| 10862864 |
Network device with transparent heartbeat processing |
Moritz Daniel Grimm, Daniel Stutz, Andrew J. Thomas |
2020-12-08 |
| 10841339 |
Normalized indications of compromise |
Robert W. Cook, Andrew J. Thomas, Dmitri Samosseiko, Mark David Harris |
2020-11-17 |
| 10834061 |
Perimeter enforcement of encryption rules |
Russell Humphries, Gordon Sullivan, Anthony John Merry, Harald Schütz, Andreas Berger |
2020-11-10 |
| 10791097 |
Portable encryption format |
Stefan Ortner, Andreas Berger, Vincent Vanbiervliet |
2020-09-29 |
| 10778725 |
Using indications of compromise for reputation based network security |
Simon Neil Reed, Mark David Harris, Neil Robert Tyndale Watkiss, Andrew J. Thomas, Robert W. Cook +1 more |
2020-09-15 |
| 10776485 |
Virtual machine security |
Richard Barlow Harrison, Andrew Piper, Mark Bond, Robert William Allsworth |
2020-09-15 |
| 10762209 |
Boot security |
Simon Neil Reed, Daniel Salvatore Schiappa |
2020-09-01 |
| 10721210 |
Secure labeling of network flows |
Daniel Salvatore Schiappa, Andrew J. Thomas, Joseph H. Levy |
2020-07-21 |
| 10691824 |
Behavioral-based control of access to encrypted content by a process |
Andrew J. Thomas, Anthony John Merry, Harald Schütz, Andreas Berger, John Edward Tyrone Shaw |
2020-06-23 |
| 10686827 |
Intermediate encryption for exposed content |
Harald Schütz, Anthony John Merry, Andreas Berger |
2020-06-16 |
| 10681078 |
Key throttling to mitigate unauthorized file access |
Russell Humphries, Anthony John Merry, Harald Schütz |
2020-06-09 |
| 10673902 |
Labeling computing objects for improved threat detection |
Andrew J. Thomas, Mark David Harris, Simon Neil Reed, Neil Robert Tyndale Watkiss |
2020-06-02 |
| 10673873 |
Intrusion detection using a heartbeat |
— |
2020-06-02 |
| 10657277 |
Behavioral-based control of access to encrypted content by a process |
Andrew J. Thomas, Anthony John Merry, Harald Schütz, Andreas Berger, John Edward Tyrone Shaw |
2020-05-19 |
| 10650154 |
Process-level control of encrypted content |
Andrew J. Thomas, Anthony John Merry, Harald Schütz, Andreas Berger, John Edward Tyrone Shaw |
2020-05-12 |
| 10650141 |
Mitigation of return-oriented programming attacks |
Erik Jan Loman, Lute Edwin Engels, Andrew J. Thomas |
2020-05-12 |
| 10628597 |
Just-in-time encryption |
Andreas Berger, Harald Schütz, Anthony John Merry, Norbert Gruber, Markus Hein +2 more |
2020-04-21 |
| 10558800 |
Labeling objects on an endpoint for encryption management |
Daniel Salvatore Schiappa, Simon Neil Reed, Mark David Harris, Neil Robert Tyndale Watkiss, Andrew J. Thomas +4 more |
2020-02-11 |
| 10528739 |
Boot security |
Simon Neil Reed, Daniel Salvatore Schiappa |
2020-01-07 |