| 9911222 |
Animation in threaded conversations |
Eric Setton, Uri Raz, Geoff Lee, Jamie Odell, Huy Quoc PHAN |
2018-03-06 |
| 9674235 |
Creating a contact list and pre-populated user accounts |
Eric Setton, Gregory Dorso, Chen Ding |
2017-06-06 |
| 8799287 |
Method and apparatus for categorizing documents containing sensitive information |
Aleksey Tsibulya |
2014-08-05 |
| 8752180 |
Behavioral engine for identifying patterns of confidential data use |
Mario Espinoza |
2014-06-10 |
| 8695090 |
Data loss protection through application data access classification |
Bruce Wootton, Dirk Kessler, Rajesh Upadhyay |
2014-04-08 |
| 8613040 |
Adaptive data loss prevention policies |
— |
2013-12-17 |
| 8356357 |
Detecting tainted documents by tracking transformed confidential data |
Timothy Micheal Wyatt |
2013-01-15 |
| 7814535 |
Method and apparatus for peer-to-peer compliancy validation in secure managed networks |
Sourabh Satish |
2010-10-12 |