Patent | Date |
---|
Firewall Techniques For Colored Objects On Endpoints App 20220131836 - Thomas; Andrew J. ;   et al. | 2022-04-28 |
Firewall techniques for colored objects on endpoints Grant 11,140,130 - Thomas , et al. October 5, 2 | 2021-10-05 |
Context-dependent timeout for remote security services Grant 10,951,642 - Watkiss , et al. March 16, 2 | 2021-03-16 |
Using indications of compromise for reputation based network security Grant 10,778,725 - Ray , et al. Sept | 2020-09-15 |
Method for conditionally hooking endpoint processes with a security agent Grant 10,728,269 - Watkiss , et al. | 2020-07-28 |
Labeling computing objects for improved threat detection Grant 10,673,902 - Thomas , et al. | 2020-06-02 |
Context-dependent Timeout For Remote Security Services App 20200153849 - Watkiss; Neil Robert Tyndale ;   et al. | 2020-05-14 |
Context-dependent timeout for remote security services Grant 10,594,717 - Watkiss , et al. | 2020-03-17 |
Labeling objects on an endpoint for encryption management Grant 10,558,800 - Ray , et al. Feb | 2020-02-11 |
Method For Conditionally Hooking Endpoint Processes With A Security Agent App 20190342313 - Watkiss; Neil Robert Tyndale ;   et al. | 2019-11-07 |
Context-dependent Timeout For Remote Security Services App 20190342312 - Watkiss; Neil Robert Tyndale ;   et al. | 2019-11-07 |
Threat detection using a time-based cache of reputation information on an enterprise endpoint Grant 10,382,459 - Harris , et al. A | 2019-08-13 |
Using Indications Of Compromise For Reputation Based Network Security App 20190149580 - Ray; Kenneth D. ;   et al. | 2019-05-16 |
Using indications of compromise for reputation based network security Grant 10,225,286 - Ray , et al. | 2019-03-05 |
Firewall Techniques For Colored Objects On Endpoints App 20190028438 - Thomas; Andrew J. ;   et al. | 2019-01-24 |
Using Indications Of Compromise For Reputation Based Network Security App 20180324220 - Ray; Kenneth D. ;   et al. | 2018-11-08 |
Firewall techniques for colored objects on endpoints Grant 10,122,687 - Thomas , et al. November 6, 2 | 2018-11-06 |
Labeling Objects On An Endpoint For Encryption Management App 20180276378 - Ray; Kenneth D. ;   et al. | 2018-09-27 |
Threat Detection Using A Time-based Cache Of Reputation Information On An Enterprise Endpoint App 20180278631 - Harris; Mark D. ;   et al. | 2018-09-27 |
Labeling Computing Objects For Improved Threat Detection App 20180278649 - Thomas; Andrew J. ;   et al. | 2018-09-27 |
Using indications of compromise for reputation based network security Grant 9,992,228 - Ray , et al. June 5, 2 | 2018-06-05 |
Labeling objects on an endpoint for encryption management Grant 9,965,627 - Ray , et al. May 8, 2 | 2018-05-08 |
Threat detection using a time-based cache of reputation information on an enterprise endpoint Grant 9,967,264 - Harris , et al. May 8, 2 | 2018-05-08 |
Labeling computing objects for improved threat detection Grant 9,967,282 - Thomas , et al. May 8, 2 | 2018-05-08 |
Threat detection using endpoint variance Grant 9,571,512 - Ray , et al. February 14, 2 | 2017-02-14 |
Firewall Techniques For Colored Objects On Endpoints App 20160191465 - Thomas; Andrew J. ;   et al. | 2016-06-30 |
Threat Detection Using Endpoint Variance App 20160173509 - Ray; Kenneth D. ;   et al. | 2016-06-16 |
Labeling Objects On An Endpoint For Encryption Management App 20160078225 - Ray; Kenneth D. ;   et al. | 2016-03-17 |
Using Indications Of Compromise For Reputation Based Network Security App 20160080420 - Ray; Kenneth D. ;   et al. | 2016-03-17 |
Threat Detection Using A Time-based Cache Of Reputation Information On An Enterprise Endpoint App 20160080399 - Harris; Mark D. ;   et al. | 2016-03-17 |
Labeling Computing Objects For Improved Threat Detection App 20160080417 - Thomas; Andrew J. ;   et al. | 2016-03-17 |