| 11824866 |
Peripheral landscape and context monitoring for user-identify verification |
David John Zacks, Frank Michaud, Carlos M. Pignataro |
2023-11-21 |
| 11818137 |
Context-based security policy for data access and visibility |
Nagendra Kumar Nainar, Carlos M. Pignataro, David John Zacks |
2023-11-14 |
| 11805112 |
Enhanced multi-factor authentication based on physical and logical proximity to trusted devices and users |
David John Zacks, Carlos M. Pignataro |
2023-10-31 |
| 11792230 |
Resolving access policies between intent-based network architectures and cloud native architectures |
David John Zacks, Walter Theodore Hulick, Jr., Shannon McFarland |
2023-10-17 |
| 11743160 |
Automating and extending path tracing through wireless links |
Jerome Henry, Robert Edgar Barton, Malcolm Muir Smith |
2023-08-29 |
| 11729082 |
Techniques for providing inter-cluster dependencies |
Peter Turi, Zsolt Varga |
2023-08-15 |
| 11706214 |
Continuous multifactor authentication system integration with corporate security systems |
Alan Robert Lynn, David John Zacks, Frank Michaud |
2023-07-18 |
| 11665079 |
Probe-triggered full device state capture, export, and correlation |
David John Zacks, Carlos M. Pignataro, Nagendra Kumar Nainar, Hans F. Ashlock, Prapanch Ramamoorthy |
2023-05-30 |
| 11665078 |
Discovery and tracing of external services |
Hans F. Ashlock, David John Zacks |
2023-05-30 |
| 11616727 |
Data pipeline configuration using network sensors |
Robert Edgar Barton, Jerome Henry, Daniel Eckstein |
2023-03-28 |
| 11601393 |
Microservice visibility and control |
David John Zacks, Akram Ismail Sheriff, Guy Keinan, Walter Theodore Hulick, Jr. |
2023-03-07 |