42 patents
Utility
Security event modeling and threat detection using behavioral, analytical, and threat intelligence attributes
16 Jan 24
A system for testing a security object is disclosed.
Ankur Sunil Tyagi, Mayuresh Vishwas Dani
Filed: 29 Dec 21
Utility
Asset Remediation Trend Map Generation and Utilization for Threat Mitigation
4 Jan 24
The present disclosure relates to methods, systems, and computer program products for generating an asset remediation trend map used in remediating against an attack campaign.
Ankur S. Tyagi, Mayuresh Vishwas Dani
Filed: 15 Sep 23
Utility
Attack Kill Chain Generation and Utilization for Threat Analysis
28 Dec 23
The present disclosure relates to methods, systems, and computer program products for generating an attack kill chain for threat analysis.
Ankur S. Tyagi, Mayuresh Vishwas Dani
Filed: 5 Sep 23
Utility
Methods and Systems for Asset Risk Determination and Utilization for Threat Mitigation
21 Dec 23
Disclosed are methods and systems for assessing system risks associated with one or more assets coupled to a network and mitigating against said system risks.
Mehul Krishnanand Revankar, Sumedh S. Thakar, Anand Paturi
Filed: 20 Jun 22
Utility
Methods and Systems for System Vulnerability Determination and Utilization for Threat Mitigation
21 Dec 23
Disclosed embodiments include receiving network data associated with a first system of a network.
Mehul Krishnanand Revankar, Sumedh S. Thakar, Anand Paturi
Filed: 20 Jun 22
Utility
System and Method for Performing Remote Security Assessment of Firewalled Computer
9 Nov 23
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed.
Wissam Ali-Ahmad, Wolfgang Kandek, Holger Kruse, Vikas Dewan, Khair-ed-dine Mazboudi, Ganesh Jampani, Kenneth K. Okumura
Filed: 17 Jul 23
Utility
Domain-specific language simulant for simulating a threat-actor and adversarial tactics, techniques, and procedures
31 Oct 23
The present describes simulating a threat-actor executing an attack execution operation.
Mayuresh Vishwas Dani, Ankur S. Tyagi
Filed: 29 Mar 21
Utility
Domain specific language for defending against a threat-actor and adversarial tactics, techniques, and procedures
31 Oct 23
The present disclosure describes defending against an attack execution operation.
Mayuresh Vishwas Dani, Ankur S. Tyagi
Filed: 29 Mar 21
Utility
Rest API scanning for security testing
17 Oct 23
Methods and systems for securing an application programming interface (API) are presented.
Ganesh Nikam, Akash Shah
Filed: 28 Feb 22
Utility
Asset remediation trend map generation and utilization for threat mitigation
3 Oct 23
The present disclosure relates to methods, systems, and computer program products for generating an asset remediation trend map used in remediating against an attack campaign.
Ankur S. Tyagi, Mayuresh Vishwas Dani
Filed: 23 May 22
Utility
Attack kill chain generation and utilization for threat analysis
19 Sep 23
The present disclosure relates to methods, systems, and computer program products for generating an attack kill chain for threat analysis.
Ankur S. Tyagi, Mayuresh Vishwas Dani
Filed: 16 May 22
Utility
System and method for performing remote security assessment of firewalled computer
18 Jul 23
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed.
Wissam Ali-Ahmad, Wolfgang Kandek, Holger Kruse, Vikas Dewan, Khair-ed-dine Mazboudi, Ganesh Jampani, Kenneth K. Okumura
Filed: 23 Aug 21
Utility
Security Event Modeling and Threat Detection Using Behavioral, Analytical, and Threat Intelligence Attributes
29 Jun 23
A system for testing a security object is disclosed.
Ankur Sunil Tyagi, Mayuresh Vishwas Dani
Filed: 29 Dec 21
Utility
Quantification of Adversary Tactics, Techniques, and Procedures Using Threat Attribute Groupings and Correlation
18 May 23
The present disclosure provides a method and a system for generating a decision tree that tests security event files.
Ankur Sunil Tyagi, Mayuresh Vishwas Dani
Filed: 12 Nov 21
Utility
Attack Path and Graph Creation Based on User and System Profiling
29 Sep 22
Methods and systems for generating an attack path based on user and system risk profiles are presented.
Mayuresh Vishwas Dani, Ankur S. Tyagi, Rishikesh Jayaram Bhide
Filed: 13 Jun 22
Utility
Asset Remediation Trend Map Generation and Utilization for Threat Mitigation
15 Sep 22
The present disclosure relates to methods, systems, and computer program products for generating an asset remediation trend map used in remediating against an attack campaign.
Ankur S. Tyagi, Mayuresh Vishwas Dani
Filed: 23 May 22
Utility
Attack Kill Chain Generation and Utilization for Threat Analysis
1 Sep 22
The present disclosure relates to methods, systems, and computer program products for generating an attack kill chain for threat analysis.
Ankur S. Tyagi, Mayuresh Vishwas Dani
Filed: 16 May 22
Utility
Rest API Scanning for Security Testing
16 Jun 22
Methods and systems for securing an application programming interface (API) are presented.
Ganesh Nikam, Akash Shah
Filed: 28 Feb 22
Utility
Attack path and graph creation based on user and system profiling
14 Jun 22
Methods and systems for generating an attack path based on user and system risk profiles are presented.
Mayuresh Vishwas Dani, Ankur S. Tyagi, Rishikesh Jayaram Bhide
Filed: 19 Jul 19
Utility
Asset remediation trend map generation and utilization for threat mitigation
24 May 22
The present disclosure relates to methods, systems, and computer program products for generating an asset remediation trend map used in remediating against an attack campaign.
Ankur S. Tyagi, Mayuresh Vishwas Dani
Filed: 15 Apr 19