206 patents
Page 4 of 11
Utility
Misdirected Email Data Loss Prevention
8 Dec 22
Aspects of the disclosure relate to data loss prevention.
Shalini Sundaram, Chris Moores, Prasad Velagaleti, Srikanth Konjarla, Harsh Doshi
Filed: 7 Jun 22
Utility
Misdirected Email Data Loss Prevention
8 Dec 22
Aspects of the disclosure relate to data loss prevention.
Shalini Sundaram, Chris Moores, Prasad Velagaleti, Srikanth Konjarla, Harsh Doshi
Filed: 7 Jun 22
Utility
Lookalike Domain Identification
8 Dec 22
Aspects of the disclosure relate to identifying domain name lookalikes.
Abigail Lauren Berger, Jos Dijkstra Dijkstra
Filed: 7 Jun 22
Utility
Hierarchical Risk Assessment and Remediation of Threats In Mobile Networking Environment
17 Nov 22
Mobile device security techniques are described.
Ramana M. Mylavarapu, Ajay Nigam, Vipin Balkatta Hegde
Filed: 21 Jul 22
Utility
Managing and Routing of Endpoint Telemetry Using Realms
3 Nov 22
A computer network includes user endpoint devices geographically distributed relative to one another such that at least one of the endpoint devices is subject to a different set of data protection or privacy restrictions than other endpoint devices and data processing facilities coupled to the user endpoint devices over a network.
Alexander Kremer, Khurram Ghofoor, Marc Steven Burt
Filed: 21 Sep 20
Utility
Systems and Methods for Dynamic Dmarc Enforcement
3 Nov 22
A dynamic Domain-based Message Authentication, Reporting, and Conformance (DMARC) enforcement solution is disclosed.
Alexander Scott Fryback, Robert Michael Fleming, JR.
Filed: 6 Jul 22
Utility
Apparatus and methods thereof for inspecting events in a computerized environment respective of a unified index for granular access control
1 Nov 22
An apparatus collects data from a data network for the purpose of detection and interception of security incidents therein.
Doron Elgressy, Yair Grindlinger, Boris Gorin
Filed: 17 Jan 20
Utility
Dynamically initiating and managing automated spear phishing in enterprise computing environments
1 Nov 22
Aspects of the disclosure relate to dynamic and automated spear phishing management.
Nathan James Grealish
Filed: 18 Dec 19
Utility
Focused Image Grabbing
27 Oct 22
A computer-based method includes monitoring user activities at an endpoint device on a computer network, determining if one of the user activities at the endpoint device presents a potential threat to network security, creating an alert of the potential threat, and providing, with the alert, a redacted version of a screenshot from the endpoint device.
Yigal Meshlum, Tamir Pivnik, David Cohen, Alexander Kremer, Mayank Choudhary, Tal Tikotzki, Mike McKee, Nir Barak, Tal Yaffee
Filed: 22 Sep 20
Utility
System and methods for agentless managed device identification as part of setting a security policy for a device
25 Oct 22
Systems, methods, and apparatuses directed to efficiently determining whether a device making a request to access an application or service is a managed device and using that information to set an appropriate security policy for the device or the request to access the application or service.
Amit Abershitz
Filed: 15 Dec 20
Utility
Distributed Attribute Based Access Control as means of Data Protection and Collaboration in Sensitive (Personal) Digital Record and Activity Trail Investigations
20 Oct 22
A distributed system provides access by a principal to a resource associated with sensitive data.
Alexander Kremer, Tamir Pivnik
Filed: 22 Sep 20
Utility
System and Method for Light Data File Duplication Prevention
20 Oct 22
A system for preventing duplication of a computer source file to a destination file includes a user application accessed by a user of a computer.
Guy Ziv, Boris Traktirnik, Nir Barak, Tal Tikotzki, Sagi Schechter, Rotem Gingold
Filed: 15 Apr 21
Utility
Globally-distributed secure end-to-end identity-based overlay network
18 Oct 22
A communication system includes multiple Point-of-Presence (POP) interfaces and one or more processors.
Etay Bogner
Filed: 6 Jul 21
Utility
System, apparatus and method for dynamically updating the configuration of a network device
18 Oct 22
A system, apparatus and method are provided for dynamically updating a configuration of a network device when relevant sources and destinations of network traffic are added, removed or migrated in a network.
Theron D. Tock, Vadim Kurland, Michael P. Horn
Filed: 17 May 21
Utility
Bulk Messaging Detection and Enforcement
13 Oct 22
Aspects of the disclosure relate to providing commercial and/or spam messaging detection and enforcement.
Thomas Lee, Sarah Solieman
Filed: 29 Jun 22
Utility
Dynamically controlling access to linked content in electronic communications
11 Oct 22
Aspects of the disclosure relate to dynamically controlling access to linked content in electronic communications.
Conor Brian Hayes, Michael Edward Jones, Alina V. Khayms, Kenny Lee, David Jonathan Melnick, Adrian Knox Roston
Filed: 15 May 20
Utility
System and method of protecting client computers
11 Oct 22
A threat response platform to act as a bridge between non-inline security programs and inline security programs.
Theron D. Tock, Michael P. Horn
Filed: 16 Jan 20
Utility
Systems and Methods for Query Term Analytics
6 Oct 22
A query term analytics system receives a search query from a user device.
Jeremiah Ness
Filed: 30 Mar 21
Utility
Reduction of Data Transmissions Based on End-user Context
22 Sep 22
A computer-based method of reducing or limiting data transmissions from a computer to a remote network destination includes receiving an indication, at an agent on a computer, that a recent user activity has occurred at the computer.
Nir Barak, Alex Kremer, Tamir Pivnik, Yigal Meshulam, Igal Weinstein, Efim Kuimov
Filed: 6 Jun 22
Utility
Managing data exfiltration risk
20 Sep 22
A computer-based method is disclosed to facilitate managing data exfiltration risk in a computer network environment.
Oded Tietz, Mayank Choudhary, Nir Barak, Micky Oland, Tal Shemesh, Yigal Meshulam, Lior Calif
Filed: 27 Aug 18