49 patents
Utility
Searchable Investigation History for Event Data Store
28 Dec 23
A processing device receives a first query comprising a first field value and a first time period.
Kenny Tidwell, David Frampton, Brendan O'Connell
Filed: 12 Sep 23
Utility
Clustering of structured log data by key schema
28 Nov 23
Clustering structured log data by key schema includes receiving a raw log message.
Udit Saxena, Reetika Roy, Ryley Higa, David M. Andrzejewski, Bashyam T C A
Filed: 15 Mar 22
Utility
Searchable investigation history for event data store
14 Nov 23
A processing device receives a first query comprising a first field value and a first time period.
Kenny Tidwell, David Frampton, Brendan O'Connell
Filed: 10 May 22
Utility
Clustering of Structured Log Data by Key-values
5 Oct 23
Clustering structured log data by key-values includes receiving, via a user interface, a request to apply an operator to cluster log messages according to values for keys associated with the request.
Udit Saxena, Reetika Roy, Ryley Higa, David M. Andrzejewski, Bashyam TCA
Filed: 12 Apr 23
Utility
Cybersecurity Incident Response and Security Operation System Employing Playbook Generation Through Custom Machine Learning
28 Sep 23
A new cybersecurity incident is registered at a security incident response platform.
Dario Valentino Forte, Michele Zambelli, Vojtech Letal
Filed: 24 May 23
Utility
Method and Apparatus for Controlling Digital Evidence
17 Aug 23
A method and apparatus for controlling digital evidence comprising creating a case record comprising information about an investigative case, electronically storing at least one piece of digital evidence into memory, and associating the stored at least one piece of evidence with the case record.
Dario Valentino Forte
Filed: 24 Apr 23
Utility
Cybersecurity incident response and security operation system employing playbook generation through custom machine learning
18 Jul 23
A new cybersecurity incident is registered at a security incident response platform.
Dario Valentino Forte, Michele Zambelli, Vojtech Letal
Filed: 7 Mar 22
Utility
Cybersecurity incident response and security operation system employing playbook generation and parent matching through custom machine learning
4 Jul 23
A cybersecurity incident is registered at a security incident response platform.
Dario Valentino Forte, Michele Zambelli, Tomás Drtina
Filed: 27 Jul 21
Utility
Clustering of structured log data by key-values
30 May 23
Clustering structured log data by key-values includes receiving, via a user interface, a request to apply an operator to cluster a set of raw log messages according to values for a set of keys associated with the request.
Udit Saxena, Reetika Roy, Ryley Higa, David M. Andrzejewski, Bashyam Tca
Filed: 1 Sep 20
Utility
User Interface for Event Data Store
25 May 23
A method includes defining a set of context types; defining a set of source types, each comprising context types; defining, for each source type; and for each context type included in the events from data sources having the source type, a context definition comprising a set of fields, in events from the data sources, that are associated with the context type; receiving a query comprising a first field value and a time period; retrieving a plurality of events that include the first field value and the time period; for each retrieved event, and for each context definition defined for a source type and a context type of a data source from which the retrieved event originated, determining field values of fields in the set of fields of the context definition; aggregating, for each context type, determined field values from the events; and generating an output.
David Frampton, Brendan O'Connell, Kenny Tidwell
Filed: 10 Jan 23
Utility
Logs to metrics synthesis
28 Mar 23
Logs to metrics synthesis includes receiving a log message.
Christian Friedrich Beedgen, David M. Andrzejewski, Benjamin Everette Newton, Kumar Avijit, Stefan Christoph Zier
Filed: 3 Dec 20
Utility
Context-aware event data store
7 Feb 23
A method includes defining a set of context types; defining a set of source types, each comprising context types; defining, for each source type, and for each context type included in the events from data sources having the source type, a context definition comprising a set of fields, in events from the data sources, that are associated with the context type; receiving a query comprising a first field value and a time period; retrieving a plurality of events that include the first field value and the time period; for each retrieved event, and for each context definition defined for a source type and a context type of a data source from which the retrieved event originated, determining field values of fields in the set of fields of the context definition; aggregating, for each context type, determined field values from the events; and generating an output.
David Frampton, Brendan O'Connell, Kenny Tidwell
Filed: 22 Apr 20
Utility
Key Name Synthesis
15 Dec 22
Key name synthesis is disclosed.
Christian Friedrich Beedgen, David M. Andrzejewski, Benjamin Everette Newton, Kumar Avijit, Stefan Christoph Zier
Filed: 9 Aug 22
Utility
Key name synthesis
25 Oct 22
Key name synthesis is disclosed.
Christian Friedrich Beedgen, David M Andrzejewski, Benjamin Everette Newton, Kumar Avijit, Stefan Christoph Zier
Filed: 10 Jul 18
Utility
Data Enrichment and Augmentation
13 Oct 22
Data enrichment and augmentation is disclosed.
Christian Friedrich Beedgen, David M. Andrzejewski, Benjamin Everette Newton, Kumar Avijit, Stefan Christoph Zier
Filed: 22 Jun 22
Utility
Searchable Investigation History for Event Data Store
22 Sep 22
A processing device receives a first query comprising a first field value and a first time period.
Kenny Tidwell, David Frampton, Brendan O'Connell
Filed: 10 May 22
Utility
Automatic Partitioning
22 Sep 22
Automatic partitioning is disclosed.
Kumar Saurabh, Christian Friedrich Beedgen
Filed: 10 Jun 22
Utility
Clustering of Structured Log Data by Key Schema
25 Aug 22
Clustering structured log data by key schema includes receiving a raw log message.
Udit Saxena, Reetika Roy, Ryley Higa, David M. Andrzejewski, Bashyam TCA
Filed: 15 Mar 22
Utility
Data enrichment and augmentation
26 Jul 22
Data enrichment and augmentation is disclosed.
Christian Friedrich Beedgen, David M Andrzejewski, Benjamin Everette Newton, Kumar Avijit, Stefan Christoph Zier
Filed: 10 Jul 18
Utility
Automatic partitioning
19 Jul 22
Automatic partitioning is disclosed.
Kumar Saurabh, Christian Friedrich Beedgen
Filed: 13 Oct 16