Latest Patents

Patents imply intellectual property and it has a $ value that can be associated depending on the field and type of patent that is allocated. Patents also increase the enterprise value of the company and help prevent copy-cats from copying the idea without having royalt payments or licencing deals. We like it when companies get patents awarded!. To protect IP companies aggressively file provisional patents even before they have a working product. The below table provides a way to look at what has been done by companies and use this as a factor to make investment decisions.

     
Title Filing Date Publication Date Grant Date
Systems and methods for reducing server load with HTTPS cache 2023-6-30 2023-10-26
Systems and methods for automatic Secure Sockets Layer (SSL) bypass 2023-5-16 2023-9-28
Determining the path of User Datagram Protocol (UDP) traceroute probes 2023-5-15 2023-9-07
Disaster recovery for cloud-based monitoring of internet access 2023-4-26 2023-8-17
Disaster recovery for cloud-based private application access 2023-4-26 2023-8-24
Exploit detection in a cloud-based sandbox 2023-4-18 2023-8-17
Browser fingerprinting and control for session protection and private … 2023-3-24 2023-7-20
Cloud access security broker systems and methods with an in-memory data store 2023-3-16 2023-7-13
Multi-tenant cloud-based firewall systems and methods 2023-1-27 2023-5-25
Zero trust private application access for government applications 2023-1-27 2023-8-03
Cloud access security broker systems and methods via a distributed worker pool 2023-1-18 2023-5-18
Generating zero-trust policy for application access based on sequence-based … 2023-1-18 2023-8-10
Semi-Automatic Communication Network Microsegmentation 2023-1-16 2023-5-18
Traceroutes through external proxies 2022-11-17 2023-3-09
Determining endpoint and application behavior for monitoring user experience 2022-11-10 2023-4-20
Automated Estimation of Network Security Policy Risk 2022-11-02 2023-2-23
Generating and deploying security policies for microsegmentation 2022-10-19 2023-4-06
Machine learning model abstraction layer for runtime efficiency 2022-9-29 2023-1-19
Mobile device security, device management, and policy enforcement in a cloud- … 2022-9-28 2023-1-26
Endpoint Data Loss Prevention 2022-9-26 2023-9-21
Cloud access security broker user interface and analytics systems and methods 2022-9-21 2023-1-19
Cloud-based deception technology utilizing zero trust to identify threat … 2022-8-31 2023-5-24
Data Loss Prevention via dual mode Indexed Document Matching 2022-8-23 2023-2-09
Zero-Trust Enabled Workload Access for User Equipment 2022-8-17 2022-12-22
DLP Exact Data Matching 2022-7-29 2022-11-24
Generating zero-trust policy for application access using machine learning 2022-7-27 2023-4-19
Contextual relationship graph based on user's network transaction patterns for … 2022-7-27 2023-11-02
Statistical Network Application Security Policy Generation 2022-7-13 2022-11-03
Privileged remote access for OT/IOT/IIOT/ICS infrastructure 2022-7-13 2022-11-03
Predefined signatures for inspecting private application access 2022-6-20 2023-1-19
Cloud-based man-in-the-middle inspection of encrypted traffic using cloud-based … 2022-6-17 2022-10-13
Distributed cloud-based security systems and methods 2022-5-25 2022-9-15
Automatic Network Application Security Policy Expansion 2022-5-18 2022-9-01
Cloud-based Data Loss Prevention 2022-4-26 2022-8-11
Cloud application design for efficient troubleshooting 2022-4-25 2023-5-09 2023-5-09
Cloud-based deception technology with auto-decoy and breadcrumb creation 2022-4-20 2023-5-25
Machine learning-based malware detection system and method 2022-4-20 2022-8-04
Cloud-based deception technology with granular scoring for breach detection 2022-4-20 2023-5-25
Encrypted traffic inspection in a cloud-based security system 2022-4-07 2022-7-21
Intelligent steering in 5G 2022-3-21 2022-9-08
Secure edge workload steering and access 2022-3-21 2022-9-08
5G UDM to IDP federation and identity function 2022-3-21 2022-9-08
Automatic analysis of user experience issues to reduce resolution time 2022-3-21 2022-9-01
Cloud-based malware detection 2022-3-07 2023-6-27 2023-6-27
Stream processing of telemetry for a network topology 2022-3-07 2023-9-07
Adaptive tracing with a reduced number of probes to avoid firewall issues 2022-2-25 2023-10-10 2023-10-10
Maintaining dependencies in a set of rules for security scanning 2022-2-18 2023-1-19
Cloud-based Intrusion Prevention System, Multi-Tenant Firewall, and Stream … 2022-1-26 2022-7-07
Software security agent updates via microcode 2022-1-26 2023-7-27
Synthetic audit events in workload segmentation 2022-1-24 2023-7-27
Cloud-based deception technology utilizing zero trust to identify threat … 2022-1-08 2023-5-25
Network traffic identification using machine learning 2022-1-03 2023-5-18
Data owner controls in DLP 2021-12-30 2022-6-23
Network device identification via similarity of operation and auto-labeling 2021-12-17 2022-4-07
Risk based session resumption 2021-12-01 2023-6-01
Deep tracing of user experience 2021-11-16 2022-3-10
Identity intelligence in cloud-based services 2021-10-25 2023-4-27
Real User Monitoring statistics from end users 2021-10-11 2022-1-27
Cloud-based 5G security network architectures with secure edge steering 2021-10-01 2022-9-08
Cloud-based 5G security network architectures with intelligent steering 2021-10-01 2022-9-08
Cloud-based 5G security network architectures with workload isolation 2021-10-01 2022-9-08
Scaling private application access support per client 2021-9-30 2022-1-27
Adaptive tracing using one of a plurality of protocols 2021-9-15 2022-7-14
Cloud access security broker determining risk score of cloud applications based … 2021-9-07 2021-12-30
Distributed adaptive probability for population selection of remote devices in … 2021-8-19 2022-5-10 2022-5-10
Machine learning to determine domain reputation, content classification, … 2021-8-18 2022-3-09
Client to Client and Server to Client communication for private application … 2021-8-16 2021-12-02
Fingerprinting to identify devices and applications for use in management and … 2021-8-16 2021-12-02
ZTNA approach to secure sensitive mobile applications and prevent attacks 2021-8-11 2021-12-02
Distributed network application security policy generation and enforcement for … 2021-7-14 2021-11-04
URL risk analysis using heuristics and scanning 2021-7-13 2021-11-04
Application identity-based enforcement of datagram protocols 2021-7-09 2023-1-19
Cloud-based 5G security network architectures 2021-7-09 2023-9-19 2023-9-19
Connector selection through a cloud-based system for private application access 2021-7-06 2021-10-28
Cloud-based web application and API protection 2021-7-06 2021-10-28
Sub-clouds in a cloud-based system for private application access 2021-7-06 2021-10-28
Private service edge nodes in a cloud-based system for private application … 2021-6-21 2021-10-07
Detecting unused, abnormal permissions of users for cloud-based applications … 2021-6-10 2023-10-10 2023-10-10
REST API provided by a local agent to detect network path of a request 2021-6-08 2021-11-25
Machine learning to determine command and control sites 2021-6-08 2021-12-02
Machine learning to determine domain reputation, content classification, … 2021-6-08 2021-12-02
Distributed Telemetry and Policy Gateway in the cloud for remote devices 2021-6-04 2022-12-08
Highly scalable RESTful framework 2021-6-04 2023-2-14 2023-2-14
Geo tagging for advanced analytics and policy enforcement on remote devices 2021-6-02 2022-11-15 2022-11-15
Utilizing machine learning for smart quarantining of potentially malicious … 2021-4-29 2021-12-22
Private application access with browser isolation 2021-4-29 2021-8-12
Cached web probes for monitoring user experience 2021-4-20 2022-9-08
Securing local network traffic using cloud computing 2021-4-15 2021-7-29
Utilizing endpoint security posture, identification, and remote attestation for … 2021-4-08 2022-10-13
Identity-based enforcement of network communication in serverless workloads 2021-3-15 2023-2-21 2023-2-21
Mobile and IoT device forwarding to the cloud 2021-3-08 2023-2-28 2023-2-28
Metric computation for traceroute probes using cached data to prevent a surge … 2021-3-05 2021-10-19 2021-10-19
Monitoring and analysis of third-party cloud-based applications 2021-3-03 2021-7-15
Proactively detecting failure points in a network 2021-3-01 2023-1-03 2023-1-03
System and method for differentiating between human and non-human access to … 2021-1-27 2022-7-28
Data loss prevention via indexed document matching 2021-1-22 2021-10-27
Cloud access security broker systems and methods for active user identification … 2021-1-22 2021-8-18
Disaster recovery for a cloud-based security service 2021-1-21 2021-6-03
Detection of network hops and latency through an opaque tunnel and detection … 2021-1-14 2023-4-25 2023-4-25
TCP traceroute using RST and SYN-ACK to determine destination reachability 2021-1-14 2022-7-14