Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls; Filtering policies Filtering by address, protocol, port number or service, e.g. IP-address or URL
ATTRIBUTE-BASED POLICIES FOR INTEGRITY MONITORING AND NETWORK INTRUSION DETECTION
#2Reconstructing a Dataset After Detection of a Network Security Threat in a Network
#3INTERNET PROTOCOL (IP) CURATOR
#4DYNAMIC FILTER GENERATION AND DISTRIBUTION WITHIN COMPUTER NETWORKS
#5DATA PLANE FRAMEWORK FOR REDIRECTING DATA PACKETS
#6VALIDATION OF CONNECTION REQUESTS FOR A FIREWALL
#7COMPUTERIZED SYSTEM FOR PERIMETER INTERFACE FOR ALIAS ELECTRONIC ADDRESSES
#8SELECTIVE HANDLING OF TRAFFIC RECEIVED FROM ON-PREMISES DATA CENTERS
#9AUTOMATED EMAIL ACCOUNT COMPRISE DETECTION AND REMEDIATION
#10SYSTEMS AND METHODS FOR MITIGATING DDOS ATTACKS ON INTERNET PROTOCOL NETWORKS
#11CONNECTION DESTINATION MALIGNANCY DETERMINATION SYSTEM, CONNECTION DESTINATION MALIGNANCY DETERMINATION PROGRAM, AND CONNECTION DESTINATION MALIGNANCY DETERMINATION METHOD
#12TRACKING DATA-PATH READINESS OF SECURITY SERVICES INSERTED IN MIDDLE MILE AND CLOUD GATEWAYS
#13SYSTEMS AND METHODS FOR ARTIFICIAL TRAFFIC DETECTION
#14DETECTING VISUAL SIMILARITY BETWEEN DNS FULLY QUALIFIED DOMAIN NAMES
#15SYSTEM AND METHOD FOR TRAFFIC-BASED COMPUTING INTERFACE MISCONFIGURATION DETECTION
#16SMART NETWORK SWITCHING SYSTEMS AND RELATED METHODS
#17SYSTEMS AND METHODS FOR CONFIGURING NETWORKING DEVICES
#18Spam Telephone Call Reducer
#19INTRUSION DETECTION USING A HEARTBEAT
#20PREDICTIVE DNS CACHE TO IMPROVE SECURITY AND PERFORMANCE
#21SECURING AN APPLICATION OR SERVICE OVER A NETWORK INTERCONNECT USING A DEDICATED EGRESS IP ADDRESS
#22NETWORK INTRUSION PREVENTION IN EDGE COMPUTING ENVIRONMENTS
#23ILLICIT ROUTE VIEWING SYSTEM AND METHOD OF OPERATION
#24NODE MONITORING TO DETECT MISCLASSIFIED ON-CHAIN ADDRESSES
#25EFFICIENT SUBORDINATE REQUEST WEB PAGE LOGGING
#26METHOD AND SYSTEM FOR MONITORING HEALTH AND SECURITY OF DATA CENTER COMPONENTS VIA BI-DIRECTIONAL PROXY
#27Enforcing a Segmentation Policy in Co-Existence with a System Firewall
#28PACKET PROCESSING FOR NETWORK SECURITY GROUPS
#29APPARATUS FOR SECURED COMMUNICATION BETWEEN CONTROL DEVICES IN A VEHICLE, ELECTRONIC PROCESSING UNIT, AND VEHICLE
#30TRANSPORT LAYER PROTOCOL STATE HANDLING FOR BORDER GATEWAY PROTOCOL (BGP) PROCESSES
#31SYSTEMS AND METHODS FOR IN-PROCESS URL CONDEMNATION
#32SECURE CONNECTIONS BETWEEN SERVERS IN A VIRTUAL PRIVATE NETWORK
#33SYSTEMS AND METHODS FOR BLOCKING SPOOFED TRAFFIC
#34DOMAIN NAME SYSTEM (DNS) SECURITY
#35SYSTEM AND METHOD FOR PROVIDING NETWORK AND COMPUTER FIREWALL PROTECTION WITH DYNAMIC ADDRESS ISOLATION TO A DEVICE
#36DOMAIN SQUATTING DETECTION
#37System For Protecting Against Prying IoT Devices
#38TRANSACTION SECURITY SYSTEMS AND METHODS
#39AUTOMATED CREATION OF TRUSTED NETWORK PERIMETER
#40Security Techniques for Device Assisted Services
#41CYBERSECURITY ANALYSIS AND PROTECTION USING DISTRIBUTED SYSTEMS
#42SYSTEMS AND METHODS FOR SECURITY POLICY ORGANIZATION USING A DUAL BITMAP
#43TECHNIQUES FOR GENERATING SIGNATURES CHARACTERIZING ADVANCED APPLICATION LAYER FLOOD ATTACK TOOLS
#44FLOW BASED BREAKOUT OF FIREWALL USAGE BASED ON TRUST
#45METHOD FOR IDENTIFYING AND MANAGING QUIC CONNECTIONS FOR MIDDLEBOXES
#46DETECTING AND ALERTING ON DOMAIN FRONTING WITHIN A NETWORK
#47SYSTEM AND METHOD FOR SAFELY RELAYING AND FILTERING KERBEROS AUTHENTICATION AND AUTHORIZATION REQUESTS ACROSS NETWORK BOUNDARIES
#48BYPASSING IKE FIREWALL FOR CLOUD-MANAGED IPSEC KEYS IN SDWAN FABRIC
#49SYSTEM AND METHODS FOR CLOUD-BASED VIRTUAL PRIVATE SECURED CONTAINED COMMUNICATION PORTAL
#50Randomized SPI for Distributed IPsec
#51INTELLIGENT SERVICE LAYER FOR SEPARATING APPLICATION FROM PHYSICAL NETWORKS AND EXTENDING SERVICE LAYER INTELLIGENCE OVER IP ACROSS THE INTERNET, CLOUD, AND EDGE NETWORKS
#52DEVICE FOR BLOCKING HACKING AND METHOD THEREFOR
#53SYSTEM AND METHOD FOR DETECTING AND COUNTERING MALICIOUS CODE
#54SYSTEM AND METHOD FOR KERNEL-LEVEL ACTIVE DARKNET MONITORING IN A COMMUNICATION NETWORK
#55METHOD FOR IDENTIFYING SOURCE ADDRESS OF PACKET AND APPARATUS
#56STATELESS CLOUD AUTHENTICATION FOR SECURITY SERVICES
#57SYSTEM AND METHODS FOR FILTERING IN OBLIVIOUS DEPLOYMENTS AND DEVICES THEREOF
#58INTRA-VLAN TRAFFIC FILTERING IN A DISTRIBUTED WIRELESS NETWORK
#59SYSTEMS AND METHODS FOR PRIVATE AUTHENTICATION WITH HELPER NETWORKS
#60SYSTEMS AND/OR METHODS TO LIMIT QUERY HANDLING
#61APPLICATION FIREWALL
#62HIERARCHICAL NOVELTY DETECTION USING INTENDED STATES FOR NETWORK SECURITY
#63SYSTEM AND METHODS FOR PROACTIVE PROTECTION AGAINST MALFEASANT DATA COLLECTION
#64PROXY SERVER WITH DYNAMIC MEMORY BUFFER
#65SECURING ACCESS TO NETWORK DEVICES UTILIZING AUTHENTICATION AND DYNAMICALLY GENERATED TEMPORARY FIREWALL RULES
#66NETWORK TRAFFIC INSPECTION
#67Localization at scale for a cloud-based security service
#68APPLICATION PROGRAMMING INTERFACE (API) SECURITY
#69SYSTEM, METHOD, AND APPARATUS TO EXECUTE VEHICLE COMMUNICATIONS USING A ZONAL ARCHITECTURE
#70SUPPORTING LOCAL HOST TRAFFIC IN REMOTE DEVICE INFRASTRUCTURE
#71SYSTEM AND METHOD FOR SEGMENTING TRANSIT CAPABILITIES WITHIN A MULTI-CLOUD ARCHITECTURE
#72SYSTEMS AND METHODS FOR INTERNAL SECURE NETWORK RESOLUTION
#73REACTIVE NETWORK SECURITY FOR A BUILDING AUTOMATION SYSTEM
#74DATA TRANSMISSION METHOD AND RELATED DEVICE
#75Zero Trust Network Access and Virtual Private Network Client Offloading
#76NETWORK SECURITY FOR MULTIPLE FUNCTIONAL DOMAINS
#77INTERNET ACCESS MANAGEMENT SERVICE SERVER THAT CAN MANAGE INTERNET ACCESS FOR ELECTRONIC TERMINALS THROUGH SETTING OF SCHEDULING RULES FOR INTERNET USE RESTRICTION AND THE OPERATING METHOD THEREOF
#78Conditional egress IP for delivery of localized content
#79Cloud data lake platform and SaaS orchestration
#80DETECTION AND BLOCKING SYSTEM AND METHOD THROUGH MULTI-CONTAINER-BASED ENCRYPTED PACKET DECRYPTION
#81SYSTEM AND METHODS FOR AUTOMATED COMPUTER SECURITY POLICY GENERATION AND ANOMALY DETECTION
#82SYSTEMS AND METHODS FOR VIRTUAL PRIVATE NETWORK AUTHENTICATION
#83INTELLIGENT FIREWALL FLOW CREATOR
#84METHOD AND SYSTEM FOR MANAGING TRAFFIC PACKETS
#85Intelligent Firewall Flow Processor
#86NETWORK MANAGEMENT FOR BLOCKING UNAUTHORIZED ACCESS
#87SYSTEM, METHOD, AND APPARATUS TO EXECUTE VEHICLE COMMUNICATIONS USING A ZONAL ARCHITECTURE
#88DIFFERENTIATED SERVICE IN A FEDERATION-BASED ACCESS NETWORK
#89TRUST-BASED DYNAMIC ACCESS CONTROL SYSTEM
#90Methods and Systems for Efficient Encrypted SNI Filtering for Cybersecurity Applications
#91COMMUNICATION METHOD AND COMMUNICATION APPARATUS
#92SYSTEMS AND METHODS FOR DETECTING AND PREVENTING FRAUD IN A VIDEO CONFERENCING SYSTEM
#93MOBILE USER IDENTITY AND/OR SIM-BASED IOT IDENTITY AND APPLICATION IDENTITY BASED SECURITY ENFORCEMENT IN SERVICE PROVIDER NETWORKS
#94Isolating Internet-of-Things (IoT) Devices Using a Secure Overlay Network
#95DETECTING HOMOGRAPHS OF DOMAIN NAMES
#96NETWORK SECURITY ANALYSIS SYSTEM WITH REINFORCEMENT LEARNING FOR SELECTING DOMAINS TO SCAN
#97SYSTEMS AND METHODS FOR DETERMINING ASSET IMPORTANCE IN SECURITY RISK MANAGEMENT
#98Data management system for networked endpoints
#99Systems and Methods for Automatic Connection of Client Device to Remote Private Network
#100SYSTEM, METHOD, AND APPARATUS FOR EXTRA VEHICLE COMMUNICATIONS CONTROL
#101SYSTEM, METHOD, AND APPARATUS FOR EXTRA VEHICLE COMMUNICATIONS CONTROL
#102SYSTEM, METHOD, AND APPARATUS TO EXECUTE VEHICLE COMMUNICATIONS USING A ZONAL ARCHITECTURE
#103SYSTEMS AND METHODS FOR ENHANCED ZTNA SECURITY
#104SYSTEM, METHOD, AND APPARATUS TO EXECUTE VEHICLE COMMUNICATIONS USING A ZONAL ARCHITECTURE
#105SYSTEM, METHOD, AND APPARATUS TO EXECUTE VEHICLE COMMUNICATIONS USING A ZONAL ARCHITECTURE
#106SYSTEM, METHOD, AND APPARATUS TO EXECUTE VEHICLE COMMUNICATIONS USING A ZONAL ARCHITECTURE
#107FIREWALL INSIGHTS PROCESSING AND MACHINE LEARNING
#108DATA PROCESSING METHOD, LIVESTREAMING METHOD, AUTHENTICATION SERVER, AND LIVE DATA SERVER
#109ZERO-TRUST ARCHITECTURE FOR SECURE AGGREGATION IN FEDERATED LEARNING
#110METHOD FOR IDENTIFYING AND MANAGING QUIC CONNECTIONS FOR MIDDLEBOXES
#111SYSTEM AND METHOD FOR SAFELY RELAYING AND FILTERING KERBEROS AUTHENTICATION AND AUTHORIZATION REQUESTS ACROSS NETWORK BOUNDARIES
#112SYSTEM AND METHODS FOR CLOUD-BASED VIRTUAL PRIVATE SECURED CONTAINED COMMUNICATION PORTAL
#113FIREWALL DRIFT MONITORING AND DETECTION
#114Intelligent service layer for separating application from physical networks and extending service layer intelligence over IP across the internet, cloud, and edge networks
#115BORDER GATEWAY PROTOCOL (BGP) FLOWSPEC ORIGINATION AUTHORIZATION USING ROUTE ORIGIN AUTHORIZATION (ROA)
#116DEVICE FOR BLOCKING HACKING AND METHOD THEREFOR
#117INFORMATION SECURITY EARLY WARNING DEVICE AND METHOD THEREOF
#118QUIC AND ANYCAST PROXY RESILIENCY
#119THREAT DETECTION AND PREVENTION FOR INFORMATION SYSTEMS
#120SYSTEMS AND METHODS FOR IMPROVING FUNCTIONALITY AND REMOTE MANAGEMENT OF COMPUTING RESOURCES DEPLOYED IN A CONTROLLED HIERARCHICAL NETWORK
#121SYSTEMS AND METHODS FOR USING A NETWORK ACCESS DEVICE TO SECURE A NETWORK PRIOR TO REQUESTING ACCESS TO THE NETWORK BY THE NETWORK ACCESS DEVICE
#122CLOUD-BASED ZERO TRUST NETWORK ACCESS SERVICE
#123DEVICE, SYSTEM, AND METHOD FOR PROVISIONING FIREWALL ENGINES
#124SYSTEM AND METHOD FOR VIRTUAL INTERFACES AND ADVANCED SMART ROUTING IN A GLOBAL VIRTUAL NETWORK
#125Command and Control Steganographic Communications Detection Engine
#126METHOD AND APPARATUS FOR DYNAMIC OUTBOUND FIREWALLING VIA DOMAIN NAME SYSTEM (DNS)
#127USING A WEBSOCKET CONNECTION TO SEND MESSAGES FROM AN OFF-PREMISES NODE TO AN ON-PREMISES NODE
#128INTERNET OF THINGS (IOT) DEVICE IDENTIFICATION USING TRAFFIC PATTERNS
#129OPTIMIZING COMMUNICATION IN A VIRTUAL PRIVATE NETWORK DURING BLOCKING OF AN EXIT INTERNET PROTOCOL ADDRESS
#130OPTIMIZING COMMUNICATION IN A VIRTUAL PRIVATE NETWORK DURING BLOCKING OF AN EXIT INTERNET PROTOCOL ADDRESS
#131OPTIMIZING COMMUNICATION IN A VIRTUAL PRIVATE NETWORK DURING BLOCKING OF AN EXIT INTERNET PROTOCOL ADDRESS
#132Secure connections between servers in a virtual private network
#133Secure connections between servers in a virtual private network
#134Secure connections between servers in a virtual private network
#135System and method for server monitoring and problem resolution for electronic mail messages
#136Name-based routing through networks
#137METHOD FOR TRAINING ISOLATION FOREST, AND METHOD FOR RECOGNIZING WEB CRAWLER
#138VIRTUAL CLOUD WORKLOAD PROTECTION PLATFORM AND RELATED APPLICATION PROGRAMMING INTERFACES
#139Identity-based application of domain filtering rules using domain name system (DNS) platform
#140PROFILE-BASED ROUTING AND ACCESS CONTROL FOR MANAGEMENT INTERFACE OF VIRTUAL NETWORK SERVICES
#141CUSTOMIZED FILTERING OF TRANSMISSIONS FROM A DEVICE
#142Name-based routing through networks
#143SYSTEM AND METHOD FOR PROVIDING A VIRTUAL AUTHENTICATOR AND SUPPLICANT
#144UTILIZATION OF MULTIPLE EXIT INTERNET PROTOCOL ADDRESSES IN A VIRTUAL PRIVATE NETWORK
#145UTILIZATION OF MULTIPLE EXIT INTERNET PROTOCOL ADDRESSES IN A VIRTUAL PRIVATE NETWORK
#146Utilization of multiple exit internet protocol addresses in a virtual private network
#147SECURE PRIVATE TRAFFIC EXCHANGE IN A UNIFIED NETWORK SERVICE
#148Hosted email authentication
#149An Encoding and Decoding Method and System for Route Origin Authorization (ROA)
#150Methods and systems for efficient adaptive logging of cyber threat incidents
#151SYSTEM AND METHOD FOR PROACTIVE BLOCKING OF REMOTE DISPLAY PROTOCOL CONNECTION REQUESTS FROM SUSPICIOUS USERS AND DEVICES
#152METHOD FOR SECURELY COMMUNICATING EMAIL CONTENT BETWEEN A SENDER AND A RECIPIENT
#153AUTOMATIC ENCRYPTION FOR CLOUD-NATIVE WORKLOADS
#154OPTIMIZED UTILIZATION OF INTERNET PROTOCOL ADDRESSES IN A VIRTUAL PRIVATE NETWORK
#155CONTROLLER-BASED NETWORK ACCESS CONTROL SYSTEM, AND METHOD THEREOF
#156TERMINAL DEVICE, NETWORK NODE, AND METHODS THEREIN FOR DERIVATION OF QoS RULE
#157SECURITY DEVICE, METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIA
#158DISTRIBUTED IDENTITY-BASED FIREWALL POLICY EVALUATION
#159Filtering packets of network traffic using probabilistic pattern matching
#160ON THE FLY CERTIFICATE GENERATION
#161SYSTEM, METHOD, AND APPARATUS TO EXECUTE VEHICLE COMMUNICATIONS USING A ZONAL ARCHITECTURE
#162Systems and Methods for Securing a Quantum-Safe Digital Network Environment
#163Secure firewall configurations
#164Method and apparatus for controlling computing assets within a zero-trust architecture
#165NETWORK SERVICE PLAN DESIGN
#166Computerized system for inserting management information into electronic communication systems
#167Methods for traffic redirection, corresponding terminal, controller, authorisation server, name resolution servers and computer program
#168EXTENDING CLOUD-BASED VIRTUAL PRIVATE NETWORKS TO RADIO-BASED NETWORKS
#169IDENTITY-BASED POLICY ENFORCEMENT IN WIDE AREA NETWORKS
#170COBALT STRIKE BEACON HTTPS C2 HEURISTIC DETECTION
#171PROBING FOR COBALT STRIKE TEAMSERVER DETECTION
#172IN-VEHICLE RELAY DEVICE, RELAY METHOD, AND RECORDING MEDIUM STORING PROGRAM
#173PROVIDING SUBSTITUTE DOMAIN INFORMATION IN A VIRTUAL PRIVATE NETWORK
#174BEACON AND THREAT INTELLIGENCE BASED APT DETECTION
#175DETECTING SHADOWED DOMAINS
#176COMBINED PFCP SESSION MODEL FOR NETWORK ACCESS BY RESIDENTIAL GATEWAYS
#177Identifying Malware Devices with Domain Name System (DNS) Queries
#178SELECTING ACTIONS RESPONSIVE TO COMPUTING ENVIRONMENT INCIDENTS BASED ON SEVERITY RATING
#179Systems and Methods for Cyber Threat Detection Based on New and/or Updated Cyber Threat Intelligence
#180RECONFIGURABLE ROBOTIC MANUFACTURING CELLS
#181INFORMATION PROCESSING METHOD AND APPARATUS, AND COMMUNICATION DEVICE
#182IDENTITY FIREWALL WITH CONTEXT INFORMATION TRACKING
#183Distributed network security system providing isolation of customer data
#184PER-HOST ACCESS LISTS
#185Systems and Methods for Redirecting Service and API Calls for Containerized Applications
#186COMMUNICATION DEVICE AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE
#187Marking spoke links for network segregation and service chaining in hub and spoke overlay networks
#188INTERNET PROTOCOL BASED SECURITY OVER PORT FORWARDING TUNNELS
#189Persistent IP address allocation for virtual private network (VPN) clients
#190STORING AND ACCESSING OVERLAPPING INTERNET PROTOCOL (IP) ADDRESS RANGES
#191Chassis system management through data paths
#192Rule-based network-threat detection
#193INTERNET PROTOCOL (IP) VERSION 6 FRAGMENTATION AND REASSEMBLY OPTIMIZATION FOR PORT-AWARE IP TRANSLATORS
#194EXTENSION OF NETWORK CONTROL SYSTEM INTO PUBLIC CLOUD
#195Hybrid customer premises equipment and cloud-based implementation of dynamic residential threat detection
#196MESSAGE SECURITY ASSESSMENT USING SENDER IDENTITY PROFILES
#197PROVIDING SSL CONNECTIVITY INSIDE SOFTWARE DEFINED DATACENTERS WITH HYPERCONVERGED INFRASTRUCTURE
#198SYSTEMS AND METHODS FOR DNS SMART ACCESS
#199Filtering System, Computer-Executed Method for Filtering to Restrict Access to the Internet, and Computer-Readable Recording Medium
#200Methods and Systems for Efficient Encrypted SNI Filtering for Cybersecurity Applications
#201GEOMETRIC BASED FLOW PROGRAMMING
#202Bookmarking Support for Federated Login Pages
#203Preventing Data Loss Using Enhanced Analysis of the URLs and URIs in Webpage Requests
#204DISTRIBUTED HARDWARE VULNERABILITY IDENTIFICATION AND RESOLUTION
#205Transparent inline secure forwarder for policy enforcement on IoT devices
#206Access control lists rules reduction
#207INTELLIGENT FIREWALL USING IDENTIFICATION OF VALID TRAFFIC
#208EFFICIENT PROVISIONING OF INTERNET CIRCUIT AND SECURE DOMAIN NAME SYSTEM
#209Dynamic firewall configuration
#210Managing security actions in a computing environment based on movement of a security threat
#211SYSTEMS FOR NETWORK RISK ASSESSMENT INCLUDING PROCESSING OF USER ACCESS RIGHTS ASSOCIATED WITH A NETWORK OF DEVICES
#212Techniques for selective container access to cloud services based on hosting node
#213METHOD AND A SYSTEM OF TUNNELING TRAFFIC IN A DISTRIBUTED NETWORK FOR DETECTING MALWARE
#214Multiple Virtual Private Network Active Connection Management
#215TECHNIQUES FOR ONBOARDING WEB APPLICATIONS IN A ZERO TRUST ENVIRONMENT
#216CONTROL LINK FOR ADULT TOY OPERATION AND METHOD FOR USING THE SAME
#217METHOD FOR SECURELY COMMUNICATING EMAIL CONTENT BETWEEN A SENDER AND A RECIPIENT
#218MULTIPLE HOST WEB AUTHENTICATION ON THE SAME PORT USING SEGMENT SECURITY
#219POLICY-BASED DYNAMIC VPN PROFILE SELECTION USING DNS PROTOCOL
#220Authorization and audit control in a multi-protocol IoT domain
#221Automated creation of trusted network perimeter
#222UPGRADING FIREWALL MODULE ON PORT-BY-PORT BASIS
#223ONION ROUTING NETWORK FOR SMART HOMES
#224OPTIMAL DATA PLANE SECURITY & CONNECTIVITY FOR SECURED CONNECTIONS
#225MECHANISM FOR TRAFFIC DETECTION IN CASE OF ENCRYPTED TRAFFIC
#226FIREWALL SWITCHOVER WITH MINIMIZED SESSION DISCONNECTION
#227SYSTEMS AND METHODS FOR PROVIDING A GLOBAL VIRTUAL NETWORK (GVN)
#228CROSS-ORIGIN RESOURCE HANDLING FOR WEB CONTENT
#229RULE SELECTION MANAGEMENT BASED ON CURRENTLY AVAILABLE DOMAIN NAME SYSTEM (DNS) SERVERS
#230CONTENT-BASED DEEP LEARNING FOR INLINE PHISHING DETECTION
#231DATA ROUTING OPTIONS FOR A VPN
#232Enforcing a segmentation policy in co-existence with a system firewall
#233Cumulative sum model for IP deny lists
#234Network security gateway onboard an aircraft to connect low and high trust domains of an avionics computing infrastructure
#235SECURING METRICS FOR A POD
#236ALLOCATING A PACKET TO A MEDIA SESSION CONTROLLER
#237Spam telephone call reducer
#238METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR ADDRESS ENCRYPTION
#239SYSTEM AND METHOD FOR SECURING IoT DEVICES THROUGH A GATEWAY
#240Secure message exchange between deployments
#241PROXY DIRECT CONNECT
#242SYSTEM AND METHOD FOR DETECTING DICTIONARY-BASED DGA TRAFFIC
#243Efficient Packet Capture for Cyber Threat Analysis
#244MANAGING DYNAMIC UPDATES FOR SECURITY GROUPS
#245IN-LINE DETECTION OF ALGORITHMICALLY GENERATED DOMAINS
#246MITIGATING MALICIOUS NETWORK TRAFFIC
#247METHOD AND DEVICE FOR SECURELY ACCESSING INTRANET APPLICATION
#248MANAGEMENT OF SHARED AUTHENTICATION CREDENTIALS
#249ALGORITHM TO DETECT MALICIOUS EMAILS IMPERSONATING BRANDS
#250Positive Enforcement Domain Name Service Firewall
#251Efficient and flexible flow inspector
#252METHODS AND APPARATUSES FOR PROVIDING INTERNET-BASED PROXY SERVICES
#253IPsec load balancing in a session-aware load balanced cluster (SLBC) network device
#254METHOD AND SYSTEM FOR SECURING NETWORK FUNCTIONS IN DISAGGREGATED NETWORKS
#255CONTAINERIZED FIREWALL IN AN EMBEDDED DEVICE FOR PROTECTING AGAINST MALICIOUS DATA TRAFFIC ON A DATA COMMUNICATION NETWORK
#256Dynamic filter generation and distribution within computer networks
#257Firewall system with application identifier based rules
#258Network monitoring with differentiated treatment of authenticated network traffic
#259Unified network service that connects multiple disparate private networks and end user client devices operating on separate networks
#260MACHINE LEARNING AND VALIDATION OF ACCOUNT NAMES, ADDRESSES, AND/OR IDENTIFIERS
#261SYSTEMS AND METHODS FOR CONFIGURING ENCAPSULATION TUNNELS BASED ON DYNAMIC CAPACITY CHECKS
#262Rule-based network-threat detection
#263Isolating internet-of-things (IoT) devices using a secure overlay network
#264Multi-variate anomalous access detection
#265AUTHENTICATION OF SECURITY SEALS USING DYNAMIC AUTHENTICATION INFORMATION
#266SYSTEM AND METHOD FOR NETWORK-CONNECTED DEVICE SECURITY
#267Illicit route viewing system and method of operation
#268DETECTION AND MITIGATION OF HIGH-RISK ONLINE ACTIVITY IN A COMPUTING PLATFORM
#269FIREWALL IN A VIRTUALIZED COMPUTING ENVIRONMENT USING PHYSICAL NETWORK INTERFACE CONTROLLER (PNIC) LEVEL FIREWALL RULES
#270Managing data communication in a virtual private network
#271Systems and methods for security policy organization using a dual bitmap
#272METHOD, APPARATUS, AND SYSTEM FOR DETERMINING DATA FLOW INFORMATION
#273Systems, Methods, and Media for Distributed Network Monitoring Using Local Monitoring Devices
#274DATA TRANSMISSION METHOD WITH SELECTIVE LATENCY REDUCTION
#275MANAGING TRAFFIC RULES IN ASSOCIATION WITH FULLY QUALIFIED DOMAIN NAMES (FQDNS) USING POSTURE INFORMATION ASSOCIATED WITH DNS RECORDS
#276Synchronizing dynamic host configuration protocol snoop information
#277NETWORK SECURITY PROTECTION METHOD AND PROTECTION DEVICE
#278SYSTEM AND METHOD FOR LEAK PREVENTION FOR DOMAIN NAME SYSTEM REQUESTS
#279AUTOMATIC PROXY SYSTEM, AUTOMATIC PROXY METHOD AND NON-TRANSITORY COMPUTER READABLE MEDIUM
#280IDENTIFYING VIRTUAL PRIVATE NETWORK SERVERS FOR USER DEVICES
#281PRE-EMPTIVE FLOW DROPPING IN A CLOUD-BASED SECURE ACCESS SERVICE
#282Method and apparatus for providing IP address filtering
#283PHYSICAL HARDWARE CONTROLLER FOR PROVISIONING SECURITY SERVICES ON PROCESSING DEVICES
#284Enabling communications between applications in a mobile operating system
#285Compact logging for cloud and web security
#286APPARATUS INCLUDING A TRANSCEIVER
#287Method for discriminating a message between a terminal and a data server
#288Method and system for providing time-critical services via a flow control environment
#289STATELESS AND SECURE PACKET FORWARDING
#290Attribute-based policies for integrity monitoring and network intrusion detection
#291Securing collaboration tools against unauthorized data exfiltration
#292Bypassing IKE firewall for cloud-managed IPSec keys in SDWAN fabric
#293SYSTEMS AND METHODS FOR USER DEFINED NETWORK ENABLED CONTENT FILTERING
#294Local network device connection control
#295System and method for looking up an IP address in an IP address space
#296METHOD TO SAFEGUARD AGAINST EMAIL PHISHING ATTACKS
#297Firewall System for Controlling Data Flow Between Computing Resources
#298Classification and forwarding of network traffic flows
#299LOW-COMPLEXITY DETECTION OF POTENTIAL NETWORK ANOMALIES USING INTERMEDIATE-STAGE PROCESSING
#300DESTINATION-BASED POLICY SELECTION AND AUTHENTICATION