Sulaco Enterprises vs. Fortinet: Voluntary Dismissal in Network Security Patent Case

📄 View Full Report 📥 Export PDF 🔗 Share ⭐ Save

📋 Case Summary

Case NameSulaco Enterprises LLC v. Fortinet, Inc.
Case Number2:25-cv-01187 (E.D. Tex.)
CourtU.S. District Court for the Eastern District of Texas
DurationDec 3, 2025 – Feb 24, 2026 83 days
OutcomeDismissed with Prejudice (Defendant Favorable)
Patents at Issue
Accused ProductsFortinet FortiGate, FortiSandbox, FortiWeb, FortiAppSec Cloud, FortiMail, FortiProxy, FortiClient, FortiGuard Sandbox Services

Case Overview

The Parties

⚖️ Plaintiff

A non-practicing entity (NPE) asserting U.S. patent rights in the network security and threat detection space, typically monetizing IP portfolios through licensing backed by litigation.

🛡️ Defendant

A publicly traded global cybersecurity leader known for its FortiOS and broad Security Fabric architecture, with a significant share in enterprise firewall, sandboxing, and web application security markets.

The Patent at Issue

This case centered on U.S. Patent No. 8,990,942 (Application No. 13/893,943), covering technology in the network security domain. The patent’s claims implicate methods or systems related to threat detection, traffic inspection, or content security filtering, as suggested by the broad range of accused Fortinet products.

The Accused Products

Sulaco’s complaint accused an unusually wide range of Fortinet products, including:

  • • Next-generation firewalls: FortiGate 1000F through FortiGate 7121F series
  • • Sandboxing solutions: FortiSandbox On-Premise, SaaS, PaaS, and VM appliances
  • • Web application firewalls: FortiWeb 100F through FortiWeb 4000F
  • • Cloud platforms: FortiAppSec Cloud (Cloud WAAP), FortiWeb Cloud WAF-as-a-Service
  • • Additional products: FortiMail, FortiProxy, FortiClient, FortiGuard Sandbox Services

Legal Representation

Plaintiff’s counsel: Fabricant LLP (New York), represented by Alfred Ross Fabricant, Peter Lambrianakos, and Vincent J. Rubino III — a firm with an established track record in patent assertion litigation. No defense counsel was formally entered on record prior to dismissal.

🔍

Developing network security solutions?

Check if your product might infringe these or related patents before launch.

Run FTO Check →

Litigation Timeline & Procedural History

MilestoneDate
Complaint FiledDecember 3, 2025
Case ClosedFebruary 24, 2026
Total Duration83 days

Sulaco filed in the Eastern District of Texas — a historically plaintiff-favorable venue and one of the most active patent litigation jurisdictions in the United States. Judge Rodney Gilstrap, Chief Judge of the Eastern District, presided. Judge Gilstrap is among the most experienced patent trial judges in the country, having overseen thousands of patent cases throughout his tenure.

The case closed before Fortinet filed an answer or any dispositive motion. Under Federal Rule of Civil Procedure 41(a)(1)(A)(i), a plaintiff may dismiss an action without a court order by filing a notice of voluntary dismissal before the opposing party serves an answer or a motion for summary judgment. Fortinet had not yet taken either step, making the procedural mechanism straightforward. The Court accepted and acknowledged the dismissal in a formal order, directing the Clerk to close the case.

The 83-day duration places this case firmly in the category of pre-litigation-phase resolutions — a pattern increasingly observed in NPE-driven assertions when early case dynamics shift.

The Verdict & Legal Analysis

Outcome

The case was dismissed with prejudice pursuant to Sulaco’s voluntary notice under Rule 41(a)(1)(A)(i). Each party was ordered to bear its own costs, expenses, and attorneys’ fees. All pending requests for relief were denied as moot.

A dismissal with prejudice is legally significant: it operates as a final adjudication on the merits, barring Sulaco from re-filing the same patent infringement claims against Fortinet based on U.S. Patent No. 8,990,942 in any future action. This is a critical distinction from a dismissal without prejudice, which would preserve the plaintiff’s right to refile.

No damages were awarded. No injunctive relief was granted. No claim construction occurred.

Verdict Cause Analysis

The case record does not disclose the specific reason Sulaco elected voluntary dismissal. However, several strategic explanations are commonly associated with this litigation pattern:

  • Pre-suit licensing resolution: Parties may have reached a private licensing or settlement agreement before Fortinet formally appeared, with the dismissal with prejudice reflecting a negotiated resolution. Importantly, the “each party bears its own costs” language does not preclude a confidential side agreement.
  • Claim viability reassessment: After filing, plaintiff’s counsel may have identified claim construction or validity risks that reduced the likelihood of a favorable outcome — particularly given Fortinet’s substantial technical and legal resources.
  • Defensive signaling by Fortinet: Even without a formal filing, Fortinet’s pre-answer communications or IPR threat posture may have influenced plaintiff’s calculus.

Legal Significance

While this case produced no substantive ruling on patent validity, infringement, or claim construction, its procedural posture carries analytical value:

  • Rule 41(a)(1)(A)(i) precision: The dismissal was cleanly executed before any responsive pleading — a tactical window plaintiffs must monitor carefully. Once a defendant answers, unilateral dismissal under this rule is no longer available.
  • With-prejudice election: Sulaco’s choice to dismiss with prejudice rather than without prejudice signals either a completed resolution or a deliberate strategic retreat on this specific assertion path.
  • NPE assertion patterns: The case fits a recognized pattern where NPEs file broadly scoped complaints in plaintiff-favorable venues and resolve — through licensing or withdrawal — before significant litigation costs accumulate on either side.

Strategic Takeaways

For Patent Holders and Licensors:

  • • Voluntary dismissal with prejudice forecloses future assertions on the same patent against the same defendant — a significant concession that should be weighed carefully against any negotiated consideration received.
  • • Asserting against extensive product lines can create leverage but also signals breadth of exposure, potentially motivating more aggressive early defense responses.

For Accused Infringers:

  • • Fortinet’s apparent posture — not filing an answer or summary judgment motion within the 83-day window — may reflect strategic patience that contributed to the plaintiff’s withdrawal.
  • • Companies should evaluate IPR petition readiness as an early deterrence tool when facing NPE assertions against core product lines.

For R&D Teams:

  • • Freedom-to-operate (FTO) analyses for sandboxing and WAF technologies remain relevant. U.S. Patent No. 8,990,942 remains enforceable against other parties unless invalidated.
  • • The breadth of accused FortiGate, FortiSandbox, and FortiWeb products illustrates how a single patent can be mapped across an entire cybersecurity product portfolio.

Industry & Competitive Implications

The Sulaco v. Fortinet filing reflects sustained NPE activity in the network security and threat detection patent space — a sector that has seen significant assertion activity as sandboxing, cloud WAF, and next-generation firewall technologies have matured commercially.

For Fortinet, the with-prejudice dismissal closes this particular litigation vector, though it does not affect U.S. Patent No. 8,990,942’s potential enforceability against other network security vendors operating in the FortiSandbox, FortiWeb, or NGFW competitive landscape.

Companies including Palo Alto Networks, Check Point, Cisco, and other players in the sandboxing and web application firewall market should monitor assertion activity surrounding patents in Sulaco’s portfolio, as NPEs frequently assert the same IP across multiple targets sequentially.

The Eastern District of Texas continues to attract NPE filings, and Judge Gilstrap’s docket reflects consistent experience managing rapid resolution cases alongside complex multi-patent disputes.

⚠️

Freedom to Operate (FTO) Analysis

This case highlights critical IP risks in network security. Choose your next step:

📋 Understand This Case’s Impact

Learn about the specific risks and implications from this litigation.

  • View related patents in the network security space
  • See which companies are most active in cybersecurity patents
  • Understand claim construction patterns for threat detection
📊 View Patent Landscape
⚠️
High Risk Area

Threat detection & sandboxing tech

📋
US 8,990,942

Key patent in this space

Strategic Options

For navigating IP landscape

✅ Key Takeaways

For Patent Attorneys

Dismissal under Rule 41(a)(1)(A)(i) must occur before the defendant answers — timing precision is critical.

Search related case law →

A with-prejudice dismissal may indicate undisclosed settlement; review any cost-bearing provisions carefully.

Explore precedents →
🔒
Unlock R&D Team Recommendations
Get actionable IP strategy steps for product teams, including FTO timing guidance and competitive analysis insights for network security.
FTO Timing Guidance Competitor Patent Analysis Risk Mitigation Strategies
Explore Full Analysis in PatSnap Eureka

Frequently Asked Questions

Ready to Strengthen Your Patent Strategy?

Join 18,000+ IP professionals using PatSnap Eureka to conduct prior art searches, draft patents, and analyse competitive landscapes with AI-powered precision.

PatSnap IP Intelligence Team

Patent Research & Competitive Intelligence · PatSnap

This analysis was produced by the PatSnap IP Intelligence Team — a group of patent analysts, IP strategists, and data scientists who work daily with PatSnap’s global patent database of over 2 billion structured data points across patents, litigation records, scientific literature, and regulatory filings.

The team specialises in tracking landmark litigation outcomes, translating complex court rulings into actionable IP strategy, and identifying the competitive intelligence implications for R&D and legal teams. All case analysis is grounded in primary sources: official court records, USPTO filings, and Federal Circuit opinions.

📊 2B+ Patent Data Points 🌍 120+ Countries Covered 🏢 18,000+ Customers Worldwide ⚖️ Global Litigation Database 🔍 Primary Source Verified

References

  1. PACER — Case No. 2:25-cv-01187, E.D. Tex.
  2. USPTO Patent Full-Text Database — U.S. Patent No. 8,990,942
  3. Cornell Legal Information Institute — Federal Rule of Civil Procedure 41
  4. PatSnap — IP Intelligence Solutions for Law Firms

This article is for informational purposes only and does not constitute legal advice. All case information is drawn from publicly available court records. For platform capabilities, visit PatSnap.

⚖️ Disclaimer: This article is for informational purposes only and does not constitute legal advice. The analysis presented reflects publicly available case information and general legal principles. For specific advice regarding patent litigation, FTO analysis, or IP strategy, please consult a qualified patent attorney.