Patents
SentinelOne products may be covered by one or more of the U.S. patents below. Patent pending.
- US 11,616,812 – Deceiving Attackers Accessing Active Directory Data
- US 11,470,115 – Implementing Decoys In A Network Environment
- US 11,038,658 – Deceiving Attackers In Endpoint Systems
- US 10,609,074 – Implementing Decoys In Network Endpoints
- US 10,599,842 – Deceiving Attackers In Endpoint Systems
- US 10,567,431 – Emulating Shellcode Attacks
- US 10,542,044 – Authentication Incident Detection And Management
- US 10,509,905 – Ransomware Mitigation System
- US 10,476,891 – Monitoring Access Of Network Darkspace
- US 10,375,110 – Luring Attackers Towards Deception Servers
- US 10,250,636 – Detecting Man-In-The-Middle Attacks
- US 9,942,270 – Database Deception In Directory Services
- US 9,769,204 – Distributed System For Bot Detection
- US 9,609,019 – System And Method For Directing Malicous Activity To A Monitoring System
- US 9,407,602 – Methods And Apparatus For Redirecting Attacks On A Network
- US 9,356,950 – Evaluating Urls For Malicious Content
- US 12,450,351 – Method Of Malware Detection And System Thereof
- US 12,423,078 – Systems, Methods And Devices For Device Fingerprinting And Automatic Deployment Of Software In A Computing Network Using A Peer-To-Peer Approach
- US 12,363,151 – Methods, Systems, And Devices For Dynamically Modeling And Grouping Endpoints For Edge Networking
- US 12,244,626 – Methods, Systems, And Devices For Dynamically Modeling And Grouping Endpoints For Edge Networking
- US 12,235,962 – Method Of Remediating Operations Performed By A Program And System Thereof
- US 12,206,698 – Methods, Systems, And Devices For Dynamically Modeling And Grouping Endpoints For Edge Networking
- US 12,189,623 – Systems And Methods For Data Management And Query Optimization
- US 12,177,241 – Methods, Systems, And Devices For Dynamically Modeling And Grouping Endpoints For Edge Networking
- US 12,169,556 – Systems And Methods For Executable Code Detection, Automatic Feature Extraction And Position Independent Code Detection
- US 12,026,257 – Method Of Malware Detection And System Thereof
- US 11,973,781 – Methods, Systems, And Devices For Dynamically Modeling And Grouping Endpoints For Edge Networking
- US 11,886,591 – Method Of Remediating Operations Performed By A Program And System Thereof
- US 11,876,819 – Methods, Systems, And Devices For Dynamically Modeling And Grouping Endpoints For Edge Networking
- US 11,838,305 – Methods, Systems, And Devices For Dynamically Modeling And Grouping Endpoints For Edge Networking
- US 11,838,306 – Methods, Systems, And Devices For Dynamically Modeling And Grouping Endpoints For Edge Networking
- US 11,790,079 – Systems And Methods For Executable Code Detection, Automatic Feature Extraction And Position Independent Code Detection
- US 11,748,083 – Systems, Methods And Devices For Device Fingerprinting And Automatic Deployment Of Software In A Computing Network Using A Peer-To-Peer Approach
- US 11,722,506 – Methods, Systems, And Devices For Dynamically Modeling And Grouping Endpoints For Edge Networking
- US 11,716,341 – Methods, Systems, And Devices For Dynamically Modeling And Grouping Endpoints For Edge Networking
- US 11,716,342 – Methods, Systems, And Devices For Dynamically Modeling And Grouping Endpoints For Edge Networking
- US 11,625,485 – Method Of Malware Detection And System Thereof
- US 11,580,218 – Systems And Methods For Executable Code Detection, Automatic Feature Extraction And Position Independent Code Detection
- US 11,579,857 – Systems, Methods And Devices For Device Fingerprinting And Automatic Deployment Of Software In A Computing Network Using A Peer-To-Peer Approach
- US 11,522,894 – Methods, Systems, And Devices For Dynamically Modeling And Grouping Endpoints For Edge Networking
- US 11,507,663 – Method Of Remediating Operations Performed By A Program And System Thereof
- US 11,290,478 – Methods, Systems, And Devices For Dynamically Modeling And Grouping Endpoints For Edge Networking
- US 11,245,714 – Methods, Systems, And Devices For Dynamically Modeling And Grouping Endpoints For Edge Networking
- US 11,245,715 – Methods, Systems, And Devices For Dynamically Modeling And Grouping Endpoints For Edge Networking
- US 11,212,309 – Methods, Systems, And Devices For Dynamically Modeling And Grouping Endpoints For Edge Networking
- US 11,210,392 – Systems And Methods For Executable Code Detection, Automatic Feature Extraction And Position Independent Code Detection
- US 10,977,370 – Method Of Remediating Operations Performed By A Program And System Thereof
- US 12,468,810 – Classifying Cybersecurity Threats Using Machine Learning On Non-Euclidean Data
- US 12,452,273 – Systems, Methods, And Devices For Preventing Credential Passing Attacks
- US 12,432,253 – Deceiving Attackers Accessing Network Data
- US 12,418,565 – Deceiving Attackers Accessing Network Data
- US 12,341,814 – Implementing Decoys In A Network Environment
- US 12,261,884 – Deceiving Attackers Accessing Active Directory Data
- US 12,259,967 – Preserving Dll Hooks
- US 11,997,139 – Deceiving Attackers Accessing Network Data
- US 11,899,782 – Preserving Dll Hooks
- US 11,888,897 – Implementing Decoys In A Network Environment
- US 11,695,800 – Deceiving Attackers Accessing Network Data
For additional information please contact patents@sentinelone.com.
