| 9838355 |
Collaborative analytics for independently administered network domains |
Brian Girardi, Marcelo Blatt, Oleg Freylafert, Kevin D. Bowers, Michael S. Shreve |
2017-12-05 |
| 9787722 |
Integrated development environment (IDE) for network security configuration files |
Denis Knjazihhin, Zachary D. Siswick, Christopher Duane, Daniel Hollingshead |
2017-10-10 |
| 9781130 |
Managing policies |
Daniel V. Bailey, Lawrence N. Friedman, Riaz Zolfonoon |
2017-10-03 |
| 9781129 |
Authenticating an entity |
Daniel V. Bailey, Lawrence N. Friedman, Samuel J. Curry |
2017-10-03 |
| 9769210 |
Classification of security policies across multiple security products |
Sanjay Agarwal, Robin Martherus |
2017-09-19 |
| 9721087 |
User authentication |
Zohar Duchin, Alon Kaufman, Marcelo Blatt |
2017-08-01 |
| 9680812 |
Enrolling a user in a new authentication procdure only if trusted |
Mohsen Emaminouri, Vadim Bruk, Andrew Luke |
2017-06-13 |
| 9680875 |
Security policy unification across different security products |
Denis Knjazihhin, Burak Say, Robin Martherus, Sachin Vasant |
2017-06-13 |
| 9667611 |
Situationally aware authentication |
Lawrence N. Friedman, Gareth Richards, Daniel V. Bailey, William M. Duane, John Brainard |
2017-05-30 |
| 9641540 |
User interface driven translation, comparison, unification, and deployment of device neutral network security policies |
Jason M. Perry, Denis Knjazihhin, Zachary D. Siswick, Sachin Vasant |
2017-05-02 |
| 9641538 |
Authenticating an entity |
Daniel V. Bailey, Lawrence N. Friedman, Samuel J. Curry |
2017-05-02 |
| 9613201 |
Access control by a mobile device using an image |
Lawrence N. Friedman, Gareth Richards, Daniel V. Bailey |
2017-04-04 |
| 9594911 |
Methods and apparatus for multi-factor authentication risk detection using beacon images |
Anton Khitrenovich, Oleg Freylafert, Maor Franco |
2017-03-14 |
| 9571524 |
Creation of security policy templates and security policies based on the templates |
Christopher Duane, Denis Knjazihhin |
2017-02-14 |
| 9535955 |
Modifying queries and rules for profile fetching and risk calculation |
Oded Peer, Oleg Freylafert, Asaf Shoval, Eyal Lewinsohn |
2017-01-03 |