PACSEC3 v. Fastly: Firewall Patent Case Transferred to S.D.N.Y.
What would you like to do next?
Choose your path based on your current needs:
📋 Case Summary
| Case Name | PACSEC3, LLC v. Fastly, Inc. |
| Case Number | 4:25-cv-03969 (Transferred to S.D.N.Y.) |
| Court | U.S. District Court, S.D. Texas (Transferred to S.D.N.Y.) |
| Duration | Aug 2025 – Feb 2026 180 days (in S.D. Texas) |
| Outcome | Procedural Outcome: Transferred |
| Patents at Issue | |
| Accused Products | Fastly’s edge security & traffic management capabilities (DDoS mitigation, WAF) |
Introduction
A patent infringement lawsuit targeting Fastly, one of the leading edge cloud platform providers, has been rerouted before it could gain traction in a traditionally plaintiff-friendly Texas venue. In PACSEC3, LLC v. Fastly (Case No. 4:25-cv-03969), the United States District Court for the Southern District of Texas ordered the case transferred to the Southern District of New York — by agreement of the parties — just 180 days after filing. At the center of the dispute: U.S. Patent No. 7,523,497 B2, covering a firewall system designed to defend against data packet flood attacks, more commonly known as DDoS (Distributed Denial of Service) attacks.
For patent attorneys, IP professionals, and R&D leaders operating in the cybersecurity and content delivery network (CDN) space, this case offers meaningful signals about venue strategy, assertion tactics by non-practicing entities (NPEs), and the growing intersection of legacy network security patents with modern cloud infrastructure. The case was closed on February 17, 2026, with the substantive merits yet to be decided in its new forum.
Case Overview
The Parties
⚖️ Plaintiff
A patent assertion vehicle, consistent with a broader class of NPE litigants that monetize IP portfolios in network security and related fields.
🛡️ Defendant
A publicly traded edge cloud platform company providing CDN services, edge computing, real-time streaming, and network security solutions to enterprise clients globally.
The Patent at Issue
The asserted patent, U.S. Patent No. 7,523,497 B2 (Application No. US 10/841,064), claims a firewall system of defense against data packet flood attacks. In plain terms, the patent covers mechanisms to identify, filter, or block abnormal volumes of network traffic — a foundational element of modern DDoS protection systems. Granted under pre-AIA law, this patent represents an earlier generation of network defense architecture that plaintiffs increasingly assert against contemporary cloud and CDN platforms.
- • US 7,523,497 B2 — Firewall system of defense against data packet flood attacks
The Accused Product
The accused product category is identified as a “Firewall System of defense to a data packet flood attack” — broadly mapping to Fastly’s edge security and traffic management capabilities, including its DDoS mitigation and web application firewall (WAF) offerings.
Legal Representation
- • Plaintiff Counsel: William P. Ramey III, Ramey LLP
- • Defendant Counsel: William M. Logan, Winston & Strawn LLP (Chicago)
Winston & Strawn’s involvement signals that Fastly engaged sophisticated, nationally recognized IP defense counsel from the outset — a common posture when defendants anticipate challenging venue or seeking transfer.
Developing network security solutions?
Check if your DDoS mitigation or firewall design might infringe these or related patents before launch.
Litigation Timeline & Procedural History
| Complaint Filed | August 21, 2025 |
| Venue Transfer Ordered | February 17, 2026 |
| Case Closed (S.D. Texas) | February 17, 2026 |
| Total Duration (S.D. Texas) | 180 days |
PACSEC3 filed its complaint in the Southern District of Texas on August 21, 2025, before Chief Judge George C. Hanks, Jr. The choice of the Southern District of Texas — particularly Houston — reflects a broader NPE strategy of selecting venues perceived as efficient and geographically favorable for patent plaintiffs.
However, within six months and by agreement of both parties, the case was transferred to the Southern District of New York pursuant to 28 U.S.C. § 1404(a), the federal venue transfer statute permitting transfer to any district where the case might have been originally brought, in the interest of convenience and justice. The 180-day duration in Texas reflects a pre-trial procedural phase with no substantive rulings on the merits, claim construction, or validity.
The agreed transfer suggests that both parties recognized S.D.N.Y. as the appropriate forum — likely due to Fastly’s operational connections to New York, the location of relevant witnesses or documents, or a negotiated strategic repositioning.
The Verdict & Legal Analysis
Outcome
This case was transferred, not resolved on the merits. The Southern District of Texas entered a transfer order on February 17, 2026, closing the case in that district. No damages were awarded, no injunction was issued, and no findings of validity or infringement were made in the Texas proceeding. The substantive litigation is expected to continue before the Southern District of New York.
Verdict Cause Analysis: Why the Transfer Matters
The transfer under 28 U.S.C. § 1404(a) — executed by agreement rather than contested motion — is a significant procedural development. Under the In re Volkswagen standard and the Federal Circuit’s evolving § 1404(a) jurisprudence, courts in the Fifth Circuit weigh private and public interest factors including witness convenience, location of evidence, and local court interest.
The parties’ mutual agreement to transfer is notable. Contested venue transfers in patent cases can take months to litigate; here, both sides apparently reached a swift consensus. This may reflect:
- Fastly’s principal place of business connections to New York and S.D.N.Y. jurisdiction;
- PACSEC3’s willingness to accept transfer rather than face a contested § 1404(a) motion it might lose;
- Efficiency considerations — S.D.N.Y. may offer a faster or more predictable path to substantive resolution.
Legal Significance
The DDoS patent infringement landscape has become increasingly active as NPEs assert network security patents — many issued between 2000–2010 — against modern cloud infrastructure operators. US 7,523,497 B2 represents this category: a patent covering packet flood defense concepts that predate contemporary CDN architectures but whose claims may nonetheless read on modern implementations.
For claim construction purposes, the critical question in proceedings before S.D.N.Y. will be how terms like “firewall system,” “data packet flood,” and “defense” are construed relative to Fastly’s actual technical architecture. Overly broad claim construction could capture widespread industry practices; narrow construction could immunize Fastly’s implementation entirely.
IPR (Inter Partes Review) risk is also a relevant consideration. Pre-AIA patents like the ‘497 patent are subject to IPR petitions before the USPTO Patent Trial and Appeal Board (PTAB). Fastly’s defense team at Winston & Strawn may evaluate whether a PTAB challenge — based on prior art obviousness or anticipation grounds — offers a more efficient path to invalidation than district court litigation.
Strategic Takeaways
For Patent Holders: Venue selection remains a powerful tool, but the rise of agreed transfers signals that defendants are increasingly successful at redirecting cases away from plaintiff-preferred forums. Asserting patents in venues with strong factual connections to the defendant is strategically sounder.
For Accused Infringers: Early engagement with opposing counsel to negotiate transfer — rather than litigating venue motions — can save significant cost and reposition the case in a more favorable jurisdiction. Fastly’s approach here reflects mature patent litigation defense strategy.
For R&D Teams: Companies deploying DDoS mitigation, edge firewalls, or packet filtering technologies should conduct Freedom to Operate (FTO) analyses against pre-AIA network security patents. The ‘497 patent family and similar assets remain active assertion risks.
Industry & Competitive Implications
The PACSEC3 v. Fastly case reflects a continuing pattern of NPE assertion against CDN and cloud security providers. As DDoS attacks have grown in sophistication and frequency, the commercial value of network security infrastructure has expanded — and with it, the attractiveness of legacy patent portfolios to assertion entities.
For Fastly and its industry peers — including Cloudflare, Akamai, and Amazon CloudFront — this litigation underscores the patent risk inherent in packet-level security features. Even well-established, widely deployed technologies like WAFs and DDoS scrubbing services remain vulnerable to assertion under patents issued during the early 2000s network security era.
From a licensing and settlement perspective, NPE cases involving transferred venues often resolve through negotiated licenses before substantive merits briefing. The agreed transfer may itself be a precursor to settlement discussions in a neutral forum. IP professionals tracking licensing trends in the network security sector should monitor S.D.N.Y. docket activity for any subsequent consent judgment or stipulated dismissal.
Freedom to Operate (FTO) Analysis
This case highlights critical IP risks in network security. Choose your next step:
📋 Understand This Case’s Impact
Learn about the specific risks and implications from this litigation.
- View related patents in the DDoS defense space
- See which companies are most active in network security patents
- Understand claim construction patterns for firewalls
🔍 Check My Product’s Risk
Run a comprehensive FTO analysis for your own technology or product.
- Input your product description or technical features
- AI identifies potentially blocking patents
- Get actionable risk assessment report
High Risk Area
DDoS Mitigation & Packet Filtering
Legacy Patents
From early 2000s network security
Design-Around Options
Available for most claims
✅ Key Takeaways
Agreed § 1404(a) transfers can efficiently reposition patent cases without costly venue motion practice.
Search related case law →Pre-AIA network security patents remain viable assertion assets against cloud infrastructure defendants.
Explore precedents →Early defense strategy should evaluate both district court and PTAB (IPR) pathways in parallel.
Explore IPR tools →Conduct FTO analysis on packet filtering and DDoS mitigation implementations against early-2000s firewall patents.
Start FTO analysis for my product →Design documentation and prior art records should be maintained to support potential invalidity defenses.
Learn about IP strategy →Frequently Asked Questions
The case involves U.S. Patent No. 7,523,497 B2, covering a firewall system of defense against data packet flood attacks, filed under Application No. US 10/841,064.
By agreement of both parties, the case was transferred under 28 U.S.C. § 1404(a) to the Southern District of New York, where litigation on the merits will continue.
It signals continued NPE assertion against cloud and CDN providers using legacy network security patents, and reinforces the importance of early venue and IPR strategy for technology defendants.
Ready to Strengthen Your Patent Strategy?
Join 18,000+ IP professionals using PatSnap Eureka to conduct prior art searches, draft patents, and analyse competitive landscapes with AI-powered precision.
PatSnap IP Intelligence Team
Patent Research & Competitive Intelligence · PatSnap
This analysis was produced by the PatSnap IP Intelligence Team — a group of patent analysts, IP strategists, and data scientists who work daily with PatSnap’s global patent database of over 2 billion structured data points across patents, litigation records, scientific literature, and regulatory filings.
The team specialises in tracking landmark litigation outcomes, translating complex court rulings into actionable IP strategy, and identifying the competitive intelligence implications for R&D and legal teams. All case analysis is grounded in primary sources: official court records, USPTO filings, and Federal Circuit opinions.
References
- PACER — U.S. Federal Courts Public Access to Court Electronic Records
- USPTO Patent Center — U.S. Patent No. 7,523,497 B2
- Cornell Legal Information Institute — 28 U.S.C. § 1404(a)
- PatSnap — IP Intelligence Solutions for Law Firms
This article is for informational purposes only and does not constitute legal advice. All case information is drawn from publicly available court records. For platform capabilities, visit PatSnap.
📑 Table of Contents
🚀 PatSnap Eureka IP Tools
🔍Novelty Search
Find prior art instantly
Patent Drafting
AI-assisted claim writing
FTO Analysis
Assess infringement risk
Concerned About Your Product?
Don’t wait for litigation. Check your product’s freedom to operate now with AI-powered analysis.
Run FTO for My Product