|
| Detection of network hops and latency through an opaque tunnel and detection … |
2021-1-14 |
2023-4-25 |
2023-4-25 |
| TCP traceroute using RST and SYN-ACK to determine destination reachability |
2021-1-14 |
2022-7-14 |
|