Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Proofpoint Inc patents


Recent patent applications related to Proofpoint Inc. Proofpoint Inc is listed as an Agent/Assignee. Note: Proofpoint Inc may have other listings under different names/spellings. We're not affiliated with Proofpoint Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "P" | Proofpoint Inc-related inventors


Systems and methods for discovering social accounts

Methods and systems allow organizations to discover accounts, subscriptions, properties, sites and other online portals within each distinct social network platform and across disparate social network platforms, publishing platforms and networks that represent, claim to represent or are relevant to their organization and/or brands based on search terms and facilitate the statistical reporting and analysis of activities on the discovered properties.. . ... Proofpoint Inc

Methods and systems for generating dashboards for displaying threat insight information

Dashboards for displaying threat insight information are provided herein, as well as systems and methods for generating the same. According to some embodiments, methods for providing a threat dashboard may include locating metrics regarding a malicious attack against a targeted resource, where the metrics indicate instances where users were exposed to the malicious attack or instances where a cloud-based threat detection system prevented the user from being exposed to the malicious attack. ... Proofpoint Inc

Privately performing application security analysis

Systems and methods for analyzing applications on a mobile device for risk so as to maintain the privacy of the application user are provided. In the example method, the process receives a request from a mobile device. ... Proofpoint Inc

Detection and prevention of fraudulent activity on social media accounts

Technology is disclosed for detecting imposters of a brand account. The technology can store a brand profile of the brand account, detect that a message has been publicly communicated to the brand account from a social media account, monitor messages sent publicly to the social media account from other social media accounts by repeatedly comparing the brand profile to metadata of each of the monitored messages, and identify at least one of the other social media accounts as an imposter account based on the comparing. ... Proofpoint Inc

Systems and methods for targeted attack protection using predictive sandboxing

Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a url from a message of a user and performing a preliminary determination to see if the url can be discarded if it is not a candidate for sandboxing. ... Proofpoint Inc

Behavior profiling for malware detection

Provided herein are systems and methods for behavior profiling of targets to determine malware presence. The method includes, in various embodiments, applying a domain specific language to a target, observing a set of temporal sequences and events of the target; determining presence of markers within the set of temporal sequences and events indicative of malware, and identifying the target as being associated with malware based on the markers. ... Proofpoint Inc

Malicious message detection and processing

Systems and methods for malicious message detection and processing are provided herein. According to various embodiments, a method includes detecting, via an intermediary node, a link included in a message, the link being associated with an unknown resource, hashing a unique identifier for a recipient of the message, coupling the hashed identifier with the link, creating an updated link, and forwarding an updated message, including the updated link, to the recipient.. ... Proofpoint Inc

Dashboards for displaying threat insight information

Dashboards for displaying threat insight information are provided herein, as well as systems and methods for generating the same. According to some embodiments, methods for providing a threat dashboard may include locating metrics regarding a malicious attack against a targeted resource, where the metrics indicate instances where users were exposed to the malicious attack or instances where a cloud-based threat detection system prevented the user from being exposed to the malicious attack. ... Proofpoint Inc

Targeted attack protection using predictive sandboxing

Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a url from a message of a user and performing a preliminary determination to see if the url can be discarded if it is not a candidate for sandboxing. ... Proofpoint Inc

Method, system and computer program product for interception, quarantine and moderation of internal communications of uncontrolled systems

Embodiments disclosed herein may intercept, quarantine, and moderate communications internal to an uncontrolled system. An example of an uncontrolled system may be a web application associated with a social networking site. ... Proofpoint Inc

Method, system and computer program product for interception, quarantine and moderation of internal communications of uncontrolled systems

Embodiments disclosed herein may intercept, quarantine, and moderate communications internal to an uncontrolled system. An example of an uncontrolled system may be a web application associated with a social networking site. ... Proofpoint Inc

Method, system and computer program product for enforcing access controls to features and subfeatures on uncontrolled web application

Embodiments disclosed herein provide feature-level access control functionality useful for enforcing access controls to features and subfeatures on uncontrolled, third party web applications such as those associated with social networking sites. Specifically, pages of uncontrolled web applications are programmatically inspected as they are accessed by users of an enterprise computing environment. ... Proofpoint Inc

Method, system, and storage medium for adaptive monitoring and filtering traffic to and from social networking sites

Embodiments disclosed herein provide a system, method, and computer readable storage medium storing computer instructions for implementing a socialware architecture encompassing a suite of applications for continuously and adaptively monitoring and filtering traffic to and from social networking sites, particularly useful in an enterprise computing environment. In some embodiments, an appliance may be coupled to a proxy server for providing a plurality of socialware services, including analyzing, logging, and reporting on traffic to and from social networking sites. ... Proofpoint Inc

Methods, systems, and computer program products for storing graph-oriented data on a column-oriented database

Systems, methods, and computer program products for efficiently storing and accessing graph-oriented information retrieved from disparate sources using an interface that effectively emulates a graph database to access a set of indexed, column-oriented tables. One embodiment is a system that includes a server and a plurality of storage nodes. ... Proofpoint Inc

01/19/17 / #20170019491

Method, system and computer program product for tagging content on uncontrolled web application

Communications by a device in a private network to a site operating outside of the network can be programmatically inspected. Unstructured data, including messages and application content, originating from outside of the network may be dynamically converted to structured data that can be tagged. ... Proofpoint Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Proofpoint Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Proofpoint Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###