Fireeye, Inc. FEYE
United States C Corporation
 |
No tags have been applied so far. Sign in to add some. |
|
|
 |
 |
 |
 |
 |
Ahuja, Deepak P.
|
Alexy Kimberly
|
Andrews Sara C
|
Aziz, Ashar
|
Bailey, Peter
|
 |
 |
 |
 |
 |
Berry, Michael J.
|
Codd Ronald E F
|
Coughran William M Jr
|
Coviello Arthur W Jr
|
Dewalt David G
|
 |
 |
 |
 |
 |
Garg, Gaurav
|
Haque Promod
|
Howard Matthew D.
|
King Alexa
|
Lentz Robert F
|
 |
 |
 |
 |
 |
Mahbod, Bahman
|
Mandia Kevin R.
|
Mcdermott, Adrian
|
McGee John T
|
Medina, James
|
 |
 |
 |
 |
 |
Patel Viral
|
Pusey Stephen Charles
|
Reese Travis M.
|
Robbins William T
|
Salem Enrique T
|
 |
 |
 |
 |
 |
Sequoia Capital Xi
|
Sequoia Capital Xi Principals Fund
|
Sheridan Michael J
|
Switz Robert E
|
Verdecanna Frank
|
 |
 |
|
|
|
Watters, John P.
|
Williams, Jeffrey C.
|
|
|
|
Go Pro to view an analysis and graphs of case roles, types and more.
|
|
9/4/2018 |
Superior Court of California, County of Santa Clara |
18CV333879 |
Yang Zhang v. FireEye Inc |
Defendant |
|
|
|
10/28/2016 |
USPTO Patent Trial and Appeal Board |
IPR2017-00157 |
FireEye, Inc. v. Finjan, Inc. |
Petitioner |
|
|
|
10/28/2016 |
USPTO Patent Trial and Appeal Board |
IPR2017-00155 |
FireEye, Inc. v. Finjan, Inc. |
Petitioner |
|
|
|
2/11/2016 |
Superior Court of California, County of Santa Clara |
16CV291999 |
Shawn Luger v. Fireeye, Inc. |
Respondent |
|
|
|
12/15/2015 |
Court of Chancery of Delaware |
11811-VCS |
Satish Patel v. FireEye, Inc. |
Defendant |
|
|
|
4/28/2015 |
Court of Chancery of Delaware |
10957-ML |
Patel, Satish vs FireEye Inc |
Defendant |
|
|
|
4/21/2015 |
Superior Court of California, County of Santa Clara |
2015-1-CV-279708 |
City Of Warren Police And Fire Retirement System v. A. Aziz,... |
Nominal Defendant |
|
|
|
1/28/2015 |
Superior Court of California, County of Santa Clara |
2015-1-CV-276138 |
In Re FireEye, Inc. Derivative Litigation (Consolidated Acti... |
Nominal Defendant |
|
|
|
1/28/2015 |
Superior Court of California, County of Santa Clara |
2015-1-CV-276138 |
In Re FireEye, Inc. Derivative Litigation (Consolidated Acti... |
Defendant |
|
|
|
11/24/2014 |
California Northern District Court |
5:14-cv-05204 |
John E Collins v. FireEye, Inc. et al |
Defendant |
|
|
|
7/17/2014 |
Superior Court of California, County of Santa Clara |
2014-1-CV-268110 |
Platt V. Fireeye, Inc. |
Defendant |
|
|
|
6/20/2014 |
Superior Court of California, County of Santa Clara |
2014-1-CV-266866 |
In Re FireEye, Inc. Securities Litigation (Consolidated Acti... |
Defendant |
|
|
|
3/7/2014 |
USPTO Patent Trial and Appeal Board |
IPR2014-00492 |
Finjan, Inc. v. FireEye, Inc. |
Patent Owner |
|
|
|
7/8/2013 |
California Northern District Court |
4:13-cv-03133-SBA |
Finjan, Inc. v. Fireeye, Inc. |
Defendant |
|
|
|
7/8/2013 |
California Northern District Court |
4:13-cv-03133-SBA |
Finjan, Inc. v. Fireeye, Inc. |
Counter-claimant |
|
|
|
6/5/2013 |
California Northern District Court |
5:13-cv-02496-EJD |
Fortinet Inc. v. FireEye Inc. |
Defendant |
|
|
|
6/4/2013 |
New York Southern District Court |
1:13-cv-03777 |
Intellectual Ventures II L.L.C. v. JP Morgan Chase & Co. et ... |
ADR Provider |
|
|
|
8/22/2012 |
Delaware District Court |
1:12-cv-01066-SLR |
Fortinet Inc. v. FireEye Inc. |
Defendant |
|
|
|
4/28/2010 |
USPTO Trademark Trial and Appeal Board |
91194675-OPP |
Fireeye, Inc. v. Fireid International S.a.r.l |
Plaintiff |
|
|
|
1/27/2010 |
USPTO Trademark Trial and Appeal Board |
91193572-OPP |
Fireeye, Inc. v. Fireid International S.a.r.l. |
Plaintiff |
|
|
|
1/26/2010 |
USPTO Trademark Trial and Appeal Board |
77710511-EXT |
Fireeye, Inc. v. Fireid International S.a.r.l |
Potential Opposer |
|
|
|
10/22/2009 |
USPTO Trademark Trial and Appeal Board |
77710534-EXT |
Fireeye, Inc. v. Fireid International S.a.r.l. |
Potential Opposer |
|
|
|
10/9/2006 |
USPTO Trademark Trial and Appeal Board |
78710294-EXT |
Apple Computer, Inc. v. The Westaim Corporation, et al |
Defendant |
|
|
|
10/9/2006 |
USPTO Trademark Trial and Appeal Board |
78805838-EXT |
Apple Computer, Inc. v. The Westaim Corporation, et al |
Defendant |
|
|
|
None |
USPTO Patent Trial and Appeal Board |
IPR2014-00344 |
Finjan, Inc. v. FireEye, Inc. |
Patent Owner |
|
|
Inside Counsel (1)
Go Pro to view corporate inside counsel.
Outside Counsel (43)
|
|
|
Bstz |
|
|
Sunnyvale, CA |
|
|
|
|
BSTZ |
|
Blakely, Sokolof, Taylor & Zafman LLP |
Sunnyvale, CA |
|
|
|
, |
Joi |
Anne White |
Carr & Ferrell LLP |
Palo Alto, CA |
|
|
|
Allcock |
John |
|
DLA Piper (US) LLP |
San Diego, CA |
|
|
|
Bachmann |
Steve |
|
Carr & Ferrell LLP |
Menlo Park, CA |
|
|
|
Batavia |
Neil |
M. |
|
Greenville, SC |
|
|
|
Bettinger |
Michael |
J. |
K&L Gates LLP |
San Francisco, CA |
|
|
|
Brun |
David |
Shane |
K&L Gates LLP |
San Francisco, CA |
|
|
|
Brun |
David |
Shane |
Goodwin Procter, LLP |
San Francisco, CA |
|
|
|
Celentano |
Krista |
A. |
DLA Piper (US) LLP |
|
|
|
|
Cunningham |
Sean |
|
DLA Piper (US) LLP |
San Diego, CA |
|
|
|
DiGiovanni |
Francis |
|
Novak Druce, LLP |
Wilmington, DE |
|
|
|
DiGiovanni |
Francis |
|
Drinker Biddle & Reath LLP |
Wilmington, DE |
|
|
|
DRAPINSKI |
JAMES |
|
|
Menlo Park, CA |
|
|
|
Drapinski |
James |
|
Carr & Ferrell LLP |
Menlo Park, CA |
|
|
|
DRAPINSKI |
JAMES |
|
Carr & Ferrell, Llc |
Menlo Park, CA |
|
|
|
Drapinski |
James |
W. |
|
Menlo Park, CA |
|
|
|
Gard |
Julia |
|
INVALID ADDRESS - Barnes & Thornburg - Fort ... |
|
|
|
|
Gavril |
Doru |
|
Wilson Sonsini Goodrich & Rosati, PC |
|
|
|
|
Grewal |
Amardeep |
S. |
|
PITTSBURGH, PA |
|
|
|
Haycock |
Jason |
Nathaniel |
K&L Gates LLP |
San Francisco, CA |
|
|
|
Krause |
Summer |
Kristen |
DLA Piper (US) LLP |
Palo Alto, CA |
|
|
|
Lewis |
Damon |
M. |
DLA Piper (US) LLP |
|
|
|
|
Liston |
Ian |
|
Wilson Sonsini Goodrich & Rosati, PC |
Georgetown, DE |
|
|
|
Miller |
Mary |
B. |
Dority & Manning, PA |
Greenville, SC |
|
|
|
Montgomery |
Tamika |
|
Montgomery, Tamika |
|
|
|
|
O'neill |
Michael |
K. |
|
|
|
|
|
Patterson |
Todd |
S. |
DLA Piper (US) LLP |
AUSTIN, TX |
|
|
|
PC |
Polsinelli |
|
Polsinelli PC |
Wilmington, DE |
|
|
|
Piper |
Michael |
W. |
|
|
|
|
|
Placeholder |
TTAB |
Attorney |
Carr & Ferrell LLP |
|
|
|
|
RaoRane |
Meghana |
Chandrakant |
K&L Gates LLP |
Ca, |
|
|
|
Riley |
Kathryn |
Bridget |
|
San Diego, CA |
|
|
|
RILEY |
KATHRYN |
|
DLA Piper (US) LLP |
San Diego, CA |
|
|
|
Road |
Patent |
Geng |
Carr & Ferrell LLP |
Palo Alto, CA |
|
|
|
Rusnak |
Eric |
C. |
K&L Gates LLP |
Washington, DC |
|
|
|
Schaal |
William |
W. |
|
COSTA MESA, CA |
|
|
|
Scher |
Jefferson |
F. |
Carr & Ferrell LLP |
Menlo Park, CA |
|
|
|
Smith-misemer |
Dianne |
M. |
|
Overland Park, KS |
|
|
|
Stein |
Andrew |
Neal |
DLA Piper (US) LLP |
Washington, DC |
|
|
|
Stroder |
Rebecca |
|
|
Chicago, IL |
|
|
|
Talpas |
Charles |
Andrew |
|
|
|
|
|
Torrez |
Summer |
|
DLA Piper (US) LLP |
Palo Alto, CA |
|
|
|
|
10/3/2024 |
Mandiant, Inc. |
Assignee |
Application Publication |
18757257 20240348629 |
System and Method for Automatically Associating Cybersecutiry Intelligen... System and Method for Automatically Associating Cybersecutiry Intelligen... |
|
|
|
9/18/2024 |
Mandiant, Inc. |
Assignee |
Application Publication |
18757257 20240348629 |
System and Method for Automatically Associating Cybersecutiry Intelligen... System and Method for Automatically Associating Cybersecutiry Intelligen... |
|
|
|
9/18/2024 |
Berninger, Matthew |
Assignor |
Application Publication |
18757257 20240348629 |
System and Method for Automatically Associating Cybersecutiry Intelligen... System and Method for Automatically Associating Cybersecutiry Intelligen... |
|
|
|
9/18/2024 |
Vengerik, Barry |
Assignor |
Application Publication |
18757257 20240348629 |
System and Method for Automatically Associating Cybersecutiry Intelligen... System and Method for Automatically Associating Cybersecutiry Intelligen... |
|
|
|
8/13/2024 |
Mandiant, Inc. |
Assignee |
Application Patent |
15940854 10826931 |
System And Method For Predicting And Mitigating Cybersecurity System Mis... System And Method For Predicting And Mitigating Cybersecurity System Mis... |
|
|
|
4/9/2024 |
Tully, Philip |
Assignor |
Application Publication Patent |
18447085 20230385548 12131121 |
Detecting Information Operations Campaigns in Social Media with Machine ... Detecting Information Operations Campaigns in Social Media with Machine ... Detecting Information Operations Campaigns in Social Media with Machine ... |
|
|
|
4/9/2024 |
Mandiant, Inc. |
Assignee |
Application Publication Application |
18447085 20230385548 12131121 |
|
|
|
|
1/23/2024 |
Kulkarni, Neeraj |
Assignor |
Application Patent |
18138704 12248563 |
System And Method For Cybersecurity Analyzer Update And Concurrent Manag... System And Method For Cybersecurity Analyzer Update And Concurrent Manag... |
|
|
|
1/23/2024 |
Beard, Robert M., Jr. |
Assignor |
Application Patent |
18138704 12248563 |
System And Method For Cybersecurity Analyzer Update And Concurrent Manag... System And Method For Cybersecurity Analyzer Update And Concurrent Manag... |
|
|
|
1/23/2024 |
Caron, Robin |
Assignor |
Application Patent |
18138704 12248563 |
System And Method For Cybersecurity Analyzer Update And Concurrent Manag... System And Method For Cybersecurity Analyzer Update And Concurrent Manag... |
|
|
|
1/23/2024 |
Mandiant, Inc. |
Assignee |
Application Patent |
18138704 12248563 |
System And Method For Cybersecurity Analyzer Update And Concurrent Manag... |
|
|
|
9/28/2023 |
Krisiloff, David Benjamin |
Assignor |
Application Publication |
18159434 20230162095 |
Churn-aware Machine Learning For Cybersecurity Threat Detection Churn-aware Machine Learning For Cybersecurity Threat Detection |
|
|
|
9/28/2023 |
Coull, Scott |
Assignor |
Application Publication |
18159434 20230162095 |
Churn-aware Machine Learning For Cybersecurity Threat Detection Churn-aware Machine Learning For Cybersecurity Threat Detection |
|
|
|
9/28/2023 |
Mandiant, Inc. |
Assignee |
Application Publication |
18159434 20230162095 |
Churn-aware Machine Learning For Cybersecurity Threat Detection Churn-aware Machine Learning For Cybersecurity Threat Detection |
|
|
|
8/2/2023 |
Krisiloff, David Benjamin |
Assignor |
Application Publication Patent |
16842568 20210314333 11568316 |
Churn-aware Machine Learning For Cybersecurity Threat Detection Churn-aware Machine Learning For Cybersecurity Threat Detection Churn-aware Machine Learning For Cybersecurity Threat Detection |
|
|
|
8/2/2023 |
Coull, Scott |
Assignor |
Application Publication Patent |
16842568 20210314333 11568316 |
Churn-aware Machine Learning For Cybersecurity Threat Detection Churn-aware Machine Learning For Cybersecurity Threat Detection Churn-aware Machine Learning For Cybersecurity Threat Detection |
|
|
|
8/2/2023 |
Mandiant, Inc. |
Assignee |
Application Publication Patent |
16842568 20210314333 11568316 |
Churn-aware Machine Learning For Cybersecurity Threat Detection Churn-aware Machine Learning For Cybersecurity Threat Detection Churn-aware Machine Learning For Cybersecurity Threat Detection |
|
|
|
6/28/2023 |
Mandiant, Inc. |
Assignee |
Application Publication |
18337785 20240007495 |
System and Method for Cybersecurity Threat Monitoring Using Dynamically-... System and Method for Cybersecurity Threat Monitoring Using Dynamically-... |
|
|
|
6/28/2023 |
Coull, Scott Eric |
Assignor |
Application Publication |
18337785 20240007495 |
System and Method for Cybersecurity Threat Monitoring Using Dynamically-... System and Method for Cybersecurity Threat Monitoring Using Dynamically-... |
|
|
|
6/28/2023 |
Johns, Jeffrey Thomas |
Assignor |
Application Publication |
18337785 20240007495 |
System and Method for Cybersecurity Threat Monitoring Using Dynamically-... System and Method for Cybersecurity Threat Monitoring Using Dynamically-... |
|
|
|
6/28/2023 |
Mandiant, Inc. |
Assignee |
Application Publication Patent |
18337785 20240007495 12074902 |
System and Method for Cybersecurity Threat Monitoring Using Dynamically-... System and Method for Cybersecurity Threat Monitoring Using Dynamically-... System and Method for Cybersecurity Threat Monitoring Using Dynamically-... |
|
|
|
6/28/2023 |
Coull, Scott Eric |
Assignor |
Application Publication Patent |
18337785 20240007495 12074902 |
System and Method for Cybersecurity Threat Monitoring Using Dynamically-... System and Method for Cybersecurity Threat Monitoring Using Dynamically-... System and Method for Cybersecurity Threat Monitoring Using Dynamically-... |
|
|
|
6/28/2023 |
Johns, Jeffrey Thomas |
Assignor |
Application Publication Patent |
18337785 20240007495 12074902 |
System and Method for Cybersecurity Threat Monitoring Using Dynamically-... System and Method for Cybersecurity Threat Monitoring Using Dynamically-... System and Method for Cybersecurity Threat Monitoring Using Dynamically-... |
|
|
|
5/25/2023 |
Verodin, LLC |
Assignor |
Application Publication |
18313878 20230275920 |
|
|
|
|
5/25/2023 |
Mandiant, Inc. |
Assignee |
Application Publication |
18313878 20230275920 |
Systems and Methods for Attack Simulation on a Production Network Systems and Methods for Attack Simulation on a Production Network |
|
|
|
5/17/2023 |
Jones, Brian Sanford |
Assignor |
Application Publication Patent |
18305889 20230336584 12069087 |
System And Method For Analyzing Binary Code For Malware Classification U... System And Method For Analyzing Binary Code For Malware Classification U... System And Method For Analyzing Binary Code For Malware Classification U... |
|
|
|
5/17/2023 |
Coull, Scott Eric |
Assignor |
Application Publication Patent |
18305889 20230336584 12069087 |
System And Method For Analyzing Binary Code For Malware Classification U... System And Method For Analyzing Binary Code For Malware Classification U... System And Method For Analyzing Binary Code For Malware Classification U... |
|
|
|
5/17/2023 |
Johns, Jeffrey Thomas |
Assignor |
Application Publication Patent |
18305889 20230336584 12069087 |
System And Method For Analyzing Binary Code For Malware Classification U... System And Method For Analyzing Binary Code For Malware Classification U... System And Method For Analyzing Binary Code For Malware Classification U... |
|
|
|
5/17/2023 |
Mandiant, Inc. |
Assignee |
Application Publication Application |
18305889 20230336584 12069087 |
|
|
|
|
3/16/2023 |
Mandiant, Inc. |
Assignee |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 104 more |
15831311 14869901 14962497 14311000 14937802 17035538 14500587 16277907 15215277 16020896 14675648 16102595 15803669 15283126 14872003 14580501 15229770 14985287 13892800 14222524 14586233 14028074 15376531 13560415 15368352 14316716 13421843 ...and 104 more |
Dynamic Guest Image Creation And Rollback Late Load Technique For Deploying A Virtualization Layer Underneath A Ru... Modularized Database Architecture Using Vertical Partitioning For A Stat... System And Method For Programmatic Runtime De-obfuscation Of Obfuscated ... System And Method For Triggering Analysis Of An Object For Malware In Re... Cyber Attack Early Warning System Exploit Detection System System And Method For Managing Formation And Modification Of A Cluster W... Verification And Enhancement Using Detection Systems Located At The Netw... Modular Architecture For Analysis Database Enterprise Search Malicious Message Analysis System Cyber Attack Early Warning System Methods For Detecting File Altering Malware In Vm Based Analysis System And Method For Managing Sensor Enrollment Intrusion Prevention And Remedy System System And Method For Detecting Repetitive Cybersecurity Attacks Constit... Arrangement For Efficient Search And Retrieval Of Indexes Used To Locate... Detection Of Phishing Attacks Using Similarity Analysis Susceptible Environment Detection System Method To Detect Application Execution Hijacking Using Memory Protection System And Method For Detecting File Altering Behaviors Pertaining To A ... System To Bypass A Compromised Mass Storage Device Driver Stack And Meth... Interactive Infection Visualization For Improved Exploit Detection And S... System And Method For Circumventing Evasive Code For Cyberthreat Detecti... Efficient Access To Sparse Packets In Large Repositories Of Stored Netwo... Subscription-based Malware Detection ...and 104 more |
|
|
|
3/16/2023 |
Mandiant, Inc. |
Assignee |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 106 more |
16043013 16024685 14942327 14229626 15043392 15912474 14804086 15889128 16459536 15226839 15489665 15489659 14316714 16140327 15688727 15954449 14579896 14685475 15425954 14321636 15638262 14086842 15495629 14173765 14922024 15600320 15083171 ...and 106 more |
Threat-aware Architecture Multistage System And Method For Analyzing Obfuscated Content For Malwar... System And Method For Detecting Exfiltration Content System And Method For Generating A Malware Identifier Analytic-based Security With Learning Adaptability Advanced Persistent Threat (apt) Detection Center Framework For Efficient Security Coverage Of Mobile Software Application... Framework For Classifying An Object As Malicious With Machine Learning F... Fuzzy Hash Of Behavioral Results Network-Based Binary File Extraction and Analysis for Malware Detection System And Method For Detecting Time-Bomb Malware Method And System For Collecting And Organizing Data Corresponding To An... System, Device And Method For Detecting A Malicious Attack Based On Comm... Detection Center To Detect Targeted Malware Framework For Efficient Security Coverage Of Mobile Software Application... System And Method Employing Structured Intelligence To Verify And Contai... Fuzzy Hash Of Behavioral Results Malicious Content Analysis With Multi-version Application Support Within... Dynamically Remote Tuning Of A Malware Content Detection System Method and System for Collecting and Organizing Data Corresponding to an... Network-based Malware Detection Distributed Systems And Methods For Automatically Detecting Unknown Bots... Dynamically Adaptive Framework And Method For Classifying Malware Using ... System And Method Employing Structured Intelligence To Verify And Contai... Detection Efficacy Of Virtual Machine-based Analysis With Application Sp... Multi-version Application Support And Registration Within A Single Opera... Dynamically Remote Tuning Of A Malware Content Detection System ...and 106 more |
|
|
|
3/16/2023 |
Fireeye Security Holdings Us LLC |
Assignee |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 106 more |
14930385 15594049 15943406 15633058 14042454 15633072 16024685 14942327 14229626 16043013 15912474 14804086 15889128 16459536 15043392 15226839 15489665 15489659 14316714 16140327 15688727 15954449 14685475 15425954 14321636 14579896 15638262 ...and 106 more |
Fuzzy Hash Of Behavioral Results Network-Based Binary File Extraction and Analysis for Malware Detection System And Method For Detecting Time-Bomb Malware Method And System For Collecting And Organizing Data Corresponding To An... System, Device And Method For Detecting A Malicious Attack Based On Comm... Detection Center To Detect Targeted Malware Framework For Efficient Security Coverage Of Mobile Software Application... System And Method Employing Structured Intelligence To Verify And Contai... Detection Efficacy Of Virtual Machine-based Analysis With Application Sp... Malicious Content Analysis With Multi-version Application Support Within... Dynamically Remote Tuning Of A Malware Content Detection System Method and System for Collecting and Organizing Data Corresponding to an... Network-based Malware Detection Distributed Systems And Methods For Automatically Detecting Unknown Bots... Dynamically Adaptive Framework And Method For Classifying Malware Using ... System And Method Employing Structured Intelligence To Verify And Contai... Detection Efficacy Of Virtual Machine-based Analysis With Application Sp... Multi-version Application Support And Registration Within A Single Opera... Dynamically Remote Tuning Of A Malware Content Detection System System And Method For Detecting Malicious Links In Electronic Messages Malicious Content Analysis Using Simulated User Interaction Without User... System, Apparatus And Method For Using Malware Analysis Results To Drive... Dynamically Adaptive Framework And Method For Classifying Malware Using ... System And Method For Verifying A Cyberthreat Detection Efficacy Of Virtual Machine-based Analysis With Application Sp... Classifying Sets Of Malicious Indicators For Detecting Command And Contr... Micro-virtualization Architecture For Threat-aware Microvisor Deployment... ...and 106 more |
|
|
|
3/16/2023 |
Mandiant, Inc. |
Assignee |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 35 more |
17844644 15721630 15283128 15940307 16557483 16572537 16840584 15627266 16160923 17710909 15721948 13073357 15197634 12024858 17133397 16796541 12024834 12024827 16791933 16557512 15627272 16011495 16144781 16353988 16726723 15942082 16666335 ...and 35 more |
Data Extraction System For Malware Analysis System And Method For Data Preservation And Retrieval Malware Detection Verification And Enhancement By Coordinating Endpoint ... Distributed Malware Detection System And Submission Workflow Thereof System And Method For Automatically Generating Malware Detection Rule Re... Method And System For Collaboration During An Event Automated System For Triage Of Customer Issues Method And System For Analyzing Data Related To An Event System And Method For Automatically Prioritizing Rules For Cyber-threat ... Selective Virtualization for Security Threat Detection System And Method For Detecting And Protecting Against Cybersecurity Att... System And Method For Data Preservation And Retrieval Phishing Attack Detection Attribute-controlled Malware Detection System And Method For Bootkit Detection Cluster Configuration Within A Scalable Malware Detection System Multi-level Control For Enhanced Resource And Object Evaluation Manageme... Verification of Trusted Threat-Aware Visualization Layer Adaptive Virtual Machine Snapshot Update Framework For Malware Behaviora... System And Method For Retrieval And Analysis Of Operational Data From Cu... Malware Detection Verification And Enhancement By Coordinating Endpoint ... System And Method For Detecting Malicious Traffic Using A Virtual Machin... System And Method For Automatically Generating Malware Detection Rule Re... System And Method For Data Preservation And Retrieval Automated System For Triage Of Customer Issues Method And System For Collaboration During An Event System And Method For Automatically Prioritizing Rules For Cyber-threat ... ...and 31 more |
|
|
|
3/16/2023 |
Mandiant, Inc. |
Assignee |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 37 more |
15627272 18097091 16557512 15940307 16144781 16572537 16353988 15942082 16840584 16160923 15283128 17844644 15721630 16557483 16796541 15627266 16791933 16011495 13073357 17710909 15721948 12024858 15197634 12024834 17133397 16726723 16666335 ...and 37 more |
System And Method For Data Preservation And Retrieval Malware Detection Verification And Enhancement By Coordinating Endpoint ... Distributed Malware Detection System And Submission Workflow Thereof System And Method For Automatically Generating Malware Detection Rule Re... System And Method For Automatically Prioritizing Rules For Cyber-threat ... Automated System For Triage Of Customer Issues Run-Time Configurable Cybersecurity System Method And System For Collaboration During An Event System And Method Of Threat Detection Under Hypervisor Control Selective Virtualization for Security Threat Detection System And Method For Bootkit Detection Method And System For Analyzing Data Related To An Event Phishing Attack Detection Attribute-controlled Malware Detection System And Method For Retrieval And Analysis Of Operational Data From Cu... System And Method For Data Preservation And Retrieval System And Method For Retrieval And Analysis Of Operational Data From Cu... Verification of Trusted Threat-Aware Visualization Layer Multi-vector Malware Detection Data Sharing System For Improved Detectio... Adaptive Virtual Machine Snapshot Update Framework For Malware Behaviora... System And Method For Data Preservation And Retrieval Malware Detection Verification And Enhancement By Coordinating Endpoint ... System And Method For Detecting Malicious Traffic Using A Virtual Machin... Data Extraction System For Malware Analysis Method And System For Collaboration During An Event Automated System For Triage Of Customer Issues Run-Time Configurable Cybersecurity System ...and 36 more |
|
|
|
3/16/2023 |
Mandiant, Inc. |
Assignee |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 59 more |
15627266 16557483 17576558 16726723 15721948 13073357 17385835 17712176 16666335 15197634 12024858 12024834 17063648 16144781 18097091 15940307 12024827 16572537 16557512 15627272 16586794 17902878 16840584 17146417 17710882 16160923 16353988 ...and 59 more |
Multi-vector Malware Detection Data Sharing System For Improved Detectio... System And Method For Bootkit Detection Attribute-controlled Malware Detection Method And System For Collaboration During An Event Verification of Trusted Threat-Aware Visualization Layer System And Method For Retrieval And Analysis Of Operational Data From Cu... Technique For Verifying Exploit/malware At Malware Detection Appliance T... Method And System For Analyzing Data Related To An Event System And Method Of Threat Detection Under Hypervisor Control Malware Detection Verification And Enhancement By Coordinating Endpoint ... System And Method For Detecting Malicious Traffic Using A Virtual Machin... Selective Virtualization for Security Threat Detection System And Method For Detecting Repetitive Cybersecurity Attacks Constit... System And Method For Data Preservation And Retrieval Phishing Attack Detection Automated System For Triage Of Customer Issues System And Method For Scanning Remote Services To Locate Stored Objects ... Run-Time Configurable Cybersecurity System Cluster Configuration Within A Scalable Malware Detection System Multi-level Control For Enhanced Resource And Object Evaluation Manageme... System And Method For Cybersecurity Analyzer Update And Concurrent Manag... System And Method For Improved End-to-end Cybersecurity Machine Learning... System And Method For Detecting And Protecting Against Cybersecurity Att... Data Extraction System For Malware Analysis System And Method For Data Preservation And Retrieval Attribute-controlled Malware Detection Subscription and Key Management System ...and 59 more |
|
|
|
3/16/2023 |
Mandiant, Inc. |
Assignee |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 61 more |
15721630 15283128 17385835 17712176 16726723 16666335 17063648 16144781 18097091 15940307 15627266 16586794 17902878 16572537 15721948 13073357 17146417 17710882 16840584 15197634 12024858 16160923 12024834 17063618 16231089 18075140 12024827 ...and 61 more |
Selective Virtualization for Security Threat Detection System And Method For Circumventing Evasive Code For Cyberthreat Detecti... System And Method For Identifying And Mitigating Cyberattacks Through Ma... Data Extraction System For Malware Analysis System And Method For Data Preservation And Retrieval Attribute-controlled Malware Detection System And Method For Improved End-to-end Cybersecurity Machine Learning... System And Method For Detecting And Protecting Against Cybersecurity Att... System And Method For Automatically Generating Malware Detection Rule Re... Method And System For Collaboration During An Event Verification of Trusted Threat-Aware Visualization Layer Multi-vector Malware Detection Data Sharing System For Improved Detectio... System And Method For Bootkit Detection Attribute-controlled Malware Detection Method And System For Analyzing Data Related To An Event System And Method For Automatically Prioritizing Rules For Cyber-threat ... Malware Detection Verification And Enhancement By Coordinating Endpoint ... System And Method For Detecting Malicious Traffic Using A Virtual Machin... System And Method For Retrieval And Analysis Of Operational Data From Cu... Technique For Verifying Exploit/malware At Malware Detection Appliance T... System And Method For Data Preservation And Retrieval Phishing Attack Detection Automated System For Triage Of Customer Issues Selective Virtualization for Security Threat Detection System And Method For Detecting Repetitive Cybersecurity Attacks Constit... Cluster Configuration Within A Scalable Malware Detection System Multi-level Control For Enhanced Resource And Object Evaluation Manageme... ...and 61 more |
|
|
|
3/16/2023 |
Mandiant, Inc. |
Assignee |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application ...and 41 more |
15627266 17844644 15721948 13073357 17710909 16796541 15197634 12024858 12024834 17133397 16791933 12024827 16011495 16557512 15627272 17712176 16144781 16726723 16353988 16666335 15942082 18097091 15940307 15721630 15283128 17710882 16572537 ...and 41 more |
Late Load Technique For Deploying A Virtualization Layer Underneath A Ru... System And Method For Detecting Malicious Traffic Using A Virtual Machin... Run-Time Configurable Cybersecurity System Method And System For Collaboration During An Event Distributed Malware Detection System And Submission Workflow Thereof System And Method For Detecting And Protecting Against Cybersecurity Att... Method And System For Analyzing Data Related To An Event System And Method Of Threat Detection Under Hypervisor Control System And Method For Cybersecurity Analyzer Update And Concurrent Manag... System And Method For Retrieval And Analysis Of Operational Data From Cu... System And Method For Data Preservation And Retrieval Phishing Attack Detection Selective Virtualization for Security Threat Detection Cluster Configuration Within A Scalable Malware Detection System Multi-level Control For Enhanced Resource And Object Evaluation Manageme... Attribute-controlled Malware Detection System And Method For Scanning Remote Services To Locate Stored Objects ... Data Extraction System For Malware Analysis System And Method For Data Preservation And Retrieval Late Load Technique For Deploying A Virtualization Layer Underneath A Ru... Multi-vector Malware Detection Data Sharing System For Improved Detectio... System And Method For Automatically Generating Malware Detection Rule Re... Method And System For Collaboration During An Event Malware Detection Verification And Enhancement By Coordinating Endpoint ... Distributed Malware Detection System And Submission Workflow Thereof System And Method For Detecting And Protecting Against Cybersecurity Att... Method And System For Analyzing Data Related To An Event ...and 39 more |
|
|
|
3/7/2023 |
Mandiant, Inc. |
Assignee |
Application Patent |
18177524 12111925 |
Methods And Apparatus For Detecting And Preventing Obfuscated Cyberattac... Methods And Apparatus For Detecting And Preventing Obfuscated Cyberattac... |
|
|
|
3/7/2023 |
Fang, Chunsheng Victor |
Assignor |
Application Application |
18177524 12111925 |
|
|
|
|
3/7/2023 |
Hegde, Vikram |
Assignor |
Application Application |
18177524 12111925 |
|
|
|
|
2/7/2023 |
Mandiant, Inc. |
Assignee |
Application Publication Patent |
16725674 20200252428 11743290 |
System And Method For Detecting Cyberattacks Impersonating Legitimate So... System And Method For Detecting Cyberattacks Impersonating Legitimate So... System And Method For Detecting Cyberattacks Impersonating Legitimate So... |
|
|
|
2/2/2023 |
Mandiant, Inc. |
Assignee |
Application Patent |
14311014 9594912 |
Return-Oriented Programming Detection Return-Oriented Programming Detection |
|
|
|
2/2/2023 |
Mandiant, Inc. |
Assignee |
Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Application Publication Publication Publication Publication Publication Publication Publication Publication Publication Patent ...and 18 more |
11409355 11717475 11717476 11709570 11096287 11717408 11998750 12263971 12359252 11151812 12571294 11717474 11152286 13089191 11494990 11998605 11471072 20100115621 20100192223 20110099633 20110078794 20110093951 20110314546 20120331553 20070250930 20080005782 9027135 ...and 18 more |
Virtual machine with dynamic data flow analysis Systems And Methods For Detecting Communication Channels Of Bots Dynamic Signature Creation And Enforcement Systems and methods for malware attack detection and identification Electronic Message Analysis for Malware Detection Computer Worm Defense System And Method Systems and methods for malware attack prevention Network-Based Binary File Extraction and Analysis for Malware Detection System and method of containing computer worms Malware Containment On Connection Detecting Malicious Network Content Using Virtual Environment Components Heuristic Based Capture With Replay To Virtual Machine Systems and Methods for Detecting Malicious Network Content Virtual machine with dynamic data flow analysis Systems And Methods For Detecting Communication Channels Of Bots Dynamic Signature Creation And Enforcement Systems And Methods For Detecting Encrypted Bot Command & Control Commun... Electronic Message Analysis for Malware Detection Computer Worm Defense System And Method Systems and methods for malware attack prevention Network-Based Binary File Extraction and Analysis for Malware Detection System and method of containing computer worms Malware containment and security analysis on connection Detecting Malicious Network Content Using Virtual Environment Components System and method of detecting computer worms Heuristic Based Capture With Replay To Virtual Machine Systems and Methods for Detecting Malicious Network Content ...and 18 more |
|
|
|
10/19/2022 |
Coull, Scott Eric |
Assignor |
Application Publication Patent |
18047204 20230185907 12045343 |
System And Method For Heterogeneous Transferred Learning For Enhanced Cy... System And Method For Heterogeneous Transferred Learning For Enhanced Cy... System And Method For Heterogeneous Transferred Learning For Enhanced Cy... |
|
|
|
10/19/2022 |
Krisiloff, David |
Assignor |
Application Publication Patent |
18047204 20230185907 12045343 |
System And Method For Heterogeneous Transferred Learning For Enhanced Cy... System And Method For Heterogeneous Transferred Learning For Enhanced Cy... System And Method For Heterogeneous Transferred Learning For Enhanced Cy... |
|
|
|
10/19/2022 |
Severi, Giorgio |
Assignor |
Application Publication Patent |
18047204 20230185907 12045343 |
System And Method For Heterogeneous Transferred Learning For Enhanced Cy... System And Method For Heterogeneous Transferred Learning For Enhanced Cy... System And Method For Heterogeneous Transferred Learning For Enhanced Cy... |
|
|
|
10/19/2022 |
Mandiant, Inc. |
Assignee |
Application Publication Patent |
18047204 20230185907 12045343 |
System And Method For Heterogeneous Transferred Learning For Enhanced Cy... System And Method For Heterogeneous Transferred Learning For Enhanced Cy... System And Method For Heterogeneous Transferred Learning For Enhanced Cy... |
|
|
|
4/6/2022 |
Mandiant, Inc. |
Assignee |
Application Publication |
16842568 20210314333 |
Churn-aware Machine Learning For Cybersecurity Threat Detection Churn-aware Machine Learning For Cybersecurity Threat Detection |
|
|
|
2/9/2022 |
Mandiant, Inc. |
Assignee |
Application Application Application Application Application Application Application Publication Publication Publication Publication Publication Publication Publication Patent Patent Patent Patent Patent |
17000922 15442205 15442210 16298156 15442212 16276997 16397893 20170244743 20170244744 20190222605 20170244745 20190190944 20200280576 20200389484 10944779 11134095 10230752 10757131 10212186 |
Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Testing Known Bad Destinations In A Production N... Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Metods For Attack Simulation On A Production Network Systems And Methods For Testing Known Bad Destinations In A Production N... Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Metods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network |
|
|
|
2/9/2022 |
Mandiant, Inc. |
Assignee |
Application Application Application Application Application Application Application Publication Publication Publication Publication Publication Publication Publication Patent Patent Patent Patent Patent Patent Patent |
15442210 16298156 15442212 16276997 16397893 17000922 15442205 20200389484 20170244743 20170244744 20190222605 20170244745 20190190944 20200280576 11134095 10230752 10757131 10212186 10944779 11349862 11706238 |
Systems And Methods For Testing Known Bad Destinations In A Production N... Systems And Metods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Testing Known Bad Destinations In A Production N... Systems And Metods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Testing Known Bad Destinations In A Production N... Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network Systems And Methods For Attack Simulation On A Production Network |
|
|
|
1/19/2022 |
Aziz, Ashar |
Assignor |
Application Patent |
16666335 11240262 |
Malware Detection Verification And Enhancement By Coordinating Endpoint ... Malware Detection Verification And Enhancement By Coordinating Endpoint ... |
|
|
|
1/19/2022 |
Ismael, Osman Abdoul |
Assignor |
Application Patent |
16666335 11240262 |
Malware Detection Verification And Enhancement By Coordinating Endpoint ... Malware Detection Verification And Enhancement By Coordinating Endpoint ... |
|
|
|
1/19/2022 |
Ismael, Osman Abdoul |
Assignor |
Application Patent |
16011495 11244056 |
Verification of Trusted Threat-Aware Visualization Layer Verification of Trusted Threat-Aware Visualization Layer |
|
|
|
1/19/2022 |
Tews, Hendrik |
Assignor |
Application Patent |
16011495 11244056 |
Verification of Trusted Threat-Aware Visualization Layer Verification of Trusted Threat-Aware Visualization Layer |
|
|
|
1/19/2022 |
Ross, Steven Antonio |
Assignor |
Application Patent |
17063618 12130909 |
Enterprise Search Enterprise Search |
|
|
|
1/19/2022 |
Duong, Ai Quoc |
Assignor |
Application Patent |
17063618 12130909 |
Enterprise Search Enterprise Search |
|
|
|
1/19/2022 |
King, Larry Alan |
Assignor |
Application Patent |
17063618 12130909 |
Enterprise Search Enterprise Search |
|
|
|
1/19/2022 |
Young, John Patrick |
Assignor |
Application Patent |
17063618 12130909 |
Enterprise Search Enterprise Search |
|
|
|
12/15/2021 |
Mandiant, Inc. |
Assignee |
Application Application Application Application Application Application Application Application Application Publication Publication Publication Publication Publication Publication Publication Patent Patent Patent Patent Patent Patent Patent Patent Patent |
15089170 15581471 16185865 16841383 15190028 16718928 16718990 16003727 16049687 20190089732 20200244696 20170048276 20200344266 20200314146 20170063920 20170230412 10834128 11227047 10129290 10505972 10616265 11563769 10536484 10986134 11063985 |
Dynamic Adaptive Defense For Cyber-security Threats Methods And Apparatus For Graphical User Interface Environment For Creat... Dynamic Adaptive Defense For Cyber-security Threats Methods And Apparatus For Graphical User Interface Environment For Creat... System And Method For Improved End-to-end Cybersecurity Machine Learning... Methods And Apparatus For Graphical User Interface Environment For Creat... Dynamic Adaptive Defense For Cyber-security Threats Dynamic Adaptive Defense For Cyber-security Threats Dynamic Adaptive Defense For Cyber-security Threats System And Method For Identifying Phishing Cyber-attacks Through Deep Ma... Dynamic Adaptive Defense For Cyber-security Threats Methods And Apparatus For Graphical User Interface Environment For Creat... System And Method For Improved End-to-end Cybersecurity Machine Learning... Methods And Apparatus For Graphical User Interface Environment For Creat... Methods And Apparatus For Graphical User Interface Environment For Creat... Dynamic Adaptive Defense For Cyber-security Threats Dynamic Adaptive Defense For Cyber-security Threats System And Method For Identifying Phishing Cyber-attacks Through Deep Ma... Dynamic Adaptive Defense For Cyber-security Threats Methods And Apparatus For Graphical User Interface Environment For Creat... Dynamic Adaptive Defense For Cyber-security Threats Methods And Apparatus For Graphical User Interface Environment For Creat... Methods And Apparatus For Graphical User Interface Environment For Creat... Dynamic Adaptive Defense For Cyber-security Threats Dynamic Adaptive Defense For Cyber-security Threats |
|
|
|
12/15/2021 |
Mandiant, Inc. |
Assignee |
Application Patent |
17549147 11729204 |
System And Method For Cybersecurity Threat Monitoring Using Dynamically-... System And Method For Cybersecurity Threat Monitoring Using Dynamically-... |
|
|
|
12/15/2021 |
Coull, Scott Eric |
Assignor |
Application Patent |
17549147 11729204 |
System And Method For Cybersecurity Threat Monitoring Using Dynamically-... |
|
|
|
12/15/2021 |
Johns, Jeffrey Thomas |
Assignor |
Application Patent |
17549147 11729204 |
System And Method For Cybersecurity Threat Monitoring Using Dynamically-... |
|
|
|
11/10/2021 |
Mandiant, Inc. |
Assignee |
Application Application Publication Patent |
16542739 15705780 20210073377 10242202 |
System And Method For Heterogeneous Transferred Learning For Enhanced Cy... Apparatus And Method For Staged Graph Processing To Produce A Risk Infer... Apparatus And Method For Staged Graph Processing To Produce A Risk Infer... System And Method For Heterogeneous Transferred Learning For Enhanced Cy... |
|
|
|
11/10/2021 |
Mandiant, Inc. |
Assignee |
Application |
|
|
|
|
|
11/10/2021 |
Mandiant, Inc. |
Assignee |
Application Application Application Application Application Publication Patent Patent Patent Patent Patent |
16370199 16542739 17012924 16582265 15705780 20210073377 11822886 11620379 10242202 11201890 11475128 |
Apparatus And Method For Staged Graph Processing To Produce A Risk Infer... System And Method For Heterogeneous Transferred Learning For Enhanced Cy... System And Method For Adaptive Graphical Depiction And Selective Remedia... Methods And Apparatus For Detecting And Preventing Obfuscated Cyberattac... Apparatus And Method For Staged Graph Processing To Produce A Risk Infer... Detecting Information Operations Campaigns In Social Media With Machine ... System And Method For Heterogeneous Transferred Learning For Enhanced Cy... Methods And Apparatus For Detecting And Preventing Obfuscated Cyberattac... Detecting Information Operations Campaigns In Social Media With Machine ... System And Method For Heterogeneous Transferred Learning For Enhanced Cy... System And Method For Adaptive Graphical Depiction And Selective Remedia... |
|
|
|
11/10/2021 |
Mandiant, Inc. |
Assignee |
Application Application Application Application Application Publication Patent Patent Patent Patent Patent |
16542739 17012924 16582265 15705780 16370199 20210073377 11620379 10242202 11201890 11868722 11475128 |
Detecting Information Operations Campaigns In Social Media With Machine ... System And Method For Heterogeneous Transferred Learning For Enhanced Cy... System And Method For Adaptive Graphical Depiction And Selective Remedia... Apparatus And Method For Staged Graph Processing To Produce A Risk Infer... System And Method For Heterogeneous Transferred Learning For Enhanced Cy... System And Method For Adaptive Graphical Depiction And Selective Remedia... Methods And Apparatus For Detecting And Preventing Obfuscated Cyberattac... Apparatus And Method For Staged Graph Processing To Produce A Risk Infer... Detecting Information Operations Campaigns In Social Media With Machine ... System And Method For Heterogeneous Transferred Learning For Enhanced Cy... Methods And Apparatus For Detecting And Preventing Obfuscated Cyberattac... |
|
|
|
11/5/2021 |
Silberman, Peter |
Assignor |
Application Patent |
16724031 11176251 |
Determining Malware Via Symbolic Function Hash Analysis Determining Malware Via Symbolic Function Hash Analysis |
|
|
|
10/9/2021 |
Cloudvisory LLC |
Assignor |
Application Publication |
16908681 20200389502 |
Automated Enforcement of Security Policies in Cloud and Hybrid Infrastru... Automated Enforcement of Security Policies in Cloud and Hybrid Infrastru... |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
86027091 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
85888602 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
85782640 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
85567871 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
85202942 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
77297123 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
0 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
4435770 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
4492239 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
4340919 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
3334954 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
85523177 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
85886370 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
85782636 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
85567860 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
78904030 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
0 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
4358167 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
0 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
4340918 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
0 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
85501637 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
85824435 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
85755122 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
85567830 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
77659006 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
0 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
0 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
4358139 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
4330655 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
4190770 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
3753817 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
86027101 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
85260943 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
85812092 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
85596421 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
85529608 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Application |
77658986 |
 |
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
0 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
4425581 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
4492240 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
4337226 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
4104161 |
|
|
|
|
8/15/2014 |
Mandiant, LLC |
Assignor |
Trademark |
3599451 |
|
|
|
|
11/17/2021 |
Mandiant, Inc. |
Assignee |
Application |
97024600 |
 |
|
|
|
11/17/2021 |
Mandiant, Inc. |
Assignee |
Application |
86369988 |
 |
|
|
|
11/17/2021 |
Mandiant, Inc. |
Assignee |
Application |
85596421 |
 |
|
|
|
11/17/2021 |
Mandiant, Inc. |
Assignee |
Application |
85888602 |
 |
|
|
|
11/17/2021 |
Mandiant, Inc. |
Assignee |
Trademark |
0 |
|
|
|
|
11/17/2021 |
Mandiant, Inc. |
Assignee |
Trademark |
3599451 |
|
|
|
Incoming Payments
Outgoing Payments
|
|