211 patents
Utility
Secure verification of detection rules on test sensors
16 Jan 24
A modification to an applied ruleset intended for consumption by intrusion detection systems (IDSs) is detected.
Sarah Addis, Martin Hutchings, Ralph McTeggart, Niall Cochrane, Luis Lopes
Filed: 11 Aug 21
Utility
Non-SQL Document Store Storing Table Metadata for Selecting Data Access Mode of Tables
11 Jan 24
A SQL database system is disclosed for reading and writing a non-SQL document store using SQL.
Austin Lee
Filed: 19 Sep 23
Utility
Phishing attack training systems and methods
9 Jan 24
Systems and methods for user training.
Jin Qian, Brent Cook
Filed: 31 Oct 19
Utility
Data collection and analytics pipeline for cybersecurity
2 Jan 24
Disclosed herein are methods, systems, and processes for generating, configuring, and implementing a data collection and analytics (DCA) pipeline to optimize the identification of anomalous or vulnerable computing assets and/or anomalous or vulnerable computing asset behavior in cybersecurity computing environments.
Paul-Andrew Joseph Miseiko
Filed: 24 Feb 20
Utility
Deployable network sensor for multiple platforms
5 Dec 23
Disclosed herein are methods, systems, and processes for centralized containerized deployment of network traffic sensors to network sensor hosts for deep packet inspection (DPI) that supports various other cybersecurity operations.
John Brosnan, Jeff Myers, Andriy Lyubka, Darragh Delaney, Erran Carey, Martin Hutchings, Ralph McTeggart, Ryan Williams, Daniel Skelton, Luke Coughlan, Gianpaolo Tedesco, Luis Ramos dos Santos Lopes, Lars-Kristian Svenoy, Dan-Adrian Moinescu, Niall Cochrane, Morgan Doyle, Sarah Addis
Filed: 29 Jun 22
Utility
Curating actionable intrusion detection system rules
5 Dec 23
New intrusion detection system (IDS) rules to be deployed on an IDS that generates alerts based on an applied ruleset are accessed.
Luis Lopes, Sarah Addis, Martin Hutchings, Ralph McTeggart, Niall Cochrane
Filed: 11 Aug 21
Utility
Software code review
5 Dec 23
Methods and systems for reviewing software code.
James Cancilla, Ian Horbatiuk
Filed: 19 Aug 19
Utility
Selective and granular multi-customer support access
21 Nov 23
Disclosed herein are methods, systems, and processes to configure and facilitate selective and granular multi-customer support access in cloud-based cybersecurity computing environments.
Mark McKinless, Ryan Edwards, Jun Qian, Ceara McCurdy, Christopher Dowey, Ralph McTeggart, Ashwin Anand
Filed: 9 Jul 20
Utility
Multi-baseline unsupervised security-incident and network behavioral anomaly detection in cloud-based compute environments
14 Nov 23
A method and system for detecting anomalous network activity in a cloud-based compute environment.
Nitzan Niv, Gad Naor
Filed: 1 Feb 22
Utility
Classification model to detect unauthorized network behavior
7 Nov 23
Methods and systems for classifying network users.
Roy Hodgman
Filed: 1 Dec 21
Utility
Endpoint command invocation system using worker selection
7 Nov 23
Systems and methods are disclosed to implement an endpoint command invocation system (“ECIS”).
Xi Yang, Paul-Andrew Joseph Miseiko, Ryan Tonini, Bingbin Li
Filed: 8 Mar 23
Utility
Detecting security risks based on open ports
10 Oct 23
Disclosed herein are methods, systems, and processes to detect anomalous computing assets based on open ports.
Fatemeh Kazemeyni
Filed: 2 Feb 22
Utility
Scanning web applications for security vulnerabilities
10 Oct 23
Disclosed herein are methods, systems, and processes for the enhanced crawling of unexposed web applications for vulnerability scanning purposes.
Dmitriy Kashitsyn, Andrew Tisdale, Jijo John
Filed: 9 Nov 21
Utility
Vulnerability inference for identifying vulnerable processes
10 Oct 23
Systems and methods for determining an extent of a vulnerability on a computer and remediating the vulnerability.
Roy Hodgman, Jonathan Hart
Filed: 30 Jun 20
Utility
Granular and prioritized visualization of anomalous log data
3 Oct 23
Disclosed herein are methods, systems, and processes for granular and prioritized visualization of anomalous log data.
Douglas George Wainer
Filed: 9 Dec 20
Utility
Probabilistically identifying anomalous honeypot activity
3 Oct 23
Disclosed herein are methods, systems, and processes for probabilistically identifying anomalous levels of honeypot activity.
Wah-Kwan Lin, Curtis Barnard
Filed: 9 Mar 21
Utility
Table data storage in non-SQL document store to enable efficient data access by SQL query engine
26 Sep 23
A SQL database system is disclosed for reading and writing a non-SQL document store using SQL.
Austin Lee
Filed: 26 Aug 21
Utility
Outlier detection in textual data
26 Sep 23
Systems and methods are disclosed to implement an outlier detection system for text records.
Viliam Holub, Eoin Shanley, Trevor Parsons
Filed: 29 Jun 21
Utility
Evaluating configuration files for uniform resource indicator discovery
26 Sep 23
A Uniform Resource Identifier (URI) discovery system is implemented that evaluates web configuration servers obtained from web servers to determine the existence and configuration of URIs hosted by the web servers.
Adam Smith, Ross Kirk, Jack Pincombe
Filed: 13 Oct 21
Utility
Graph-based detection of lateral movement in computer networks
26 Sep 23
Systems and methods are disclosed to implement a cyberattack detection system that monitors a computer network for lateral movement.
Vasudha Shivamoggi, Roy Donald Hodgman, Katherine Wilbur
Filed: 17 Jul 20