Search

Suranjan Pramanik

from Fremont, CA
Age ~46

Suranjan Pramanik Phones & Addresses

  • 44280 Revere Pl, Fremont, CA 94539
  • Davis, CA
  • Amherst, NY
  • Mountain View, CA
  • 67 Lisbon Ave, Buffalo, NY 14214 (716) 835-3729
  • 29 Callodine Ave, Amherst, NY 14226 (716) 835-3729

Work

Company: Arcsight Position: Sr. software engineer

Education

Degree: PhD School / High School: State University of New York at Buffalo Specialities: CSE

Industries

Computer Software

Resumes

Resumes

Suranjan Pramanik Photo 1

Sr. Software Engineer At Arcsight

View page
Position:
Sr. Software Engineer at ArcSight
Location:
San Francisco Bay Area
Industry:
Computer Software
Work:
ArcSight
Sr. Software Engineer
Education:
State University of New York at Buffalo
PhD, CSE

Business Records

Name / Title
Company / Classification
Phones & Addresses
Suranjan Pramanik
President
CYBERNET SOFTWARE SYSTEMS INC
Custom Computer Programing · Computer Sales
3031 Tisch Way STE 300, San Jose, CA 95128
(408) 615-5700, (408) 615-5707
Suranjan Pramanik
President
SLASHSUPPORT, INC
Telephone Communications
3031 Tisch Way, San Jose, CA 95128

Publications

Us Patents

Event Correlation Based On Confidence Factor

View page
US Patent:
20160019388, Jan 21, 2016
Filed:
Mar 11, 2013
Appl. No.:
14/773983
Inventors:
- Houston TX, US
Robert Block - Sunnyvale CA, US
Suranjan Pramanik - Sunnyvale CA, US
International Classification:
G06F 21/55
Abstract:
According to an example, a confidence factor function may be applied to determine a confidence factor for a condition of a rule to correlate events. The confidence factor may be an approximation of whether an event or a set of events satisfies the condition in the rule. The confidence factor may be compared to a threshold to determine whether the condition is satisfied.

Pattern Consolidation To Identify Malicious Activity

View page
US Patent:
20150215329, Jul 30, 2015
Filed:
Jul 31, 2012
Appl. No.:
14/418910
Inventors:
Anurag Singla - Cupertino CA, US
Suranjan Pramanik - Fremont CA, US
Tomas Sander - New York NY, US
International Classification:
H04L 29/06
H04L 12/24
Abstract:
A process includes analyzing events reported by computing devices on a network to recognize patterns of events that occurred on the network and sharing with a community, information concerning the patterns detected. The process may also use consolidated information on the patterns to select one or more of the patterns for analysis that identifies whether the selected patterns result from malicious activity. The consolidated information includes information on the patterns detected on the network and information concerning corresponding patterns of events that occurred elsewhere.

Identifying Participants For Collaboration In A Threat Exchange Community

View page
US Patent:
20140214938, Jul 31, 2014
Filed:
Jan 31, 2013
Appl. No.:
13/754974
Inventors:
- Houston TX, US
William G. Horne - Lawrenceville NJ, US
Daniel I. Moor - Midland MI, US
Suranjan Pramanik - Fremont CA, US
Tomas Sander - New York NY, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L 29/06
US Classification:
709204
Abstract:
Identifying participants for collaboration in a threat exchange community can include receiving security data from a plurality of participants at a threat exchange server within the threat exchange community; and in response to receiving from a first participant from the plurality of participants security data associated with a security occurrence, identifying at the threat exchange server the first participant and a second participant from the plurality of participants for collaboration based on characteristics of the first participant and the second participant.

Security Threat Analysis

View page
US Patent:
20140215608, Jul 31, 2014
Filed:
Jan 31, 2013
Appl. No.:
13/755195
Inventors:
- Houston TX, US
Tomas Sander - New York NY, US
Suranjan Pramanik - Fremont CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L 29/06
US Classification:
726 22
Abstract:
An example of security threat analysis can include generating a security threat hypothesis based on security data in a threat exchange server. A request for analysis based on the security data can be sent via communication links to at least one security monitored participant to analyze the security data. A response can be received from the at least one security monitored participant with information related to the completed security related task.
Suranjan Pramanik from Fremont, CA, age ~46 Get Report