18 patents
Utility
Security event modeling and threat detection using behavioral, analytical, and threat intelligence attributes
16 Jan 24
A system for testing a security object is disclosed.
Ankur Sunil Tyagi, Mayuresh Vishwas Dani
Filed: 29 Dec 21
Utility
Domain-specific language simulant for simulating a threat-actor and adversarial tactics, techniques, and procedures
31 Oct 23
The present describes simulating a threat-actor executing an attack execution operation.
Mayuresh Vishwas Dani, Ankur S. Tyagi
Filed: 29 Mar 21
Utility
Domain specific language for defending against a threat-actor and adversarial tactics, techniques, and procedures
31 Oct 23
The present disclosure describes defending against an attack execution operation.
Mayuresh Vishwas Dani, Ankur S. Tyagi
Filed: 29 Mar 21
Utility
Rest API scanning for security testing
17 Oct 23
Methods and systems for securing an application programming interface (API) are presented.
Ganesh Nikam, Akash Shah
Filed: 28 Feb 22
Utility
Asset remediation trend map generation and utilization for threat mitigation
3 Oct 23
The present disclosure relates to methods, systems, and computer program products for generating an asset remediation trend map used in remediating against an attack campaign.
Ankur S. Tyagi, Mayuresh Vishwas Dani
Filed: 23 May 22
Utility
Attack kill chain generation and utilization for threat analysis
19 Sep 23
The present disclosure relates to methods, systems, and computer program products for generating an attack kill chain for threat analysis.
Ankur S. Tyagi, Mayuresh Vishwas Dani
Filed: 16 May 22
Utility
System and method for performing remote security assessment of firewalled computer
18 Jul 23
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed.
Wissam Ali-Ahmad, Wolfgang Kandek, Holger Kruse, Vikas Dewan, Khair-ed-dine Mazboudi, Ganesh Jampani, Kenneth K. Okumura
Filed: 23 Aug 21
Utility
Attack path and graph creation based on user and system profiling
14 Jun 22
Methods and systems for generating an attack path based on user and system risk profiles are presented.
Mayuresh Vishwas Dani, Ankur S. Tyagi, Rishikesh Jayaram Bhide
Filed: 19 Jul 19
Utility
Asset remediation trend map generation and utilization for threat mitigation
24 May 22
The present disclosure relates to methods, systems, and computer program products for generating an asset remediation trend map used in remediating against an attack campaign.
Ankur S. Tyagi, Mayuresh Vishwas Dani
Filed: 15 Apr 19
Utility
Attack kill chain generation and utilization for threat analysis
17 May 22
The present disclosure relates to methods, systems, and computer program products for generating an attack kill chain for threat analysis.
Ankur S. Tyagi, Mayuresh Vishwas Dani
Filed: 15 Apr 19
Utility
Rest api scanning for security testing
1 Mar 22
Methods and systems for securing an application programming interface (API) are presented.
Ganesh Nikam, Akash Shah
Filed: 2 Jul 20
Utility
System and method for performing remote security assessment of firewalled computer
24 Aug 21
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed.
Wissam Ali-Ahmad, Wolfgang Kandek, Holger Kruse, Vikas Dewan, Khair-ed-dine Mazboudi, Ganesh Jampani, Kenneth K. Okumura
Filed: 11 May 20
Utility
Dynamic hierarchical tagging system and method
18 May 21
A dynamical hierarchical tagging system connected to a user site through a remote communications network.
Sean M. Molloy, Terry Ramos, Sumedh Thakar
Filed: 3 Apr 17
Utility
Domain-specific language simulant for simulating a threat-actor and adversarial tactics, techniques, and procedures
30 Mar 21
The present describes simulating a threat-actor executing an attack execution operation.
Mayuresh Vishwas Dani, Ankur S. Tyagi
Filed: 15 Apr 19
Utility
Domain specific language for defending against a threat-actor and adversarial tactics, techniques, and procedures
30 Mar 21
The present disclosure describes defending against an attack execution operation.
Mayuresh Vishwas Dani, Ankur S. Tyagi
Filed: 15 Apr 19
Utility
Domain specific language for threat-actor deception
23 Mar 21
The present disclosure describes enticing a threat-actor to execute an attack execution operation.
Mayuresh Vishwas Dani, Ankur S. Tyagi
Filed: 15 Apr 19
Utility
System and method for performing remote security assessment of firewalled computer
11 May 20
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed.
Wissam Ali-Ahmad, Wolfgang Kandek, Holger Kruse, Vikas Dewan, Khair-ed-dine Mazboudi, Ganesh Jampani, Kenneth K. Okumura
Filed: 28 Jun 18
Utility
Advanced asset tracking and correlation
30 Dec 19
A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network.
Sean M. Molloy, Matthew L. Wirges, Amol S. Sonawane
Filed: 8 Jul 18
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first