US2019306198A1
|
|
System and method for application software security and auditing
|
US10986090B1
|
|
Security orchestration and automation using biometric data
|
US10986128B1
|
|
Honeypot opaque credential recovery
|
US10986127B1
|
|
Dynamic management of deception systems
|
US10992708B1
|
|
Live deployment of deception systems
|
US2020213337A1
|
|
Stable network user account classifier
|
US2020195670A1
|
|
Profiling network entities and behavior
|
US2020184367A1
|
|
Automating cluster interpretation in security environments
|
US2019268271A1
|
|
Dynamic rate limiting for networked resources
|
US2020177633A1
|
|
Cluster detection and elimination in security environments
|
US2020169575A1
|
|
Detecting anomalous network activity
|
US2020169576A1
|
|
Detecting anomalous network device activity
|
US2020042614A1
|
|
File system search proxying
|
US2020145446A1
|
|
Dynamic best path determination for penetration testing
|
US2020134087A1
|
|
Search expression generation
|
US2020110833A1
|
|
Optimizing role level identification for resource allocation
|
US2020112583A1
|
|
Identifying network vulnerabilities
|
US2020106798A1
|
|
Computing entity resolution for network asset correlation
|
US2020092165A1
|
|
Honeypot asset cloning
|
US2019207977A1
|
|
Detecting malicious actors
|