Patent | Date |
---|
Identifying automated responses to security threats based on obtained communication interactions Grant 11,323,472 - Satish , et al. May 3, 2 | 2022-05-03 |
Modifying Incident Response Time Periods Based On Incident Volume App 20220053017 - Satish; Sourabh ;   et al. | 2022-02-17 |
Simulating multiple paths of a course of action executed in an information technology environment Grant 11,240,120 - Mahadik , et al. February 1, 2 | 2022-02-01 |
Generating Incident Response Action Recommendations Using Anonymized Action Implementation Data App 20210385123 - Friedrichs; Oliver ;   et al. | 2021-12-09 |
Modifying incident response time periods based on containment action effectiveness Grant 11,190,539 - Satish , et al. November 30, 2 | 2021-11-30 |
Executing Custom Playbook Code In A Hybrid Security Operations Application Environment App 20210344576 - SRIDHAR; Chakravarthy ;   et al. | 2021-11-04 |
Containment of security threats within a computing environment Grant 11,165,812 - Satish , et al. November 2, 2 | 2021-11-02 |
Selecting Actions Responsive To Computing Environment Incidents Based On Severity Rating App 20210314347 - Satish; Sourabh ;   et al. | 2021-10-07 |
Anonymizing action implementation data obtained from incident analysis systems Grant 11,133,977 - Friedrichs , et al. September 28, 2 | 2021-09-28 |
Providing Action Recommendations Based On Action Effectiveness Across Information Technology Environments App 20210281601 - Satish; Sourabh ;   et al. | 2021-09-09 |
Generating Action Recommendations For Courses Of Action Used For Incident Response App 20210281602 - Friedrichs; Oliver ;   et al. | 2021-09-09 |
Translating Security Actions Into Computing Asset-specific Action Procedures App 20210258340 - SATISH; Sourabh ;   et al. | 2021-08-19 |
Managing Security Actions In A Computing Environment Based On Information Gathering Activity Of A Security Threat App 20210250373 - SATISH; Sourabh ;   et al. | 2021-08-12 |
Simulating Multiple Paths Of A Course Of Action Executed In An Information Technology Environment App 20210226852 - Mahadik; Atif ;   et al. | 2021-07-22 |
Dynamic generation of courses of action for incident response in an information technology environment Grant 11,038,915 - Friedrichs , et al. June 15, 2 | 2021-06-15 |
Identifying security actions for responding to security threats based on threat state information Grant 11,025,664 - Satish , et al. June 1, 2 | 2021-06-01 |
Graphical interface for incident response automation Grant 11,019,093 - Satish , et al. May 25, 2 | 2021-05-25 |
Learning based security threat containment Grant 11,019,092 - Satish , et al. May 25, 2 | 2021-05-25 |
Identifying Recommended Feature Sets Based On Application Feature Popularity App 20210144182 - Satish; Sourabh ;   et al. | 2021-05-13 |
Securely executing custom playbook code in a hybrid execution environment Grant 10,999,164 - Sridhar , et al. May 4, 2 | 2021-05-04 |
Simulated incident response using simulated result when actual result is unavailable Grant 10,985,994 - Mahadik , et al. April 20, 2 | 2021-04-20 |
Selecting actions responsive to computing environment incidents based on action impact information Grant 10,986,120 - Satish , et al. April 20, 2 | 2021-04-20 |
Identifying Related Communication Interactions To A Security Threat In A Computing Environment App 20210092152 - Satish; Sourabh ;   et al. | 2021-03-25 |
Identifying Automated Response Actions Based On Asset Classification App 20210084066 - Satish; Sourabh ;   et al. | 2021-03-18 |
Incident response in an information technology environment using cached data from external services Grant 10,936,488 - Earle , et al. March 2, 2 | 2021-03-02 |
Dynamically updating feature set recommendation databases Grant 10,904,295 - Satish , et al. January 26, 2 | 2021-01-26 |
Management of actions in a computing environment based on asset classification Grant 10,855,718 - Satish , et al. December 1, 2 | 2020-12-01 |
Identifying related communication interactions to a security threat in a computing environment Grant 10,834,120 - Satish , et al. November 10, 2 | 2020-11-10 |
Dynamically updating feature set recommendation databases App 20200344268 - Satish; Sourabh ;   et al. | 2020-10-29 |
Anonymizing Action Implementation Data Obtained From Incident Analysis Systems App 20200344113 - Friedrichs; Oliver ;   et al. | 2020-10-29 |
Identifying Security Actions For Responding To Security Threats Based On Threat State Information App 20200287930 - SATISH; Sourabh ;   et al. | 2020-09-10 |
Identifying Security Actions Based On Computing Asset Relationship Data App 20200259858 - A1 | 2020-08-13 |
Generating action suggestions based on anonymized data from multiple information technology environments Grant 10,742,484 - Friedrichs , et al. A | 2020-08-11 |
Modifying Incident Response Time Periods Based On Containment Action Effectiveness App 20200213348 - Satish; Sourabh ;   et al. | 2020-07-02 |
Identifying recommended feature sets for software under development Grant 10,630,727 - Satish , et al. | 2020-04-21 |
Incident response management based on asset configurations in a computing environment Grant 10,616,264 - Friedrichs , et al. | 2020-04-07 |
Determining security actions for security threats using enrichment information Grant 10,567,424 - Satish , et al. Feb | 2020-02-18 |
Incident response management based on environmental characteristics Grant 10,554,687 - Satish , et al. Fe | 2020-02-04 |
Selecting Actions Responsive To Computing Environment Incidents Based On Action Impact Information App 20200007574 - Satish; Sourabh ;   et al. | 2020-01-02 |
Graphical Interface For Incident Response Automation App 20190373013 - SATISH; Sourabh ;   et al. | 2019-12-05 |
Security actions for computing assets based on enrichment information Grant 10,476,905 - Satish , et al. Nov | 2019-11-12 |
Translating security actions to action procedures in an advisement system Grant 10,425,441 - Satish , et al. Sept | 2019-09-24 |
Implementing security actions in an advisement system based on obtained software characteristics Grant 10,425,440 - Satish , et al. Sept | 2019-09-24 |
Identifying Recommended Feature Sets For Software Under Development App 20190253459 - Satish; Sourabh ;   et al. | 2019-08-15 |
Recommended security action feature sets Grant 10,320,845 - Satish , et al. | 2019-06-11 |
Managing security actions in a computing environment based on communication activity of a security threat Grant 10,193,920 - Satish , et al. Ja | 2019-01-29 |
Managing Security Actions In A Computing Environment Based On Communication Activity Of A Security Threat App 20190020677 - SATISH; Sourabh ;   et al. | 2019-01-17 |
Incident Response Automation Engine App 20190014144 - SATISH; Sourabh ;   et al. | 2019-01-10 |
Incident Response Automation Engine App 20190007448 - SATISH; Sourabh ;   et al. | 2019-01-03 |
Incident response using asset configuration data Grant 10,158,663 - Satish , et al. Dec | 2018-12-18 |
Management Of Actions In A Computing Environment Based On Asset Classification App 20180332074 - Satish; Sourabh ;   et al. | 2018-11-15 |
Security Actions For Computing Assets Based On Enrichment Information App 20180316718 - Satish; Sourabh ;   et al. | 2018-11-01 |
Management of administrative incident response based on environmental characteristics associated with a security incident Grant 10,116,687 - Satish , et al. October 30, 2 | 2018-10-30 |
Management of security actions based on computing asset classification Grant 10,063,587 - Satish , et al. August 28, 2 | 2018-08-28 |
Classifying Kill-chains For Security Incidents App 20180159893 - Satish; Sourabh ;   et al. | 2018-06-07 |
Managing Workflows Upon A Security Incident App 20180124100 - Satish; Sourabh ;   et al. | 2018-05-03 |
Security actions for computing assets based on enrichment information Grant 9,954,888 - Satish , et al. April 24, 2 | 2018-04-24 |
Classifying kill-chains for security incidents Grant 9,888,029 - Satish , et al. February 6, 2 | 2018-02-06 |
Managing workflows upon a security incident Grant 9,871,818 - Satish , et al. January 16, 2 | 2018-01-16 |
Incident Response Automation Engine App 20180013785 - Satish; Sourabh ;   et al. | 2018-01-11 |
Incident response automation engine Grant 9,762,607 - Satish , et al. September 12, 2 | 2017-09-12 |
Automated responses to security threats Grant 9,712,555 - Satish , et al. July 18, 2 | 2017-07-18 |
Recommended Security Action Feature Sets App 20170013019 - Satish; Sourabh ;   et al. | 2017-01-12 |
Security Action Verification In A Computing Network App 20160352773 - Satish; Sourabh ;   et al. | 2016-12-01 |
Containment Of Security Threats Within A Computing Environment App 20160164908 - Satish; Sourabh ;   et al. | 2016-06-09 |
Incident Response Automation Engine App 20160164919 - Satish; Sourabh ;   et al. | 2016-06-09 |
Management Of Security Actions Based On Computing Asset Classification App 20160164895 - Satish; Sourabh ;   et al. | 2016-06-09 |
Automated Responses To Security Threats App 20160164916 - Satish; Sourabh ;   et al. | 2016-06-09 |
Identifying Related Communication Interactions To A Security Threat In A Computing Environment App 20160164892 - Satish; Sourabh ;   et al. | 2016-06-09 |
Classifying Kill-chains For Security Incidents App 20160164891 - Satish; Sourabh ;   et al. | 2016-06-09 |
Security Actions For Computing Assets Based On Enrichment Information App 20160164907 - Satish; Sourabh ;   et al. | 2016-06-09 |
Managing Workflows Upon A Security Incident App 20160164918 - Satish; Sourabh ;   et al. | 2016-06-09 |
Learning Based Security Threat Containment App 20160164909 - Satish; Sourabh ;   et al. | 2016-06-09 |
Action Recommendations For Computing Assets Based On Enrichment Information App 20160164917 - Friedrichs; Oliver ;   et al. | 2016-06-09 |
Method for securing endpoints from onslaught of network attacks Grant 9,160,765 - Mehta , et al. October 13, 2 | 2015-10-13 |
Systems and methods for reevaluating apparently benign behavior on computing devices Grant 8,955,138 - Mahadik , et al. February 10, 2 | 2015-02-10 |
Facilitating secure 24x7 on-demand service availability while minimizing power consumption and power load spikes Grant 8,452,848 - Satish , et al. May 28, 2 | 2013-05-28 |