loadpatents
name:-0.11980295181274
name:-0.1256000995636
name:-0.10304999351501
Mahadik; Atif Patent Filings

Mahadik; Atif

Patent Applications and Registrations

Patent applications and USPTO patent grants for Mahadik; Atif.The latest application filed is for "modifying incident response time periods based on incident volume".

Company Profile
33.38.41
  • Mahadik; Atif - Fremont CA
  • Mahadik; Atif - Freemont CA
  • Mahadik; Atif - Mountain View CA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Identifying automated responses to security threats based on obtained communication interactions
Grant 11,323,472 - Satish , et al. May 3, 2
2022-05-03
Modifying Incident Response Time Periods Based On Incident Volume
App 20220053017 - Satish; Sourabh ;   et al.
2022-02-17
Simulating multiple paths of a course of action executed in an information technology environment
Grant 11,240,120 - Mahadik , et al. February 1, 2
2022-02-01
Generating Incident Response Action Recommendations Using Anonymized Action Implementation Data
App 20210385123 - Friedrichs; Oliver ;   et al.
2021-12-09
Modifying incident response time periods based on containment action effectiveness
Grant 11,190,539 - Satish , et al. November 30, 2
2021-11-30
Executing Custom Playbook Code In A Hybrid Security Operations Application Environment
App 20210344576 - SRIDHAR; Chakravarthy ;   et al.
2021-11-04
Containment of security threats within a computing environment
Grant 11,165,812 - Satish , et al. November 2, 2
2021-11-02
Selecting Actions Responsive To Computing Environment Incidents Based On Severity Rating
App 20210314347 - Satish; Sourabh ;   et al.
2021-10-07
Anonymizing action implementation data obtained from incident analysis systems
Grant 11,133,977 - Friedrichs , et al. September 28, 2
2021-09-28
Providing Action Recommendations Based On Action Effectiveness Across Information Technology Environments
App 20210281601 - Satish; Sourabh ;   et al.
2021-09-09
Generating Action Recommendations For Courses Of Action Used For Incident Response
App 20210281602 - Friedrichs; Oliver ;   et al.
2021-09-09
Translating Security Actions Into Computing Asset-specific Action Procedures
App 20210258340 - SATISH; Sourabh ;   et al.
2021-08-19
Managing Security Actions In A Computing Environment Based On Information Gathering Activity Of A Security Threat
App 20210250373 - SATISH; Sourabh ;   et al.
2021-08-12
Simulating Multiple Paths Of A Course Of Action Executed In An Information Technology Environment
App 20210226852 - Mahadik; Atif ;   et al.
2021-07-22
Dynamic generation of courses of action for incident response in an information technology environment
Grant 11,038,915 - Friedrichs , et al. June 15, 2
2021-06-15
Identifying security actions for responding to security threats based on threat state information
Grant 11,025,664 - Satish , et al. June 1, 2
2021-06-01
Graphical interface for incident response automation
Grant 11,019,093 - Satish , et al. May 25, 2
2021-05-25
Learning based security threat containment
Grant 11,019,092 - Satish , et al. May 25, 2
2021-05-25
Identifying Recommended Feature Sets Based On Application Feature Popularity
App 20210144182 - Satish; Sourabh ;   et al.
2021-05-13
Securely executing custom playbook code in a hybrid execution environment
Grant 10,999,164 - Sridhar , et al. May 4, 2
2021-05-04
Simulated incident response using simulated result when actual result is unavailable
Grant 10,985,994 - Mahadik , et al. April 20, 2
2021-04-20
Selecting actions responsive to computing environment incidents based on action impact information
Grant 10,986,120 - Satish , et al. April 20, 2
2021-04-20
Identifying Related Communication Interactions To A Security Threat In A Computing Environment
App 20210092152 - Satish; Sourabh ;   et al.
2021-03-25
Identifying Automated Response Actions Based On Asset Classification
App 20210084066 - Satish; Sourabh ;   et al.
2021-03-18
Incident response in an information technology environment using cached data from external services
Grant 10,936,488 - Earle , et al. March 2, 2
2021-03-02
Dynamically updating feature set recommendation databases
Grant 10,904,295 - Satish , et al. January 26, 2
2021-01-26
Management of actions in a computing environment based on asset classification
Grant 10,855,718 - Satish , et al. December 1, 2
2020-12-01
Identifying related communication interactions to a security threat in a computing environment
Grant 10,834,120 - Satish , et al. November 10, 2
2020-11-10
Dynamically updating feature set recommendation databases
App 20200344268 - Satish; Sourabh ;   et al.
2020-10-29
Anonymizing Action Implementation Data Obtained From Incident Analysis Systems
App 20200344113 - Friedrichs; Oliver ;   et al.
2020-10-29
Identifying Security Actions For Responding To Security Threats Based On Threat State Information
App 20200287930 - SATISH; Sourabh ;   et al.
2020-09-10
Identifying Security Actions Based On Computing Asset Relationship Data
App 20200259858 - A1
2020-08-13
Generating action suggestions based on anonymized data from multiple information technology environments
Grant 10,742,484 - Friedrichs , et al. A
2020-08-11
Modifying Incident Response Time Periods Based On Containment Action Effectiveness
App 20200213348 - Satish; Sourabh ;   et al.
2020-07-02
Identifying recommended feature sets for software under development
Grant 10,630,727 - Satish , et al.
2020-04-21
Incident response management based on asset configurations in a computing environment
Grant 10,616,264 - Friedrichs , et al.
2020-04-07
Determining security actions for security threats using enrichment information
Grant 10,567,424 - Satish , et al. Feb
2020-02-18
Incident response management based on environmental characteristics
Grant 10,554,687 - Satish , et al. Fe
2020-02-04
Selecting Actions Responsive To Computing Environment Incidents Based On Action Impact Information
App 20200007574 - Satish; Sourabh ;   et al.
2020-01-02
Graphical Interface For Incident Response Automation
App 20190373013 - SATISH; Sourabh ;   et al.
2019-12-05
Security actions for computing assets based on enrichment information
Grant 10,476,905 - Satish , et al. Nov
2019-11-12
Translating security actions to action procedures in an advisement system
Grant 10,425,441 - Satish , et al. Sept
2019-09-24
Implementing security actions in an advisement system based on obtained software characteristics
Grant 10,425,440 - Satish , et al. Sept
2019-09-24
Identifying Recommended Feature Sets For Software Under Development
App 20190253459 - Satish; Sourabh ;   et al.
2019-08-15
Recommended security action feature sets
Grant 10,320,845 - Satish , et al.
2019-06-11
Managing security actions in a computing environment based on communication activity of a security threat
Grant 10,193,920 - Satish , et al. Ja
2019-01-29
Managing Security Actions In A Computing Environment Based On Communication Activity Of A Security Threat
App 20190020677 - SATISH; Sourabh ;   et al.
2019-01-17
Incident Response Automation Engine
App 20190014144 - SATISH; Sourabh ;   et al.
2019-01-10
Incident Response Automation Engine
App 20190007448 - SATISH; Sourabh ;   et al.
2019-01-03
Incident response using asset configuration data
Grant 10,158,663 - Satish , et al. Dec
2018-12-18
Management Of Actions In A Computing Environment Based On Asset Classification
App 20180332074 - Satish; Sourabh ;   et al.
2018-11-15
Security Actions For Computing Assets Based On Enrichment Information
App 20180316718 - Satish; Sourabh ;   et al.
2018-11-01
Management of administrative incident response based on environmental characteristics associated with a security incident
Grant 10,116,687 - Satish , et al. October 30, 2
2018-10-30
Management of security actions based on computing asset classification
Grant 10,063,587 - Satish , et al. August 28, 2
2018-08-28
Classifying Kill-chains For Security Incidents
App 20180159893 - Satish; Sourabh ;   et al.
2018-06-07
Managing Workflows Upon A Security Incident
App 20180124100 - Satish; Sourabh ;   et al.
2018-05-03
Security actions for computing assets based on enrichment information
Grant 9,954,888 - Satish , et al. April 24, 2
2018-04-24
Classifying kill-chains for security incidents
Grant 9,888,029 - Satish , et al. February 6, 2
2018-02-06
Managing workflows upon a security incident
Grant 9,871,818 - Satish , et al. January 16, 2
2018-01-16
Incident Response Automation Engine
App 20180013785 - Satish; Sourabh ;   et al.
2018-01-11
Incident response automation engine
Grant 9,762,607 - Satish , et al. September 12, 2
2017-09-12
Automated responses to security threats
Grant 9,712,555 - Satish , et al. July 18, 2
2017-07-18
Recommended Security Action Feature Sets
App 20170013019 - Satish; Sourabh ;   et al.
2017-01-12
Security Action Verification In A Computing Network
App 20160352773 - Satish; Sourabh ;   et al.
2016-12-01
Containment Of Security Threats Within A Computing Environment
App 20160164908 - Satish; Sourabh ;   et al.
2016-06-09
Incident Response Automation Engine
App 20160164919 - Satish; Sourabh ;   et al.
2016-06-09
Management Of Security Actions Based On Computing Asset Classification
App 20160164895 - Satish; Sourabh ;   et al.
2016-06-09
Automated Responses To Security Threats
App 20160164916 - Satish; Sourabh ;   et al.
2016-06-09
Identifying Related Communication Interactions To A Security Threat In A Computing Environment
App 20160164892 - Satish; Sourabh ;   et al.
2016-06-09
Classifying Kill-chains For Security Incidents
App 20160164891 - Satish; Sourabh ;   et al.
2016-06-09
Security Actions For Computing Assets Based On Enrichment Information
App 20160164907 - Satish; Sourabh ;   et al.
2016-06-09
Managing Workflows Upon A Security Incident
App 20160164918 - Satish; Sourabh ;   et al.
2016-06-09
Learning Based Security Threat Containment
App 20160164909 - Satish; Sourabh ;   et al.
2016-06-09
Action Recommendations For Computing Assets Based On Enrichment Information
App 20160164917 - Friedrichs; Oliver ;   et al.
2016-06-09
Method for securing endpoints from onslaught of network attacks
Grant 9,160,765 - Mehta , et al. October 13, 2
2015-10-13
Systems and methods for reevaluating apparently benign behavior on computing devices
Grant 8,955,138 - Mahadik , et al. February 10, 2
2015-02-10
Facilitating secure 24x7 on-demand service availability while minimizing power consumption and power load spikes
Grant 8,452,848 - Satish , et al. May 28, 2
2013-05-28

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed