US6131120A
(en)
|
1997-10-24 |
2000-10-10 |
Directory Logic, Inc. |
Enterprise network management directory containing network addresses of users and devices providing access lists to routers and servers
|
US6321338B1
(en)
|
1998-11-09 |
2001-11-20 |
Sri International |
Network surveillance
|
US7181769B1
(en)
*
|
2000-08-25 |
2007-02-20 |
Ncircle Network Security, Inc. |
Network security system having a device profiler communicatively coupled to a traffic monitor
|
US20110238855A1
(en)
*
|
2000-09-25 |
2011-09-29 |
Yevgeny Korsunsky |
Processing data flows with a data flow processor
|
US9525696B2
(en)
*
|
2000-09-25 |
2016-12-20 |
Blue Coat Systems, Inc. |
Systems and methods for processing data flows
|
US20020186683A1
(en)
|
2001-04-02 |
2002-12-12 |
Alan Buck |
Firewall gateway for voice over internet telephony communications
|
US7028179B2
(en)
|
2001-07-03 |
2006-04-11 |
Intel Corporation |
Apparatus and method for secure, automated response to distributed denial of service attacks
|
US7647422B2
(en)
|
2001-11-06 |
2010-01-12 |
Enterasys Networks, Inc. |
VPN failure recovery
|
US7174566B2
(en)
|
2002-02-01 |
2007-02-06 |
Intel Corporation |
Integrated network intrusion detection
|
US8561167B2
(en)
|
2002-03-08 |
2013-10-15 |
Mcafee, Inc. |
Web reputation scoring
|
US7366894B1
(en)
|
2002-06-25 |
2008-04-29 |
Cisco Technology, Inc. |
Method and apparatus for dynamically securing voice and other delay-sensitive network traffic
|
US7152242B2
(en)
|
2002-09-11 |
2006-12-19 |
Enterasys Networks, Inc. |
Modular system for detecting, filtering and providing notice about attack events associated with network security
|
US8272061B1
(en)
|
2002-10-01 |
2012-09-18 |
Skyobox security Inc. |
Method for evaluating a network
|
US7634230B2
(en)
|
2002-11-25 |
2009-12-15 |
Fujitsu Limited |
Methods and apparatus for secure, portable, wireless and multi-hop data networking
|
US7339887B2
(en)
|
2003-05-06 |
2008-03-04 |
Overture Networks, Inc. |
Multipoint protected switching ring
|
US7472422B1
(en)
|
2003-09-10 |
2008-12-30 |
Symantec Corporation |
Security management system including feedback and control
|
US7340597B1
(en)
|
2003-09-19 |
2008-03-04 |
Cisco Technology, Inc. |
Method and apparatus for securing a communications device using a logging module
|
US7814554B1
(en)
|
2003-11-06 |
2010-10-12 |
Gary Dean Ragner |
Dynamic associative storage security for long-term memory storage devices
|
US7424736B2
(en)
|
2004-03-10 |
2008-09-09 |
Combrio, Inc. |
Method for establishing directed circuits between parties with limited mutual trust
|
US8963713B2
(en)
|
2005-03-16 |
2015-02-24 |
Icontrol Networks, Inc. |
Integrated security network with security alarm signaling system
|
US8146160B2
(en)
|
2004-03-24 |
2012-03-27 |
Arbor Networks, Inc. |
Method and system for authentication event security policy generation
|
US7383462B2
(en)
|
2004-07-02 |
2008-06-03 |
Hitachi, Ltd. |
Method and apparatus for encrypted remote copy for secure data backup and restoration
|
US7620001B2
(en)
|
2004-10-13 |
2009-11-17 |
Good Technology, Inc. |
Communication system and method with mobile devices
|
US7478424B2
(en)
|
2004-11-30 |
2009-01-13 |
Cymtec Systems, Inc. |
Propagation protection within a network
|
US7698744B2
(en)
|
2004-12-03 |
2010-04-13 |
Whitecell Software Inc. |
Secure system for allowing the execution of authorized computer program code
|
US7620974B2
(en)
|
2005-01-12 |
2009-11-17 |
Symantec |
Distributed traffic scanning through data stream security tagging
|
US7370143B1
(en)
|
2005-06-20 |
2008-05-06 |
Network Appliance, Inc. |
Controlling write request access to a non-volatile log
|
US7669242B2
(en)
|
2005-06-30 |
2010-02-23 |
Intel Corporation |
Agent presence monitor configured to execute in a secure environment
|
GB0513375D0
(en)
|
2005-06-30 |
2005-08-03 |
Retento Ltd |
Computer security
|
US7979368B2
(en)
|
2005-07-01 |
2011-07-12 |
Crossbeam Systems, Inc. |
Systems and methods for processing data flows
|
US7599301B2
(en)
|
2005-07-01 |
2009-10-06 |
Net Optics, Inc. |
Communications network tap with heartbeat monitor
|
US8984636B2
(en)
|
2005-07-29 |
2015-03-17 |
Bit9, Inc. |
Content extractor and analysis system
|
WO2007038872A1
(en)
|
2005-10-05 |
2007-04-12 |
Byres Security Inc. |
Network security appliance
|
US7917613B2
(en)
|
2005-11-15 |
2011-03-29 |
Microsoft Corporation |
Heartbeat heuristics
|
US7926108B2
(en)
|
2005-11-23 |
2011-04-12 |
Trend Micro Incorporated |
SMTP network security processing in a transparent relay in a computer network
|
US20070143851A1
(en)
|
2005-12-21 |
2007-06-21 |
Fiberlink |
Method and systems for controlling access to computing resources based on known security vulnerabilities
|
US20070167194A1
(en)
|
2006-01-13 |
2007-07-19 |
Research In Motion Limited |
Plural wirelessly connected devices with user alarm if wireless connection is lost or endangered
|
US7975058B2
(en)
|
2006-01-31 |
2011-07-05 |
Cisco Technology, Inc. |
Systems and methods for remote access of network devices having private addresses
|
US9167000B2
(en)
|
2006-02-14 |
2015-10-20 |
Ca, Inc. |
Dynamic threat event management system and method
|
US8413209B2
(en)
|
2006-03-27 |
2013-04-02 |
Telecom Italia S.P.A. |
System for enforcing security policies on mobile communications devices
|
US8201243B2
(en)
|
2006-04-20 |
2012-06-12 |
Webroot Inc. |
Backwards researching activity indicative of pestware
|
US8181244B2
(en)
|
2006-04-20 |
2012-05-15 |
Webroot Inc. |
Backward researching time stamped events to find an origin of pestware
|
US7890612B2
(en)
|
2006-05-08 |
2011-02-15 |
Electro Guard Corp. |
Method and apparatus for regulating data flow between a communications device and a network
|
US9098706B1
(en)
|
2006-07-31 |
2015-08-04 |
Symantec Corporation |
Installer trust chain validation
|
US8190868B2
(en)
|
2006-08-07 |
2012-05-29 |
Webroot Inc. |
Malware management through kernel detection
|
GB0623101D0
(en)
|
2006-11-20 |
2006-12-27 |
British Telecomm |
Secure network architecture
|
US8020207B2
(en)
|
2007-01-23 |
2011-09-13 |
Alcatel Lucent |
Containment mechanism for potentially contaminated end systems
|
US8179798B2
(en)
|
2007-01-24 |
2012-05-15 |
Mcafee, Inc. |
Reputation based connection throttling
|
US20080310337A1
(en)
|
2007-06-18 |
2008-12-18 |
Gainspan, Inc. |
Periodic heartbeat communication between devices and a control point
|
US20090064334A1
(en)
|
2007-08-30 |
2009-03-05 |
International Business Machines Corporation |
Adaptive Autonomic Threat Detection and Quarantine
|
EP2048847A1
(en)
|
2007-10-08 |
2009-04-15 |
Nokia Siemens Networks Oy |
Methods, apparatuses, system, and related computer program product for policy control
|
US20090172114A1
(en)
|
2007-12-31 |
2009-07-02 |
International Business Machines Corporation |
System and method for server-side interruption management
|
US8347355B2
(en)
|
2008-01-17 |
2013-01-01 |
Aerohive Networks, Inc. |
Networking as a service: delivering network services using remote appliances controlled via a hosted, multi-tenant management system
|
US7890637B1
(en)
|
2008-02-25 |
2011-02-15 |
Juniper Networks, Inc. |
Secure communications in a system having multi-homed devices
|
US20090247125A1
(en)
|
2008-03-27 |
2009-10-01 |
Grant Calum Anders Mckay |
Method and system for controlling access of computer resources of mobile client facilities
|
US8806630B2
(en)
|
2008-05-13 |
2014-08-12 |
At&T Intellectual Property, I, L.P. |
Methods and apparatus for intrusion protection in systems that monitor for improper network usage
|
US9152789B2
(en)
|
2008-05-28 |
2015-10-06 |
Zscaler, Inc. |
Systems and methods for dynamic cloud-based malware behavior analysis
|
US8090852B2
(en)
|
2008-06-04 |
2012-01-03 |
Sophos Plc |
Managing use of proxies to access restricted network locations
|
US20100192170A1
(en)
|
2009-01-28 |
2010-07-29 |
Gregory G. Raleigh |
Device assisted service profile management with user preference, adaptive policy, network neutrality, and user privacy
|
US8413238B1
(en)
|
2008-07-21 |
2013-04-02 |
Zscaler, Inc. |
Monitoring darknet access to identify malicious activity
|
US10262136B1
(en)
|
2008-08-04 |
2019-04-16 |
Zscaler, Inc. |
Cloud-based malware detection
|
US8286255B2
(en)
|
2008-08-07 |
2012-10-09 |
Sophos Plc |
Computer file control through file tagging
|
US8556991B2
(en)
|
2008-08-08 |
2013-10-15 |
Absolute Software Corporation |
Approaches for ensuring data security
|
US8677473B2
(en)
|
2008-11-18 |
2014-03-18 |
International Business Machines Corporation |
Network intrusion protection
|
US8462212B1
(en)
|
2008-12-04 |
2013-06-11 |
Stoplift, Inc. |
Correlating detected events with image data
|
US7898939B2
(en)
|
2008-12-16 |
2011-03-01 |
At&T Intellectual Property I, L.P. |
Scalable and robust mechanism for remote IP device monitoring with changing IP address assignment
|
US9270698B2
(en)
|
2008-12-30 |
2016-02-23 |
Intel Corporation |
Filter for network intrusion and virus detection
|
US9270559B2
(en)
|
2009-01-28 |
2016-02-23 |
Headwater Partners I Llc |
Service policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow
|
US20140075567A1
(en)
|
2009-01-28 |
2014-03-13 |
Headwater Partners I Llc |
Service Processor Configurations for Enhancing or Augmenting System Software of a Mobile Communications Device
|
US8392972B2
(en)
|
2009-02-11 |
2013-03-05 |
Sophos Plc |
Protected access control method for shared computer resources
|
US8417954B1
(en)
|
2009-02-11 |
2013-04-09 |
Hewlett-Packard Development Company, L.P. |
Installation image including digital signature
|
US20100212010A1
(en)
|
2009-02-18 |
2010-08-19 |
Stringer John D |
Systems and methods that detect sensitive data leakages from applications
|
US8353058B1
(en)
|
2009-03-24 |
2013-01-08 |
Symantec Corporation |
Methods and systems for detecting rootkits
|
US9177145B2
(en)
|
2009-03-24 |
2015-11-03 |
Sophos Limited |
Modified file tracking on virtual machines
|
US8479267B2
(en)
|
2009-06-30 |
2013-07-02 |
Sophos Limited |
System and method for identifying unauthorized endpoints
|
US20110055891A1
(en)
|
2009-08-26 |
2011-03-03 |
Rice Christopher T |
Device security
|
JP5551913B2
(en)
|
2009-10-13 |
2014-07-16 |
株式会社クローラ研究所 |
Information provision system by video tracking
|
US8621460B2
(en)
|
2009-11-02 |
2013-12-31 |
International Business Machines Corporation |
Endpoint-hosted hypervisor management
|
US20110296519A1
(en)
|
2010-05-14 |
2011-12-01 |
Mcafee, Inc. |
Reputation based connection control
|
US20120174219A1
(en)
|
2010-05-14 |
2012-07-05 |
Mcafee, Inc. |
Identifying mobile device reputations
|
US8374183B2
(en)
|
2010-06-22 |
2013-02-12 |
Microsoft Corporation |
Distributed virtual network gateways
|
US8510829B2
(en)
|
2010-06-24 |
2013-08-13 |
Mcafee, Inc. |
Systems and methods to detect malicious media files
|
US8925101B2
(en)
|
2010-07-28 |
2014-12-30 |
Mcafee, Inc. |
System and method for local protection against malicious software
|
US8938800B2
(en)
|
2010-07-28 |
2015-01-20 |
Mcafee, Inc. |
System and method for network level protection against malicious software
|
US8407804B2
(en)
|
2010-09-13 |
2013-03-26 |
Sophos Plc |
System and method of whitelisting parent virtual images
|
US9235586B2
(en)
|
2010-09-13 |
2016-01-12 |
Microsoft Technology Licensing, Llc |
Reputation checking obtained files
|
US8671449B1
(en)
|
2010-11-10 |
2014-03-11 |
Symantec Corporation |
Systems and methods for identifying potential malware
|
US20120260304A1
(en)
|
2011-02-15 |
2012-10-11 |
Webroot Inc. |
Methods and apparatus for agent-based malware management
|
US9270639B2
(en)
|
2011-02-16 |
2016-02-23 |
Fortinet, Inc. |
Load balancing among a cluster of firewall security devices
|
US9047441B2
(en)
|
2011-05-24 |
2015-06-02 |
Palo Alto Networks, Inc. |
Malware analysis system
|
US9118702B2
(en)
|
2011-05-31 |
2015-08-25 |
Bce Inc. |
System and method for generating and refining cyber threat intelligence data
|
US8990560B2
(en)
|
2011-06-17 |
2015-03-24 |
The Boeing Company |
Multiple independent levels of security (MILS) host to multilevel secure (MLS) offload communications unit
|
US8706834B2
(en)
|
2011-06-30 |
2014-04-22 |
Amazon Technologies, Inc. |
Methods and apparatus for remotely updating executing processes
|
US9239800B2
(en)
|
2011-07-27 |
2016-01-19 |
Seven Networks, Llc |
Automatic generation and distribution of policy information regarding malicious mobile traffic in a wireless network
|
US20130031632A1
(en)
|
2011-07-28 |
2013-01-31 |
Dell Products, Lp |
System and Method for Detecting Malicious Content
|
WO2013055807A1
(en)
|
2011-10-10 |
2013-04-18 |
Global Dataguard, Inc |
Detecting emergent behavior in communications networks
|
JP5687173B2
(en)
|
2011-11-15 |
2015-03-18 |
株式会社日立製作所 |
Communication system and method, heartbeat proxy server
|
US20130232576A1
(en)
|
2011-11-18 |
2013-09-05 |
Vinsula, Inc. |
Systems and methods for cyber-threat detection
|
US9235706B2
(en)
|
2011-12-02 |
2016-01-12 |
Mcafee, Inc. |
Preventing execution of task scheduled malware
|
EP2801236A4
(en)
|
2012-01-05 |
2015-10-21 |
Seven Networks Inc |
Detection and management of user interactions with foreground applications on a mobile device in distributed caching
|
US8914406B1
(en)
|
2012-02-01 |
2014-12-16 |
Vorstack, Inc. |
Scalable network security with fast response protocol
|
EP2817760A4
(en)
|
2012-02-21 |
2015-09-02 |
Logos Technologies Llc |
System for detecting, analyzing, and controlling infiltration of computer and network systems
|
US8918881B2
(en)
|
2012-02-24 |
2014-12-23 |
Appthority, Inc. |
Off-device anti-malware protection for mobile devices
|
US8931043B2
(en)
|
2012-04-10 |
2015-01-06 |
Mcafee Inc. |
System and method for determining and using local reputations of users and hosts to protect information in a network environment
|
CA2874395A1
(en)
|
2012-05-24 |
2013-12-19 |
Douglas H. Lundy |
Threat detection system having multi-hop, wifi or cellular network arrangement of wireless detectors, sensors and sub-sensors that report data and location non-compliance, and enable related devices while blanketing a venue
|
US9055090B2
(en)
|
2012-06-12 |
2015-06-09 |
Verizon Patent And Licensing Inc. |
Network based device security and controls
|
US9374374B2
(en)
|
2012-06-19 |
2016-06-21 |
SecureMySocial, Inc. |
Systems and methods for securing social media for users and businesses and rewarding for enhancing security
|
US8819772B2
(en)
|
2012-06-25 |
2014-08-26 |
Appthority, Inc. |
In-line filtering of insecure or unwanted mobile device software components or communications
|
US8700899B1
(en)
|
2012-06-27 |
2014-04-15 |
Emc Corporation |
Forward-secure key unlocking for cryptographic devices
|
US9088606B2
(en)
*
|
2012-07-05 |
2015-07-21 |
Tenable Network Security, Inc. |
System and method for strategic anti-malware monitoring
|
KR101369727B1
(en)
|
2012-07-11 |
2014-03-06 |
한국전자통신연구원 |
Apparatus and method for controlling traffic based on captcha
|
US9191399B2
(en)
|
2012-09-11 |
2015-11-17 |
The Boeing Company |
Detection of infected network devices via analysis of responseless outgoing network traffic
|
US9178715B2
(en)
|
2012-10-01 |
2015-11-03 |
International Business Machines Corporation |
Providing services to virtual overlay network traffic
|
US8655307B1
(en)
|
2012-10-26 |
2014-02-18 |
Lookout, Inc. |
System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security
|
US9124636B1
(en)
|
2012-12-28 |
2015-09-01 |
Pulse Secure, Llc |
Infected endpoint containment using aggregated security status information
|
US9430646B1
(en)
|
2013-03-14 |
2016-08-30 |
Fireeye, Inc. |
Distributed systems and methods for automatically detecting unknown bots and botnets
|
US10742601B2
(en)
|
2013-03-14 |
2020-08-11 |
Fortinet, Inc. |
Notifying users within a protected network regarding events and information
|
WO2014143012A1
(en)
|
2013-03-15 |
2014-09-18 |
Mcafee, Inc. |
Remote malware remediation
|
US9311480B2
(en)
|
2013-03-15 |
2016-04-12 |
Mcafee, Inc. |
Server-assisted anti-malware client
|
WO2014142986A1
(en)
|
2013-03-15 |
2014-09-18 |
Mcafee, Inc. |
Server-assisted anti-malware client
|
WO2014179805A1
(en)
|
2013-05-03 |
2014-11-06 |
Webroot Inc. |
Method and apparatus for providing forensic visibility into systems and networks
|
US20150047032A1
(en)
|
2013-08-07 |
2015-02-12 |
Front Porch Communications, Inc. |
System and method for computer security
|
US9781019B1
(en)
|
2013-08-15 |
2017-10-03 |
Symantec Corporation |
Systems and methods for managing network communication
|
US9215250B2
(en)
|
2013-08-20 |
2015-12-15 |
Janus Technologies, Inc. |
System and method for remotely managing security and configuration of compute devices
|
US9628507B2
(en)
|
2013-09-30 |
2017-04-18 |
Fireeye, Inc. |
Advanced persistent threat (APT) detection center
|
EP3061030A4
(en)
|
2013-10-24 |
2017-04-19 |
McAfee, Inc. |
Agent assisted malicious application blocking in a network environment
|
US9386034B2
(en)
|
2013-12-17 |
2016-07-05 |
Hoplite Industries, Inc. |
Behavioral model based malware protection system and method
|
US9210183B2
(en)
|
2013-12-19 |
2015-12-08 |
Microsoft Technology Licensing, Llc |
Detecting anomalous activity from accounts of an online service
|
JP6188956B2
(en)
|
2013-12-30 |
2017-08-30 |
ノキア テクノロジーズ オーユー |
Malware detection inspection method and apparatus
|
US8832832B1
(en)
|
2014-01-03 |
2014-09-09 |
Palantir Technologies Inc. |
IP reputation
|
US20150201016A1
(en)
|
2014-01-14 |
2015-07-16 |
Amit Golander |
Methods and system for incorporating a direct attached storage to a network attached storage
|
US9483482B2
(en)
|
2014-02-17 |
2016-11-01 |
Netapp, Inc. |
Partitioning file system namespace
|
US10320676B2
(en)
|
2014-02-28 |
2019-06-11 |
Cisco Technology, Inc. |
Smarter policy decisions based on metadata in data flows
|
US9270636B2
(en)
|
2014-04-07 |
2016-02-23 |
Oracle International Corporation |
Neighbor lookup operations in a network node
|
US10122753B2
(en)
|
2014-04-28 |
2018-11-06 |
Sophos Limited |
Using reputation to avoid false malware detections
|
US9392015B2
(en)
|
2014-04-28 |
2016-07-12 |
Sophos Limited |
Advanced persistent threat detection
|
US9917851B2
(en)
|
2014-04-28 |
2018-03-13 |
Sophos Limited |
Intrusion detection using a heartbeat
|
IN2014MU04068A
(en)
|
2014-12-18 |
2015-06-05 |
Cyberoam Technologies Pvt Ltd |
|
US9736693B2
(en)
|
2015-07-21 |
2017-08-15 |
Motorola Solutions, Inc. |
Systems and methods for monitoring an operating system of a mobile wireless communication device for unauthorized modifications
|
US9928366B2
(en)
|
2016-04-15 |
2018-03-27 |
Sophos Limited |
Endpoint malware detection using an event graph
|
US9716617B1
(en)
|
2016-06-14 |
2017-07-25 |
ShieldX Networks, Inc. |
Dynamic, load-based, auto-scaling network security microservices architecture
|