| 10516682 |
Forensic analysis of computing activity |
Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries |
2019-12-24 |
| 10516531 |
Key management for compromised enterprise endpoints |
Harald Schütz, Andrew J. Thomas, Daniel Salvatore Schiappa |
2019-12-24 |
| 10447708 |
Server drift monitoring |
Andrew J. Thomas, Mark David Harris |
2019-10-15 |
| 10382459 |
Threat detection using a time-based cache of reputation information on an enterprise endpoint |
Mark David Harris, Simon Neil Reed, Neil Robert Tyndale Watkiss, Andrew J. Thomas, Robert W. Cook |
2019-08-13 |
| 10263966 |
Perimeter enforcement of encryption rules |
Russell Humphries, Gordon Sullivan, Anthony John Merry, Harald Schütz, Andreas Berger |
2019-04-16 |
| 10248578 |
Methods and systems for protecting data in USB systems |
Paul England, Glen Slick, John C. Dunn, Marcus Peinado, Bryan Willman |
2019-04-02 |
| 10225286 |
Using indications of compromise for reputation based network security |
Simon Neil Reed, Mark David Harris, Neil Robert Tyndale Watkiss, Andrew J. Thomas, Robert W. Cook +1 more |
2019-03-05 |
| 10181034 |
Virtual machine security |
Richard Barlow Harrison, Andrew Piper, Mark Bond, Robert William Allsworth |
2019-01-15 |