Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Illusive Networks Ltd patents


Recent patent applications related to Illusive Networks Ltd. Illusive Networks Ltd is listed as an Agent/Assignee. Note: Illusive Networks Ltd may have other listings under different names/spellings. We're not affiliated with Illusive Networks Ltd, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "I" | Illusive Networks Ltd-related inventors


Managing dynamic deceptive environments

A deception management system to detect attackers within a dynamically changing network of computer resources, including a deployment governor dynamically designating deception policies, each deception policy including names of non-existing web servers, and levels of diversity for planting the names of non-existing web servers in browser histories of web browsers... Illusive Networks Ltd

System and creation, deployment and management of augmented attacker map

A system for network surveillance to detect attackers, including a deception management server within a network of resources, including a deployment module managing and planting one or more decoy attack vectors in one or more of the resources in the network, wherein an attack vector is an object in memory... Illusive Networks Ltd

Predicting and preventing an attacker's next actions in a breached network

A method for cyber security, including detecting, by a management server, a breach by an attacker of a resource within a network of resources, predicting, by the management server, an attacker target subnet, based on connections created during the breach, and isolating, by the management server, the target subnet in... Illusive Networks Ltd

Automatically generating network resource groups and assigning customized decoy policies thereto

A cyber security system comprising circuitry of a decoy deployer planting one or more decoy lateral attack vectors in each of a first and a second group of resources within a common enterprise network of resources, the first and second groups of resources having different characteristics in terms of subnets,... Illusive Networks Ltd

Predicting and preventing an attacker's next actions in a breached network

A method for cyber security, including detecting, by a management server, a breach by an attacker of a resource within a network of resources, wherein access to the resources via network connections is governed by a firewall, predicting, by the management server, which servers in the network are compromised, based... Illusive Networks Ltd

Multi-factor deception management and detection for malicious actions in a computer network

A network surveillance system, including a management server within a network of resources in which users access the resources in the network based on credentials, including a deployment module planting honeytokens in resources in the network, wherein a honeytoken is an object in memory or storage of a first resource... Illusive Networks Ltd

Predicting and preventing an attacker's next actions in a breached network

A method for cyber security, including detecting, by a decoy management server, a breach by an attacker of a specific resource within a network of resources in which users access the resources based on credentials, wherein each resource has a domain name server (DNS) record stored on a DNS server,... Illusive Networks Ltd

Managing dynamic deceptive environments

A deception management system (DMS) to detect attackers within a network of computer resources, including a discovery tool auto-learning the network naming conventions for user names, workstation names, server names and shared folder names, and a deception deployer generating one or more decoy attack vectors in the one or more... Illusive Networks Ltd

System and creation, deployment and management of augmented attacker map

A system for augmenting an attacker map of a network of resources, including a deception management server within a network of resources, generating an attacker map for the network, the attacker map including one or more attack paths traversing some or all of the resources, each attack path corresponding to... Illusive Networks Ltd








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Illusive Networks Ltd in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Illusive Networks Ltd with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###