Union City, CA, United States of America

Gun Sumlut


Average Co-Inventor Count = 3.0

ph-index = 1


Company Filing History:


Years Active: 2023-2024

Loading Chart...
2 patents (USPTO):

Title: Innovations by Gun Sumlut in Network Security

Introduction

Gun Sumlut is an accomplished inventor based in Union City, CA (US). He has made significant contributions to the field of network security, holding a total of 2 patents. His work focuses on detecting malicious behavior in networks, utilizing advanced security analytics.

Latest Patents

Gun Sumlut's latest patents include systems and methods for detecting malicious behavior in a network by analyzing process interaction ratios (PIRs). These patents provide a framework for maintaining historical process activity information, which includes various processes hosted by computing devices within a private network. During a current observation period, information regarding process activity is collected. For each process, a PIR is determined based on the number of unique computing devices that hosted the process and the number of unique users that executed it. A process is flagged as potentially malicious when its PIR deviates significantly from its historical mean, exceeding a predefined threshold during a testing time period.

Career Highlights

Gun Sumlut is currently employed at Fortinet, Inc., a leading cybersecurity company. His expertise in network security has positioned him as a valuable asset in the industry. His innovative approaches to security analytics have contributed to enhancing the safety and integrity of network systems.

Collaborations

Gun Sumlut has collaborated with notable colleagues, including Ernest Mugambi and Partha P Bhattacharya. Their combined efforts in the field of cybersecurity have led to advancements in detecting and mitigating network threats.

Conclusion

Gun Sumlut's contributions to network security through his patents and collaborations highlight his role as a key innovator in the field. His work continues to influence the development of effective security measures against malicious activities in networks.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…