| 10158663 |
Incident response using asset configuration data |
Oliver Friedrichs, Atif Mahadik, Govind Salinas |
2018-12-18 |
| 10116687 |
Management of administrative incident response based on environmental characteristics associated with a security incident |
Oliver Friedrichs, Atif Mahadik, Govind Salinas |
2018-10-30 |
| 10063587 |
Management of security actions based on computing asset classification |
Oliver Friedrichs, Atif Mahadik, Govind Salinas |
2018-08-28 |
| 10049190 |
Method and apparatus for remotely managing a resource at a computer |
Keith Newstadt, Shaun Cooley, Timothy G. Brown, Brian Hernacki |
2018-08-14 |
| 9971776 |
Method and apparatus for extending functionality of an operating system |
Brian Hernacki |
2018-05-15 |
| 9959404 |
Methods and systems for creating and updating approved-file and trusted-domain databases |
Carey Nachenberg, Michael Spertus, Gerry A. Egan |
2018-05-01 |
| 9954888 |
Security actions for computing assets based on enrichment information |
Oliver Friedrichs, Atif Mahadik, Govind Salinas |
2018-04-24 |
| 9888029 |
Classifying kill-chains for security incidents |
Oliver Friedrichs, Atif Mahadik, Govind Salinas |
2018-02-06 |
| 9871818 |
Managing workflows upon a security incident |
Oliver Friedrichs, Atif Mahadik, Govind Salinas |
2018-01-16 |