42 patents
Page 2 of 3
Utility
Attack kill chain generation and utilization for threat analysis
17 May 22
The present disclosure relates to methods, systems, and computer program products for generating an attack kill chain for threat analysis.
Ankur S. Tyagi, Mayuresh Vishwas Dani
Filed: 15 Apr 19
Utility
Rest api scanning for security testing
1 Mar 22
Methods and systems for securing an application programming interface (API) are presented.
Ganesh Nikam, Akash Shah
Filed: 2 Jul 20
Utility
Rest API Scanning for Security Testing
6 Jan 22
Methods and systems for securing an application programming interface (API) are presented.
Ganesh Nikam, Akash Shah
Filed: 2 Jul 20
Utility
System and Method for Performing Remote Security Assessment of Firewalled Computer
9 Dec 21
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed.
Wissam Ali-Ahmad, Wolfgang Kandek, Holger Kruse, Vikas Dewan, Khair-ed-dine Mazboudi, Ganesh Jampani, Kenneth K. Okumura
Filed: 23 Aug 21
Utility
Dynamic Hierarchical Tagging System and Method
2 Sep 21
A dynamical hierarchical tagging system connected to a user site through a remote communications network.
Sean M. Molloy, Terry Ramos, Sumedh Shrinand Thakar
Filed: 14 May 21
Utility
System and method for performing remote security assessment of firewalled computer
24 Aug 21
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed.
Wissam Ali-Ahmad, Wolfgang Kandek, Holger Kruse, Vikas Dewan, Khair-ed-dine Mazboudi, Ganesh Jampani, Kenneth K. Okumura
Filed: 11 May 20
Utility
Domain Specific Language for Defending Against a Threat-Actor and Adversarial Tactics, Techniques, and Procedures
5 Aug 21
The present disclosure describes defending against an attack execution operation.
Mayuresh Vishwas Dani, Ankur S. Tyagi
Filed: 29 Mar 21
Utility
Domain-Specific Language Simulant for Simulating a Threat-Actor and Adversarial Tactics, Techniques, and Procedures
15 Jul 21
The present describes simulating a threat-actor executing an attack execution operation.
Mayuresh Vishwas Dani, Ankur S. Tyagi
Filed: 29 Mar 21
Utility
Dynamic hierarchical tagging system and method
18 May 21
A dynamical hierarchical tagging system connected to a user site through a remote communications network.
Sean M. Molloy, Terry Ramos, Sumedh Thakar
Filed: 3 Apr 17
Utility
Domain-specific language simulant for simulating a threat-actor and adversarial tactics, techniques, and procedures
30 Mar 21
The present describes simulating a threat-actor executing an attack execution operation.
Mayuresh Vishwas Dani, Ankur S. Tyagi
Filed: 15 Apr 19
Utility
Domain specific language for defending against a threat-actor and adversarial tactics, techniques, and procedures
30 Mar 21
The present disclosure describes defending against an attack execution operation.
Mayuresh Vishwas Dani, Ankur S. Tyagi
Filed: 15 Apr 19
Utility
Domain specific language for threat-actor deception
23 Mar 21
The present disclosure describes enticing a threat-actor to execute an attack execution operation.
Mayuresh Vishwas Dani, Ankur S. Tyagi
Filed: 15 Apr 19
Utility
Attack Path and Graph Creation Based on User and System Profiling
21 Jan 21
Methods and systems for generating an attack path based on user and system risk profiles are presented.
Mayuresh Vishwas Dani, Ankur S. Tyagi, Rishikesh Jayaram Bhide
Filed: 19 Jul 19
Utility
Attack Kill Chain Generation and Utilization for Threat Analysis
14 Oct 20
The present disclosure relates to methods, systems, and computer program products for generating an attack kill chain for threat analysis.
Ankur S. Tyagi, Mayuresh Vishwas Dani
Filed: 14 Apr 19
Utility
Asset Remediation Trend Map Generation and Utilization for Threat Mitigation
14 Oct 20
The present disclosure relates to methods, systems, and computer program products for generating an asset remediation trend map used in remediating against an attack campaign.
Ankur S. Tyagi, Mayuresh Vishwas Dani
Filed: 14 Apr 19
Utility
Domain-Specific Language Simulant for Simulating a Threat-Actor and Adversarial Tactics, Techniques, and Procedures
14 Oct 20
The present describes simulating a threat-actor executing an attack execution operation.
Mayuresh Vishwas Dani, Ankur S. Tyagi
Filed: 14 Apr 19
Utility
Domain Specific Language for Threat-Actor Deception
14 Oct 20
The present disclosure describes enticing a threat-actor to execute an attack execution operation.
Mayuresh Vishwas Dani, Ankur S. Tyagi
Filed: 14 Apr 19
Utility
Domain Specific Language for Defending Against a Threat-Actor and Adversarial Tactics, Techniques, and Procedures
14 Oct 20
The present disclosure describes defending against an attack execution operation.
Mayuresh Vishwas Dani, Ankur S. Tyagi
Filed: 14 Apr 19
Utility
System and Method for Performing Remote Security Assessment of Firewalled Computer
26 Aug 20
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed.
Wissam Ali-Ahmad, Wolfgang Kandek, Holger Kruse, Vikas Dewan, Khair-ed-dine Mazboudi, Ganesh Jampani, Kenneth K. Okumura
Filed: 10 May 20
Utility
System and method for performing remote security assessment of firewalled computer
11 May 20
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed.
Wissam Ali-Ahmad, Wolfgang Kandek, Holger Kruse, Vikas Dewan, Khair-ed-dine Mazboudi, Ganesh Jampani, Kenneth K. Okumura
Filed: 28 Jun 18