Sulaco Enterprises vs. Fortinet: Voluntary Dismissal in Network Security Patent Case
What would you like to do next?
Choose your path based on your current needs:
📋 Case Summary
| Case Name | Sulaco Enterprises LLC v. Fortinet, Inc. |
| Case Number | 2:25-cv-01187 (E.D. Tex.) |
| Court | U.S. District Court for the Eastern District of Texas |
| Duration | Dec 3, 2025 – Feb 24, 2026 83 days |
| Outcome | Dismissed with Prejudice (Defendant Favorable) |
| Patents at Issue | |
| Accused Products | Fortinet FortiGate, FortiSandbox, FortiWeb, FortiAppSec Cloud, FortiMail, FortiProxy, FortiClient, FortiGuard Sandbox Services |
Case Overview
The Parties
⚖️ Plaintiff
A non-practicing entity (NPE) asserting U.S. patent rights in the network security and threat detection space, typically monetizing IP portfolios through licensing backed by litigation.
🛡️ Defendant
A publicly traded global cybersecurity leader known for its FortiOS and broad Security Fabric architecture, with a significant share in enterprise firewall, sandboxing, and web application security markets.
The Patent at Issue
This case centered on U.S. Patent No. 8,990,942 (Application No. 13/893,943), covering technology in the network security domain. The patent’s claims implicate methods or systems related to threat detection, traffic inspection, or content security filtering, as suggested by the broad range of accused Fortinet products.
- • US 8,990,942 — Network Security Technology
The Accused Products
Sulaco’s complaint accused an unusually wide range of Fortinet products, including:
- • Next-generation firewalls: FortiGate 1000F through FortiGate 7121F series
- • Sandboxing solutions: FortiSandbox On-Premise, SaaS, PaaS, and VM appliances
- • Web application firewalls: FortiWeb 100F through FortiWeb 4000F
- • Cloud platforms: FortiAppSec Cloud (Cloud WAAP), FortiWeb Cloud WAF-as-a-Service
- • Additional products: FortiMail, FortiProxy, FortiClient, FortiGuard Sandbox Services
Legal Representation
Plaintiff’s counsel: Fabricant LLP (New York), represented by Alfred Ross Fabricant, Peter Lambrianakos, and Vincent J. Rubino III — a firm with an established track record in patent assertion litigation. No defense counsel was formally entered on record prior to dismissal.
Developing network security solutions?
Check if your product might infringe these or related patents before launch.
Litigation Timeline & Procedural History
| Milestone | Date |
| Complaint Filed | December 3, 2025 |
| Case Closed | February 24, 2026 |
| Total Duration | 83 days |
Sulaco filed in the Eastern District of Texas — a historically plaintiff-favorable venue and one of the most active patent litigation jurisdictions in the United States. Judge Rodney Gilstrap, Chief Judge of the Eastern District, presided. Judge Gilstrap is among the most experienced patent trial judges in the country, having overseen thousands of patent cases throughout his tenure.
The case closed before Fortinet filed an answer or any dispositive motion. Under Federal Rule of Civil Procedure 41(a)(1)(A)(i), a plaintiff may dismiss an action without a court order by filing a notice of voluntary dismissal before the opposing party serves an answer or a motion for summary judgment. Fortinet had not yet taken either step, making the procedural mechanism straightforward. The Court accepted and acknowledged the dismissal in a formal order, directing the Clerk to close the case.
The 83-day duration places this case firmly in the category of pre-litigation-phase resolutions — a pattern increasingly observed in NPE-driven assertions when early case dynamics shift.
The Verdict & Legal Analysis
Outcome
The case was dismissed with prejudice pursuant to Sulaco’s voluntary notice under Rule 41(a)(1)(A)(i). Each party was ordered to bear its own costs, expenses, and attorneys’ fees. All pending requests for relief were denied as moot.
A dismissal with prejudice is legally significant: it operates as a final adjudication on the merits, barring Sulaco from re-filing the same patent infringement claims against Fortinet based on U.S. Patent No. 8,990,942 in any future action. This is a critical distinction from a dismissal without prejudice, which would preserve the plaintiff’s right to refile.
No damages were awarded. No injunctive relief was granted. No claim construction occurred.
Verdict Cause Analysis
The case record does not disclose the specific reason Sulaco elected voluntary dismissal. However, several strategic explanations are commonly associated with this litigation pattern:
- • Pre-suit licensing resolution: Parties may have reached a private licensing or settlement agreement before Fortinet formally appeared, with the dismissal with prejudice reflecting a negotiated resolution. Importantly, the “each party bears its own costs” language does not preclude a confidential side agreement.
- • Claim viability reassessment: After filing, plaintiff’s counsel may have identified claim construction or validity risks that reduced the likelihood of a favorable outcome — particularly given Fortinet’s substantial technical and legal resources.
- • Defensive signaling by Fortinet: Even without a formal filing, Fortinet’s pre-answer communications or IPR threat posture may have influenced plaintiff’s calculus.
Legal Significance
While this case produced no substantive ruling on patent validity, infringement, or claim construction, its procedural posture carries analytical value:
- • Rule 41(a)(1)(A)(i) precision: The dismissal was cleanly executed before any responsive pleading — a tactical window plaintiffs must monitor carefully. Once a defendant answers, unilateral dismissal under this rule is no longer available.
- • With-prejudice election: Sulaco’s choice to dismiss with prejudice rather than without prejudice signals either a completed resolution or a deliberate strategic retreat on this specific assertion path.
- • NPE assertion patterns: The case fits a recognized pattern where NPEs file broadly scoped complaints in plaintiff-favorable venues and resolve — through licensing or withdrawal — before significant litigation costs accumulate on either side.
Strategic Takeaways
For Patent Holders and Licensors:
- • Voluntary dismissal with prejudice forecloses future assertions on the same patent against the same defendant — a significant concession that should be weighed carefully against any negotiated consideration received.
- • Asserting against extensive product lines can create leverage but also signals breadth of exposure, potentially motivating more aggressive early defense responses.
For Accused Infringers:
- • Fortinet’s apparent posture — not filing an answer or summary judgment motion within the 83-day window — may reflect strategic patience that contributed to the plaintiff’s withdrawal.
- • Companies should evaluate IPR petition readiness as an early deterrence tool when facing NPE assertions against core product lines.
For R&D Teams:
- • Freedom-to-operate (FTO) analyses for sandboxing and WAF technologies remain relevant. U.S. Patent No. 8,990,942 remains enforceable against other parties unless invalidated.
- • The breadth of accused FortiGate, FortiSandbox, and FortiWeb products illustrates how a single patent can be mapped across an entire cybersecurity product portfolio.
Industry & Competitive Implications
The Sulaco v. Fortinet filing reflects sustained NPE activity in the network security and threat detection patent space — a sector that has seen significant assertion activity as sandboxing, cloud WAF, and next-generation firewall technologies have matured commercially.
For Fortinet, the with-prejudice dismissal closes this particular litigation vector, though it does not affect U.S. Patent No. 8,990,942’s potential enforceability against other network security vendors operating in the FortiSandbox, FortiWeb, or NGFW competitive landscape.
Companies including Palo Alto Networks, Check Point, Cisco, and other players in the sandboxing and web application firewall market should monitor assertion activity surrounding patents in Sulaco’s portfolio, as NPEs frequently assert the same IP across multiple targets sequentially.
The Eastern District of Texas continues to attract NPE filings, and Judge Gilstrap’s docket reflects consistent experience managing rapid resolution cases alongside complex multi-patent disputes.
Freedom to Operate (FTO) Analysis
This case highlights critical IP risks in network security. Choose your next step:
📋 Understand This Case’s Impact
Learn about the specific risks and implications from this litigation.
- View related patents in the network security space
- See which companies are most active in cybersecurity patents
- Understand claim construction patterns for threat detection
🔍 Check My Product’s Risk
Run a comprehensive FTO analysis for your own technology or product.
- Input your product description or technical features
- AI identifies potentially blocking patents
- Get actionable risk assessment report
High Risk Area
Threat detection & sandboxing tech
US 8,990,942
Key patent in this space
Strategic Options
For navigating IP landscape
✅ Key Takeaways
Dismissal under Rule 41(a)(1)(A)(i) must occur before the defendant answers — timing precision is critical.
Search related case law →A with-prejudice dismissal may indicate undisclosed settlement; review any cost-bearing provisions carefully.
Explore precedents →Maintain current Freedom-to-Operate (FTO) analyses for sandboxing, WAF, and next-generation firewall technologies.
Start FTO analysis for my product →Understand how a single patent can be mapped across an entire cybersecurity product portfolio to assess broad exposure.
Try AI patent drafting →Frequently Asked Questions
The case involved U.S. Patent No. 8,990,942 (Application No. 13/893,943), asserted against a broad range of Fortinet network security products.
Sulaco filed a voluntary notice of dismissal under FRCP Rule 41(a)(1)(A)(i) before Fortinet answered or moved for summary judgment. The with-prejudice designation bars Sulaco from reasserting the same claims against Fortinet.
U.S. Patent No. 8,990,942 remains active and could be asserted against other vendors. Companies in the sandboxing, WAF, and NGFW markets should monitor Sulaco’s assertion activity and maintain proactive FTO positions.
Ready to Strengthen Your Patent Strategy?
Join 18,000+ IP professionals using PatSnap Eureka to conduct prior art searches, draft patents, and analyse competitive landscapes with AI-powered precision.
PatSnap IP Intelligence Team
Patent Research & Competitive Intelligence · PatSnap
This analysis was produced by the PatSnap IP Intelligence Team — a group of patent analysts, IP strategists, and data scientists who work daily with PatSnap’s global patent database of over 2 billion structured data points across patents, litigation records, scientific literature, and regulatory filings.
The team specialises in tracking landmark litigation outcomes, translating complex court rulings into actionable IP strategy, and identifying the competitive intelligence implications for R&D and legal teams. All case analysis is grounded in primary sources: official court records, USPTO filings, and Federal Circuit opinions.
References
- PACER — Case No. 2:25-cv-01187, E.D. Tex.
- USPTO Patent Full-Text Database — U.S. Patent No. 8,990,942
- Cornell Legal Information Institute — Federal Rule of Civil Procedure 41
- PatSnap — IP Intelligence Solutions for Law Firms
This article is for informational purposes only and does not constitute legal advice. All case information is drawn from publicly available court records. For platform capabilities, visit PatSnap.
📑 Table of Contents
🚀 PatSnap Eureka IP Tools
🔍Novelty Search
Find prior art instantly
Patent Drafting
AI-assisted claim writing
FTO Analysis
Assess infringement risk
Concerned About Your Network Security Product?
Don’t wait for litigation. Check your product’s freedom to operate now with AI-powered analysis.
Run FTO for My Product