US2020364338A1
|
|
Attribute relevance tagging in malware recognition
|
US2020336914A1
|
|
Endpoint-controlled rogue ap avoidance + rogue ap detection using synchronized security
|
WO2020106512A1
|
|
Deferred malware scanning
|
US2020107197A1
|
|
System and method for rogue access point detection
|
US2020092716A1
|
|
System and method for location-based endpoint security
|
GB202103617D0
|
|
Enterprise nework threat detection
|
WO2020030913A1
|
|
Methods and apparatus for management of a machine-learning model to adapt to changes in landscape of potentially malicious artifacts
|
US2020394305A1
|
|
Early boot driver for start-up detection of malicious code
|
US2020394300A1
|
|
Early boot driver for start-up detection of malicious code
|
GB202018976D0
|
|
Locally securing endpoints in an enterprise network using remote network resources
|
WO2019195502A1
|
|
Securing endpoints in a heterogenous enterprise network
|
US2020250309A1
|
|
Methods and apparatus for using machine learning to detect potentially malicious obfuscated scripts
|
WO2019152505A1
|
|
Managing admission of unrecognized devices onto an enterprise network
|
US2019236273A1
|
|
Methods and apparatus for detection of malicious documents using machine learning
|
US2020233962A1
|
|
Detecting obfuscated malware variants
|
WO2019122832A1
|
|
Electronic mail security using a user-based inquiry
|
WO2019084340A1
|
|
System and method for providing a secure vlan within a wireless network
|
US2019318128A1
|
|
Chain of custody for enterprise documents
|
US2020117975A1
|
|
Methods and apparatus for preserving information between layers within a neural network
|
US2020106808A1
|
|
Intrusion detection with honeypot keys
|