| 11782877 | Search technique for noisy logs and resulting user interfaces displaying log entries in ranked order of importance | Oct 10, 2023 |
| 11601418 | System for increasing authentication complexity for access to online systems | Mar 7, 2023 |
| 11593428 | System and method for detecting errors in a task workflow from a video stream | Feb 28, 2023 |
| 11550925 | Information security system for identifying potential security threats in software package deployment | Jan 10, 2023 |
| 11520910 | System and method for routing data to authorized users based on security classification of data | Dec 6, 2022 |
| 11475668 | System and method for automatic video categorization | Oct 18, 2022 |
| 11470046 | Multi-level data channel and inspection architecture including security-level-based filters for diverting network traffic | Oct 11, 2022 |
| 11451389 | Multi-encrypted message response manager | Sep 20, 2022 |
| 11436534 | Distributed artificial intelligence model | Sep 6, 2022 |
| 11410447 | Information security assessment translation engine | Aug 9, 2022 |
| 11394733 | System for generation and implementation of resiliency controls for securing technology resources | Jul 19, 2022 |
| 11386052 | System for scanning and analysis of protected electronic data using a database schema collection | Jul 12, 2022 |
| 11366901 | System and method for identifying insider threats in source code | Jun 21, 2022 |
| 11363408 | Quantifying mobility of mobile devices via a privacy preserving mobility metric | Jun 14, 2022 |
| 11343136 | System for real time recovery of resource transfers over a distributed server network | May 24, 2022 |
| 11330145 | Image processing edge device for document noise removal | May 10, 2022 |
| 11290475 | System for technology resource centric rapid resiliency modeling | Mar 29, 2022 |
| 11233706 | System for multichannel aggregation of electronic data via a centralized integration hub | Jan 25, 2022 |
| 11165883 | Entry point classification of requests requiring access to data | Nov 2, 2021 |
| 11122054 | Security tool | Sep 14, 2021 |
| 11122021 | Server for handling multi-encrypted messages | Sep 14, 2021 |
| 11115310 | Multi-level data channel and inspection architectures having data pipes in parallel connections | Sep 7, 2021 |
| 11017117 | Pre-firewall data classification | May 25, 2021 |
| 10826801 | Multi-level data channel and inspection architectures | Nov 3, 2020 |
| 10824734 | System for recurring information security threat assessment | Nov 3, 2020 |
| 10613905 | Systems for analyzing historical events to determine multi-system events and the reallocation of resources impacted by the multi system event | Apr 7, 2020 |
| 10616261 | System for information security threat assessment based on data history | Apr 7, 2020 |
| 10607013 | System for information security threat assessment and event triggering | Mar 31, 2020 |
| 10437708 | System for refreshing and sanitizing testing data in a low-level environment | Oct 8, 2019 |
| 10250639 | Information infrastructure management data processing tools for processing data flow with distribution controls | Apr 2, 2019 |
| 10182073 | Information infrastructure management tools with variable and configurable filters and segmental data stores | Jan 15, 2019 |
| 09734169 | Digital information infrastructure and method for security designated data and with granular data stores | Aug 15, 2017 |
| 09619505 | Data health management | Apr 11, 2017 |
| 09466044 | Use of organization chart to direct mail items from central receiving area to organizational entities using clusters based on a union of libraries | Oct 11, 2016 |
| 09418150 | System and process for concept tagging and content retrieval | Aug 16, 2016 |
| 09361304 | Automated data purge in an electronic discovery system | Jun 7, 2016 |
| 09344409 | Method and apparatus for masking non-public data elements in uniform resource indentifiers (“URI”) | May 17, 2016 |
| 09104659 | Systems and methods for providing content aware document analysis and modification | Aug 11, 2015 |
| 09038187 | Insider threat correlation tool | May 19, 2015 |
| 09015301 | Information infrastructure management tools with extractor, secure storage, content analysis and classification and method therefor | Apr 21, 2015 |
| 08973140 | Handling information security incidents | Mar 3, 2015 |
| 08959642 | Real time lockdown | Feb 17, 2015 |
| 08904526 | Enhanced network security | Dec 2, 2014 |
| 08838554 | Systems and methods for providing content aware document analysis and modification | Sep 16, 2014 |
| 08800034 | Insider threat correlation tool | Aug 5, 2014 |
| 08793789 | Insider threat correlation tool | Jul 29, 2014 |
| 08782794 | Detecting secure or encrypted tunneling in a computer network | Jul 15, 2014 |
| 08782209 | Insider threat correlation tool | Jul 15, 2014 |
| 08544100 | Detecting secure or encrypted tunneling in a computer network | Sep 24, 2013 |
| 08417716 | Profile scanner | Apr 9, 2013 |
| 08256004 | Control transparency framework | Aug 28, 2012 |
| 08196207 | Control automation tool | Jun 5, 2012 |