55 patents
Page 3 of 3
Utility
System and Method for Application Plug-in Distribution
4 Nov 20
A new approach is proposed that contemplates systems and methods to support a sandboxed application plug-in distribution framework.
Mathew Levac, Fleming Shi
Filed: 16 Jul 20
Utility
System and Method for Email Account Takeover Detection and Remediation
4 Nov 20
A new approach is proposed that contemplates systems and methods to support email account takeover detection and remediation by utilizing an artificial intelligence (AI) engine/classifier that detects and remediates such attacks in real time.
Marco SCHWEIGHAUSER, Lior GAVISH, Itay BLEIER, Asaf CIDON
Filed: 15 Jul 20
Utility
Method and Apparatus for Estimating Monetary Impact of Cyber Attacks
30 Sep 20
A new approach is proposed to support generating and presenting to a user cyber attack monetary impact estimation of a current or future cyber attack, which is used to stop monetary losses or to mitigate monetary impacts.
Alexey Tsitkin, Marco Schweighauser, Nadia Korshun, Shachar Sapir, Fleming Shi
Filed: 10 Jun 20
Utility
Method and apparatus for generating cyber security threat index
14 Sep 20
A new approach is proposed to support generating and presenting a single composite Cyber Security Threat Index (CSTI) to a user, wherein the CSTI provides the user with an indication of risk of cyber attacks globally and/or in the context of his/her current networking environment.
Fleming Shi
Filed: 13 Mar 18
Utility
System and method for email account takeover detection and remediation
14 Sep 20
A new approach is proposed that contemplates systems and methods to support email account takeover detection and remediation by utilizing an artificial intelligence (AI) engine/classifier that detects and remediates such attacks in real time.
Marco Schweighauser, Lior Gavish, Itay Bleier, Asaf Cidon
Filed: 24 Mar 19
Utility
System and method for application plug-in distribution
31 Aug 20
A new approach is proposed that contemplates systems and methods to support a sandboxed application plug-in distribution framework.
Mathew Levac, Fleming Shi
Filed: 28 Mar 19
Utility
System and Method of Utilizing Security Device Plugin for External Device Monitoring and Control In a Secured Environment
10 Jun 20
A new approach is proposed that contemplates systems and methods to support utilizing security device plugins for external device control and monitoring in a secured environment.
Martin WEISSHAUPT, Reinhard STAUDACHER, Christoph RAUCHEGGER
Filed: 4 Feb 19
Utility
Software service to facilitate organizational testing of employees to determine their potential susceptibility to phishing scams
13 Apr 20
A software system and service for facilitating organizational testing of employees in order to determine their potential susceptibility to phishing scams is disclosed to evaluate their susceptibility to e-mail and Internet cybercrimes such as phishing.
Mark T. Chapman
Filed: 28 Jan 18
Utility
Software Service to Facilitate Organizational Testing of Employees to Determine Their Potential Susceptibility to Phishing Scams
11 Mar 20
A software system and service for facilitating organizational testing of employees in order to determine their potential susceptibility to phishing scams is disclosed to evaluate their susceptibility to e-mail and Internet cybercrimes such as phishing.
Mark T. Chapman
Filed: 28 Jan 18
Utility
System and Method of Utilizing Network Security Devices for Industrial Device Protection and Control
22 Jan 20
A new network security device/appliance is proposed to not only protect, but also to control and operate an industrial IoT device.
Martin WEISSHAUPT, Reinhard STAUDACHER, Christoph RAUCHEGGER
Filed: 24 Oct 18
Utility
System for connecting, securing and managing network devices with a dedicated private virtual network
20 Jan 20
A device includes a database, a controller, and a PVN router.
Michael Perone, Fleming Shi
Filed: 25 Jan 18
Utility
Method and Apparatus for Training Email Recipients Against Phishing Attacks Using Real Threats In Realtime
16 Oct 19
An approach is proposed to support user-specific real time anti-phishing training of email recipients using real phishing attacks.
Fleming SHI
Filed: 18 Mar 19
Utility
Method and Apparatus for Neutralizing Real Cyber Threats to Training Materials
16 Oct 19
An approach is proposed to support neutralizing real cyber threats to training materials by intercepting, modifying and redistributing active content(s) of an email arrived at a recipient's email account.
Fleming SHI
Filed: 18 Mar 19
Utility
System and method to configure a firewall for access to a captive network
7 Oct 19
An approach is proposed that contemplates system and method to configure firewall rules of a VPN gateway of a protected network so that users of devices in the protected network can access Internet securely via a captive network.
Fleming Shi, Gean Han
Filed: 9 Jul 18
Utility
System and Method for Application Plug-in Distribution
2 Oct 19
A new approach is proposed that contemplates systems and methods to support a sandboxed application plug-in distribution framework.
Mathew LEVAC, Fleming SHI
Filed: 28 Mar 19