Network architectures or network communication protocols for network security for managing network security; network security policies in general
Sub-classes:SELF-ADJUSTING CYBERSECURITY ANALYSIS AND SCORE GENERATION
#2USED CACHED SUMMARIES FOR EFFICENT ACCESS ANALYSIS FOR CLOUD PROVIDER ENTITIES
#3Third-Party Declarative Transaction Verification
#4IDENTITY-AWARE SECURE NETWORK
#5ANALYTICS FOR PROCESSING INFORMATION SYSTEM DATA
#6VOTING AS LAST RESORT ACCESS RECOVERY FOR ACCESS MANAGEMENT
#7DATA SHARING METHOD, APPARATUS AND SYSTEM, AND SERVER AND COMPUTER STORAGE MEDIUM
#8CREATING GRAPHICAL MODELS OF NETWORK SECURITY POLICIES AND DISPLAYING ON A NETWORK TOPOLOGY GRAPH
#9System and Method for Authenticating Client Devices Communicating with an Enterprise System
#10REMOTE CLUSTER ENROLLMENT
#11IOT MULTICAST OUT-OF-BAND CYBERSECURITY MESSAGING SYSTEM AND METHOD
#12MANAGING ACTIVE AND STANDBY GATEWAYS USING DUPLICATE ADDRESS DETECTION PACKETS
#13AUTOMATICALLY DETECTING AUTHORIZED REMOTE ADMINISTRATION SESSIONS IN A NETWORK MONITORING SYSTEM
#14DYNAMIC SECURITY FOR FABRIC NETWORKS
#15METHODS AND APPARATUS FOR FLEXIBLE USE OF FREQUENCY BANDS
#16SYSTEMS AND METHODS FOR DISTRIBUTING SD-WAN POLICIES
#17ORDERING SECURITY INCIDENTS USING ALERT DIVERSITY
#18ACCESS CONTROL SYSTEM, ACCESS CONTROL METHOD, AND ACCESS CONTROL PROGRAM
#19SYSTEMS AND METHODS FOR DYNAMIC POLICY ASSIGNMENT OF SECURE COMMUNICATION SESSIONS USING SPDM
#20DYNAMIC UNLOCKING OF SOFTWARE DEFINED SILICON (SDSi) PROCESSOR FEATURES VIA SECURITY PROTOCOL DATA MODEL (SPDM)
#21Systems and Methods for Distributed Remote Access
#22SYSTEMS AND METHODS FOR FIRMWARE PASSWORD MANAGEMENT
#23TECHNIQUES FOR SIMULTANEOUSLY ACCESSING MULTIPLE ISOLATED SYSTEMS WHILE MAINTAINING SECURITY BOUNDARIES
#24Providing Meeting Controls For Network Conferences
#25MACHINE LEARNING TECHNIQUES FOR ASSOCIATING ASSETS RELATED TO EVENTS WITH ADDRESSABLE COMPUTER NETWORK ASSETS
#26AUTOMATICALLY COMPUTING AND IMPROVING A CYBERSECURITY RISK SCORE
#27SELF-ADJUSTING CYBERSECURITY ANALYSIS WITH NETWORK MAPPING
#28IDENTIFYING SERVERLESS FUNCTIONS WITH OVER-PERMISSIVE ROLES
#29ENFORCING SECURITY POLICIES IN A ZERO TRUST SECURITY FRAMEWORK USING A BEHAVIORAL SCORE
#30DYNAMIC PERMISSIONS MANAGEMENT FOR CLOUD WORKLOADS
#31SYSTEMS AND METHODS FOR SCHEDULED POLICY DEPLOYMENT IN OPERATIONAL TECHNOLOGY NETWORKS
#32Methods and Apparatus to Automate Cyber Defense Decision Process and Response Actions by Operationalizing Adversarial Technique Frameworks
#33DETECTING TAMPERING WITH HOSTED SERVICES
#34METHOD AND SYSTEM FOR MONITORING HEALTH AND SECURITY OF DATA CENTER COMPONENTS VIA BI-DIRECTIONAL PROXY
#35SYSTEM AND METHODS FOR CONTROLLED ACCESS TO COMPUTER RESOURCES
#36INTEGRATION PACKAGING FOR A MULTI-TENANT COMPUTING ENVIRONMENT
#37ENHANCED CLOUD ACCESS SECURITY BROKER FUNCTIONALITY UTILIZING IN-BAND APPLICATION OBSERVABILITY
#38ZERO-TRUST ATTESTATION IN CLOUD COMPUTING
#39Sharing System Access Using a Device
#40Enforcing a Segmentation Policy in Co-Existence with a System Firewall
#41ALTERNATE MEANS TO SHARING CONFIGURATION ACROSS MULTIPLE FIREWALLS OR GROUPS OF FIREWALLS
#42REMOTE MANAGEMENT OF HOSTED SERVICES
#43Incrementally Validating Security Policy Code Using Information From An Infrastructure As Code Repository
#44VERIFYING TRUSTED EXECUTION ENVIRONMENTS FOR ONLINE APPLICATIONS USING IN-APPLICATION CONTENT
#45SYSTEM AND METHOD FOR SELF-ADJUSTING CYBERSECURITY ANALYSIS AND SCORE GENERATION
#46Zero trust policy engine for controlling access to network applications
#47QUALITY OF TRUST FRAMEWORK FOR WIRELESS COMMUNICATION NETWORKS
#48USING CROSS WORKLOADS SIGNALS TO REMEDIATE PASSWORD SPRAYING ATTACKS
#49SYSTEMS AND METHODS FOR INTELLIGENCE VERIFICATION
#50ACTION BASED ON PRE-IMPLEMENTATION DETERMINATION WHETHER A PROPOSED ROLE ASSIGNMENT ASSOCIATED WITH A ROLE HIERARCHY CONFORMS TO SECURITY PROPERTIES
#51Context-Based Risk Assessment for an Identity Verification System
#52DIGITAL DATA PASSPORT AND VISA CREDENTIALING FOR DATA AUTHORIZATION
#53AUTO-CORRECTING DEFICIENCIES OF A SYSTEM
#54AUTOMATED EDGE DRIVEN COLLABORATIVE DATA PROTECTION POLICY MANAGEMENT IN LARGE SCALE EDGE ENVIRONMENTS
#55SCENARIO-BASED ACCESS ENTITLEMENT ENGINE AND CONTROLLER
#56SECURE SYSTEM FOR HIDING REGISTRATION RULES FOR DYNAMIC CLIENT REGISTRATION
#57SECURITY AUDIT OF DATA-AT-REST
#58USING CATEGORIZATION TAGS FOR RULE GENERATION AND UPDATE IN A RULES-BASED SECURITY SYSTEM
#59CYBER SECURITY SYSTEM AND METHOD USING INTELLIGENT AGENTS
#60MULTI-OBJECTIVE COMPUTER INFRASTRUCTURE VULNERABILITY PRIORITIZATION
#61Policy based traffic inspection in zero trust private networks
#62ENHANCED CLOUD INFRASTRUCTURE SECURITY THROUGH RUNTIME VISIBILITY INTO DEPLOYED SOFTWARE
#63INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE
#64METHOD AND SYSTEM FOR DETERMINING AND ACTING ON A STRUCTURED DOCUMENT CYBER THREAT RISK
#65AUTOMATED USER PROFILE PROVISIONING IN MULTI-TENANT CLOUD NETWORKS
#66FILTERING PASSWORDS BASED ON A PLURALITY OF CRITERIA
#67STATIC ANALYSIS TECHNIQUES FOR DETERMINING REACHABILITY PROPERTIES OF NETWORK AND COMPUTING OBJECTS
#68NETWORK-BOUNDARY CONVERGED MULTI-LEVEL SECURE COMPUTING SYSTEM
#69PERSONAL DEVICE NETWORK FOR USER IDENTIFICATION AND AUTHENTICATION
#70ACCESS LAYER SYSTEMS OF PEER DATA PROCESSING NODES PROVIDING A SECURITY FRAMEWORK AND TRUST CONTROLS
#71DYNAMIC METHOD INVOCATION FOR ZERO-DAY EXPLOITS
#72DETECTING KERBEROS TICKET ATTACKS WITHIN A DOMAIN
#73SCALEABLE RISK MANAGEMENT ASSESSMENT SYSTEM AND METHOD
#74INTERCEPTING WORTHLESS REQUESTS AT THE NETWORK EDGE USING MACHINE LEARNING
#75ADAPTIVE SECURITY ARCHITECTURE BASED ON STATE OF POSTURE
#76ADAPTIVE SECURITY ARCHITECTURE USING EMBEDDED PROTECTION IN VENDOR APPLICATIONS
#77MAC ADDRESS AND CONTROLLED PORT BASED NETWORK ACCESS MANAGEMENT
#78IDENTITY EXPERIENCE FRAMEWORK
#79Device Searching Method, Apparatus and System
#80USING SECURE MULTI-PARTY COMPUTATION TO IMPROVE CONTENT SELECTION PROCESS INTEGRITY
#81SYSTEM AND METHOD FOR IMPLEMENTING DATA SOVEREIGNTY SAFEGUARDS IN A DISTRIBUTED SERVICES NETWORK ARCHITECTURE
#82SYSTEM AND METHODS FOR USING CIPHER OBJECTS TO PROTECT DATA
#83APPARATUS AND METHOD FOR CONDUCTING ENDPOINT-NETWORK-MONITORING
#84ENHANCED BLOCKCHAIN DATA COMPUTING PLATFORM FOR STRATEGIC MASTER DATA MANAGEMENT
#85SMALL-FOOTPRINT ENDPOINT DATA LOSS PREVENTION
#86MANAGING EDGE NETWORK PROTECTION SERVICE
#87IMAGE FORMING DEVICE RESTRICTING TRANSMISSION OF EMAIL HAVING SCAN DATA TO EMAIL ADDRESS WHEN MEMORY STORES NO DOMAIN MATCHING DOMAIN OF THE MAIL ADDRESS
#88SYSTEM AND METHOD FOR PROVIDING NETWORK AND COMPUTER FIREWALL PROTECTION WITH DYNAMIC ADDRESS ISOLATION TO A DEVICE
#89TECHNIQUES FOR PROCESSING QUERIES RELATED TO NETWORK SECURITY
#90SYSTEMS AND METHODS FOR AUTOMATICALLY RENDERING AND DEPLOYING NETWORK SECURITY POLICIES
#91CONTEXT-BASED SECURITY IN MOBILE NETWORKS USING AN API AND A DATA STORE
#92THREAT MITIGATION SYSTEM AND METHOD
#93MONITORING AND REMEDIATION OF SECURITY DRIFT EVENTS IN A PUBLIC CLOUD NETWORK
#94AUTOMATED SECURITY POLICY GENERATION FOR CONTROLLERS
#95ENFORCING GOVERNANCE AND DATA SOVEREIGNTY POLICIES ON A COMPUTING DEVICE USING A DISTRIBUTED LEDGER
#96SYSTEMS AND METHODS FOR MANAGING THE GENERATION OR DELETION OF RECORD OBJECTS BASED ON ELECTRONIC ACTIVITIES AND COMMUNICATION POLICIES
#97SYSTEM FOR DYNAMIC NETWORK SECURITY CONTROL
#98SESSION RECOVERY MECHANISM
#99Methods and Systems for Prevention of Attacks Associated with the Domain Name System
#100METHODS AND APPARATUS FOR SECURE CONFIGURATION OF A COMPUTE DEVICE
#101EFFICIENT AND SECURE COMMUNICATION USING WIRELESS SERVICE IDENTIFIERS
#102SYSTEMS AND METHODS CONFIGURED TO ENABLE AN OPERATING SYSTEM FOR CONNECTED COMPUTING THAT SUPPORTS USER USE OF SUITABLE TO USER PURPOSE RESOURCES SOURCED FROM ONE OR MORE RESOURCE ECOSPHERES
#103METHOD, APPARATUS AND SYSTEM FOR NETWORK CONNECTION, AND SERVER AND MEDIUM
#104ENFORCING SECURITY POLICIES AND ATTESTATION ON EDGE INFRASTRUCTURE
#105SYSTEM AND METHOD FOR ALGORITHM CROWDSOURCING, MONETIZATION, AND EXCHANGE
#106CYBERSECURITY RECONNAISSANCE, ANALYSIS, AND SCORING USING DISTRIBUTED SYSTEMS
#107REPORTING OF DELTA CHANNEL QUALITY INDICATOR (CQI)-MODULATION AND CODING SCHEME (MCS) INFORMATION
#108Software Defined Remote Access for Zero-Trust Support
#109ANALYZING CLOUD COMPUTING SERVICES (CCS) ACCOUNTS USING CCS APPLICATION PROGRAMMING INTERFACES TO ENFORCE SECURITY POLICIES
#110SYSTEMS, METHODS, AND DEVICES FOR SECURITY ENHANCEMENTS IN CLOUD COMPUTING ENVIRONMENTS
#111Control of Cloud Infrastructure Configuration
#112METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR IMPROVING INTER-PUBLIC LAND MOBILE NETWORK (PLMN) ROUTING ACROSS SECURITY EDGE PROTECTION PROXIES (SEPPs) BY IMPLEMENTING HEALTH CHECKS FOR REMOTE SEPPs
#113System and Method for Assigning Threat Valuations to Network Events and Security Events
#114INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE
#115Method And System For Improving Enriching Experiences
#116SYSTEMS AND METHODS FOR MANAGING WORKSPACE CAPABILITIES
#117DYNAMIC INHERITANCE OF SECURITY POLICIES ACROSS DIFFERENT VIRTUAL SECURITY ZONES
#118TRANSACTION SECURITY SYSTEMS AND METHODS
#119USE OF MULTIFACTOR AUTHENTICATION IN ASSESSING SUSPICIOUS ACTIVITY
#120Method and System of Securing VPN Communications
#121AUTOMATED CREATION OF TRUSTED NETWORK PERIMETER
#122Optimizing Cyber Security Projects
#123Security Techniques for Device Assisted Services
#124PERSISTENT SOURCE VALUES FOR ASSUMED ALTERNATIVE IDENTITIES
#125FRAMEWORKS AND INTERFACES FOR OFFLOAD DEVICE-BASED PACKET PROCESSING
#126TRANSPORTATION SECURITY APPARATUS, SYSTEM, AND METHOD TO ANALYZE IMAGES TO DETECT A THREAT CONDITION
#127CYBERSECURITY ANALYSIS AND PROTECTION USING DISTRIBUTED SYSTEMS
#128HONEYPOT ENTITY AND METHOD OF OPERATING THE SAME
#129CLOUD-TO-EDGE WORKLOAD ORCHESTRATION
#130DATA INVOCATION METHOD AND APPARATUS
#131SYSTEMS AND METHODS FOR SECURE, SCALABLE ZERO TRUST SECURITY PROCESSING
#132SYSTEMS AND METHODS FOR SECURITY POLICY ORGANIZATION USING A DUAL BITMAP
#133INFERENTIAL ANALYSIS USING FEEDBACK FOR EXTRACTING AND COMBINING CYBER RISK INFORMATION
#134CENTRALIZED COMPLIANCE MANAGEMENT PLATFORM FOR SECURITY OBJECTS
#135SECURITY POSTURE VISUALIZATION
#136TECHNIQUES FOR GENERATING SIGNATURES CHARACTERIZING ADVANCED APPLICATION LAYER FLOOD ATTACK TOOLS
#137GENERATING PASSWORD COMPLEXITY RULES BASED ON ATTACK PATTERN ANALYSIS USING HASH SEGMENTATION
#138RISK LEVEL FOR MODIFYING SECURITY SAFEGUARDS
#139USER CONTACT CONTROL IN A NETWORK APPLICATION
#140SYSTEMS AND METHODS FOR TEMPORARY ACCESS WITH ADAPTIVE TRUST LEVELS FOR AUTHENTICATION AND AUTHORIZATION
#141MANAGING CREDENTIALS USABLE IN THE ORCHESTRATION OF WORKSPACES BY MULTIPLE REMOTE ORCHESTRATORS
#142STRETCHED EPG AND MICRO-SEGMENTATION IN MULTISITE FABRICS
#143CONFIGURABLE NETWORK SECURITY FOR NETWORKED ENERGY RESOURCES, AND ASSOCIATED SYSTEMS AND METHODS
#144SYSTEM AND METHODS FOR USING CIPHER OBJECTS TO PROTECT DATA
#145DEVICES, SYSTEMS, AND METHODS FOR STANDARDIZING AND STREAMLINING THE DEPLOYMENT OF SECURITY INFORMATION AND EVENT MANAGEMENT ARTIFACTS FOR MULTIPLE TENANTS
#146FAST FILE SERVER METHODS AND SYSTEMS
#147CERTIFICATE BASED SECURITY FOR DECLARATIVE OPERATIONS
#148IDENTIFYING PERSONALIZED OR ALTERED WEBPAGE CONTENT USING A BROWSER EXTENSION TOOL
#149Systems and Methods for Network Security
#150SYSTEMS AND METHODS FOR VULNERABILITY PROOFED CLUSTER MANAGEMENT
#151DETECTING ANOMALOUS DOWNLOADS
#152ADVANCED INTRUSION PREVENTION MANAGER
#153SYSTEMS AND METHODS FOR DRAG AND DROP MAPPING
#154MANAGING AND DEPLOYING CUSTOM INTRUSION DETECTION SYSTEM SIGNATURE POLICIES
#155VEHICLE COMMUNICATION APPARATUS, IN-VEHICLE NETWORK SYSTEM, AND VEHICLE COMMUNICATION METHOD
#156SYSTEM AND METHOD FOR RESTRICTING COMMUNICATIONS BETWEEN VIRTUAL PRIVATE CLOUD NETWORKS THROUGH SECURITY DOMAINS
#157APPARATUSES, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR OFFLINE AUTHENTICATION
#158SYSTEMS AND METHODS FOR RECOGNIZING NEW DEVICES
#159AUTHENTICATION TRANSLATION
#160Signature reporting system and method
#161CERTIFICATE BASED SECURITY FOR DECLARATIVE OPERATIONS
#162CERTIFICATE BASED SECURITY FOR DECLARATIVE OPERATIONS
#163DATA ACCESS UNDER REGULATORY CONSTRAINTS
#164Wireless Network Service Interfaces
#165SYSTEMS AND METHODS OF INFORMATION SECURITY MONITORING WITH THIRD-PARTY INDICATORS OF COMPROMISE
#166SYSTEM AND METHOD FOR DATA SET CREATION WITH CROWD-BASED REINFORCEMENT
#167SYSTEM AND METHOD FOR APPLYING A POLICY ON A NETWORK PATH
#168NETWORK SECURITY MANAGEMENT METHOD, AND APPARATUS
#169METHOD AND SYSTEM FOR VIRTUAL MACHINE AWARE POLICY MANAGEMENT
#170MANAGING COMPUTING SYSTEM CONFIGURATIONS FOR SECURITY QUALITY OF SERVICE (QOS)
#171SYSTEMS AND METHODS FOR POLICY UNDO IN OPERATIONAL TECHNOLOGY DEVICES
#172SYSTEMS AND METHODS FOR PROVISIONAL POLICIES IN OPERATIONAL TECHNOLOGY DEVICES
#173HIERARCHICAL POLICY-BASED DECISION FRAMEWORK FOR CLOUD-NATIVE TELECOMMUNICATION SYSTEMS
#174SYSTEMS AND METHODS FOR CYBER RISK ASSESSMENT FOR COMPUTING SYSTEMS
#175Methods and Apparatus for Network Control
#176SYSTEMS AND METHODS FOR INTELLIGENTLY GENERATING CYBERSECURITY CONTEXTUAL INTELLIGENCE AND GENERATING A CYBERSECURITY INTELLIGENCE INTERFACE
#177Detecting and Remediating Anomalies of a Container System by a Distributed Storage System
#178AUTOMATED INCIDENT RESPONSE TRACKING AND ENHANCED FRAMEWORK FOR CYBER THREAT ANALYSIS
#179Techniques For Automatically Configuring Minimal Cloud Service Access Rights For Container Applications
#180ENCRYPTED CACHE PROTECTION
#181SYSTEM AND METHOD FOR TRACKING DATA TRANSFERRED IN A DISTRIBUTED NETWORK VIA SECURED, LAYERED DATA TAGGING
#182METHOD AND SYSTEM FOR TRAINING NON-TECHNICAL USERS ON HIGHLY COMPLEX CYBER SECURITY TOPICS
#183PRESERVATION OF SCORES OF THE QUALITY OF TRAFFIC TO NETWORK SITES ACROSS CLIENTS AND OVER TIME
#184SYSTEMS AND METHODS FOR CYBERSECURITY RISK ASSESSMENT
#185TRUSTED EXECUTION BROKER
#186Network Traffic Capture
#187COMPLEX IT PROCESS ANNOTATION, TRACING, ANALYSIS, AND SIMULATION
#188PLATFORM FOR MANAGEMENT AND TRACKING OF COLLABORATIVE PROJECTS
#189CREATING SIMULATION MODELS FOR COMPLEX ADAPTIVE SYSTEMS USING A MULTI-MODEL, GENERATIVE APPROACH
#190SERVICE RISK DISCOVERY BASED ON RISK OBJECTS
#191USING AN END-TO-END POLICY CONTROLLER TO AUTOMATICALLY DISCOVER AND INVENTORY ENFORCEMENT POINTS IN A NETWORK
#192USING AN END-TO-END POLICY CONTROLLER TO SPLIT POLICIES BETWEEN ENFORCEMENT POINTS IN A NETWORK
#193SYSTEM AND METHOD FOR SECURING CLOUD BASED SERVICES
#194APPLICATION FIREWALL
#195DETECTING A SPOOFED ENTITY BASED ON COMPLEXITY OF A DISTRIBUTION OF EVENTS INITIATED BY THE SPOOFED ENTITY
#196NETWORK BASED HYPERLOCAL AUTHENTICATION
#197HIERARCHICAL NOVELTY DETECTION USING INTENDED STATES FOR NETWORK SECURITY
#198SYSTEM AND METHOD FOR IMPROVED RENDERING OF USER INTERFACE FOR CYBERSECURITY MONITORING SYSTEM
#199SYSTEM AND METHODS FOR PROACTIVE PROTECTION AGAINST MALFEASANT DATA COLLECTION
#200INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE
#201PEER-TO-PEER OFFLINE ACCESS MODE
#202MULTI-FACTOR AUTHENTICATION USING SYMBOLS
#203NETWORK TRAFFIC INSPECTION
#204LOCALIZATION AT SCALE FOR A CLOUD-BASED SECURITY SERVICE
#205COMPUTERIZED SYSTEM FOR DYNAMIC IMAGE INCLUSION IN AN ELECTRONIC MESSAGE
#206APPLICATION MONITORING PRIORITIZATION
#207PEER-TO-PEER UPDATING OF OFFLINE DEVICES
#208SYSTEMS AND METHODS TO PROTECT AGAINST INFORMATION DISCLOSURE
#209MODELING MULTI-PERIL CATASTROPHE USING A DISTRIBUTED SIMULATION ENGINE
#210EPISTEMIC UNCERTAINTY REDUCTION USING SIMULATIONS, MODELS AND DATA EXCHANGE
#211MULTI-LAYER BROWSER-BASED CONTEXT EMULATION DETECTION
#212THREAT AWARE SERVICE MESH
#213Endpoint-assisted inspection of encrypted network traffic
#214INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE
#215System and method of anomalous configuration-related activity
#216Generating zero-trust policy for application access utilizing knowledge graph based application segmentation
#217DATA EXCHANGE ON A DISTRIBUTED COMPUTING SYSTEM
#218SYSTEM AND METHOD FOR SEGMENTING TRANSIT CAPABILITIES WITHIN A MULTI-CLOUD ARCHITECTURE
#219SECURITY POLICY ENFORCEMENT FOR ADDITIONAL INSTANCES OF AN APPLICATION
#220SYSTEMS AND METHODS FOR INTERNAL SECURE NETWORK RESOLUTION
#221SYSTEM AND METHOD OF ASSIGNING REPUTATION SCORES TO HOSTS
#222SECURE ATTESTATION OF ENDPOINT CAPABILITY
#223Dynamic Data Storage Based on Estimated Update Frequency
#224INTENT-BASED ENTERPRISE SECURITY USING DYNAMIC LEARNING OF NETWORK SEGMENT PREFIXES
#225SYSTEM FOR AUTOMATED CAPTURE AND ANALYSIS OF BUSINESS INFORMATION FOR RELIABLE BUSINESS VENTURE OUTCOME PREDICTION
#226MASSIVELY SCALABLE COMPUTER PLATFORM USING A DISTRIBUTED COMPUTATIONAL GRAPH
#227SYSTEM AND METHOD FOR MANIPULATION OF SECURE DATA
#228SYNTHETIC REQUEST INJECTION FOR REAL-TIME CLOUD SECURITY POSTURE MANAGEMENT
#229DATA TRANSMISSION METHOD AND RELATED DEVICE
#230SECURITY POLICY COMPLIANCE VERIFICATION AND CERTIFICATION AS A SERVICE LEVERAGING SYSTEMS PROVIDING ACCESS MANAGEMENT AS A SERVICE
#231SYSTEMS AND METHODS THAT PERFORM FILTERING, LINKING, AND RENDERING
#232METHOD, PRODUCT, AND SYSTEM FOR TRANSLATING ENTITY PRIORITIZATION RULES TO A CONTINUOUS NUMERICAL SPACE
#233A LIGHTWEIGHT ATTACKER IDENTIFICATION METHOD FOR FEDERATED LEARNING WITH SECURE BYZANTINE-ROBUST AGGREGATION VIA CLUSTERING
#234Identity Adapter and Method
#235Systems and Methods to Ensure Proximity of a Multi-Factor Authentication Device
#236REMOTE CERTIFICATE AUTHORITY MANAGEMENT
#237AUTOMATICALLY DETECTING AUTHORIZED REMOTE ADMINISTRATION SESSIONS IN A NETWORK MONITORING SYSTEM
#238RULES ENGINE FOR SELECTIVELY GRANTING ACCESS TO SECURED RESOURCES
#239METHOD FOR CONFIGURING ACTIONS RESPONSIVE TO CONDITIONS OF ASSETS CONNECTED TO A COMPUTER NETWORK
#240NETWORK SECURITY FOR MULTIPLE FUNCTIONAL DOMAINS
#241SYSTEMS AND METHODS FOR PROTECTION OF AUTHORITATIVE NAME SERVERS
#242METHOD, APPARATUS, AND SYSTEM TO MAP NETWORK REACHABILITY
#243DISASTER SCENARIO BASED INFERENTIAL ANALYSIS USING FEEDBACK FOR EXTRACTING AND COMBINING CYBER RISK INFORMATION
#244POLICY-BASED IP ADDRESS ALLOCATION
#245MATCHING DEVICE, MATCHING METHOD, AND MATCHING PROGRAM
#246INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE
#247INTERNET ACCESS MANAGEMENT SERVICE SERVER THAT CAN MANAGE INTERNET ACCESS FOR ELECTRONIC TERMINALS THROUGH SETTING OF SCHEDULING RULES FOR INTERNET USE RESTRICTION AND THE OPERATING METHOD THEREOF
#248VALIDATING COMPLIANCE OF ROLES WITH ACCESS PERMISSIONS
#249SECURING IN-VEHICLE SERVICE ORIENTED ARCHITECTURE WITH MAC GENERATE ALLOW LIST
#250SYSTEM AND METHOD FOR CREATING A SECURE HYBRID OVERLAY NETWORK
#251CONDITIONAL EGRESS IP FOR DELIVERY OF LOCALIZED CONTENT
#252Cloud data lake platform and SaaS orchestration
#253CONFIGURING A REMOTE ELECTRONIC DEVICE BY A PEER ELECTRONIC DEVICE IN A NETWORKED ENVIRONMENT
#254Privacy Border for a Portion of Resources on a Computing Machine
#255SYSTEM AND METHODS FOR AUTOMATED COMPUTER SECURITY POLICY GENERATION AND ANOMALY DETECTION
#256SYSTEM FOR PROVIDING END-TO-END SECURITY SERVICE USING PORTABLE SECURITY UNIT BASED ON INTELLIGENT HOME NETWORK
#257PREDICTIVE LOAD BALANCING FOR A DIGITAL ENVIRONMENT
#258INTELLIGENT AUTOMATED PLANNING SYSTEM FOR LARGE-SCALE OPERATIONS
#259ENHANCED AUTHORIZATION LAYERS FOR NATIVE ACCESS TO SECURE NETWORK RESOURCES
#260EFFICIENT UPDATING OF DEVICE-LEVEL SECURITY CONFIGURATION BASED ON CHANGES TO SECURITY INTENT POLICY MODEL
#261AUTHORIZATION POLICY VALIDATION
#262AUTHORIZATION POLICY EVALUATION
#263SECURITY EVENT TRANSFORMATION AND LOGGING SYSTEMS AND METHODS
#264AGENTLESS IN-MEMORY CACHING FOR NATIVE NETWORK RESOURCE CONNECTIONS
#265ROLE-BASED PERMISSION DELEGATION IN A PROVIDER NETWORK
#266AGENTLESS SINGLE SIGN-ON FOR NATIVE ACCESS TO SECURE NETWORK RESOURCES
#267SYSTEMS AND METHODS FOR VIRTUAL PRIVATE NETWORK AUTHENTICATION
#268MANAGEMENT SYSTEM, MANAGEMENT METHOD, AND SERVER DEVICE
#269Software Defined Community Cloud
#270DYNAMIC, RUNTIME APPLICATION PROGRAMMING INTERFACE PARAMETER LABELING, FLOW PARAMETER TRACKING AND SECURITY POLICY ENFORCEMENT USING API CALL GRAPH
#271SYSTEM AND METHOD FOR INTERNET ACTIVITY AND HEALTH FORECASTING AND INTERNET NOISE ANALYSIS
#272SECURITY POLICY SELECTION BASED ON CALCULATED UNCERTAINTY AND PREDICTED RESOURCE CONSUMPTION
#273SYSTEM FOR DYNAMIC COMMUNICATION CHANNEL SWITCHING BASED ON PRECONFIGURED NETWORK SECURITY PROTOCOLS
#274Method, Apparatus and computer readable storage medium for processing data of a security protocol
#275VOTING AS LAST RESORT ACCESS TO PREVENT ERRONEOUS OR MALICIOUS CHANGES
#276Method and System for Forensic Data Tracking
#277REGION-BASED AUTHENTICATION AND ACCESS POLICIES FOR SERVICES
#278MONITORING APPARATUS AND CONTROL METHOD THEREOF
#279IDENTITY PROXY AND ACCESS GATEWAY
#280SYSTEMS AND METHODS FOR CREATING FINGERPRINTS OF ENCRYPTION DEVICES
#281APPARATUS FOR CONTROLLING AND BLOCKING USER ACCESS USING WEB APPLICATION PROXY
#282ENHANCED INTERNET PROTOCOL SECURITY MANAGEMENT FOR VIRTUAL PRIVATE NETWORK CONCENTRATORS
#283METHOD AND SYSTEM FOR SECURE OPERATIONS, ADMINISTRATION, AND MANAGEMENT FOR REMOTE NETWORKS
#284SHARING SECURITY SETTINGS BETWEEN ENTITIES USING VERIFIABLE CREDENTIALS
#285MANAGING PRE-PROVISIONING AND POST-PROVISIONING OF RESOURCES USING BITEMPORAL ANALYSIS
#286BROWSER EXTENSION ACCESS BASED ON RE-AUTHORIZATION
#287DATA PLATFORM WITH UNIFIED PRIVILEGES
#288MOBILE USER IDENTITY AND/OR SIM-BASED IOT IDENTITY AND APPLICATION IDENTITY BASED SECURITY ENFORCEMENT IN SERVICE PROVIDER NETWORKS
#289ENTERPRISE SECURITY IN METERS
#290Software-Defined Wide Area Network Self-Service for Service Assurance
#291MANAGING TRAFFIC CONTROL IN A NETWORK MITIGATING DDOS
#292Isolating Internet-of-Things (IoT) Devices Using a Secure Overlay Network
#293Facilitating direct device-to-cloud communications within a secure deployment management system
#294SYSTEMS AND METHODS FOR SECURING LOGIN ACCESS
#295CREDENTIAL DEPENDENCY ENCODING AND VERIFICATION BASED ON OTHER CREDENTIAL RESOURCES
#296NETWORK SECURITY ANALYSIS SYSTEM WITH REINFORCEMENT LEARNING FOR SELECTING DOMAINS TO SCAN
#297ROUND TRIP TIME (RTT) MEASUREMENT BASED UPON SEQUENCE NUMBER
#298SYSTEM AND METHOD FOR PROVIDING NETWORK SUPPORT SERVICES AND PREMISES GATEWAY SUPPORT INFRASTRUCTURE
#299ENTERPRISE DOCUMENT CLASSIFICATION
#300DATA PROTECTION SYSTEM