| 10289694 |
Method and system for restoring encrypted files from a virtual machine image |
Sridhar Surampudi |
2019-05-14 |
| 10089186 |
Method and apparatus for file backup |
— |
2018-10-02 |
| 9946559 |
Techniques for managing virtual machine backups |
James Robert Olson |
2018-04-17 |
| 9773006 |
Techniques for managing non-snappable volumes |
Matthew M. Reker |
2017-09-26 |
| 9424136 |
Systems and methods for creating optimized synthetic backup images |
David Teater, Matthew J. Kokotovich, Weibao Wu, Satyajit Gorhe Parlikar |
2016-08-23 |
| 9152638 |
Method and apparatus for file backup |
— |
2015-10-06 |
| 8930423 |
Method and system for restoring encrypted files from a virtual machine image |
Sridhar Surampudi |
2015-01-06 |
| 8930654 |
Method and apparatus for mapping virtual drives |
David Teater |
2015-01-06 |
| 8838542 |
Optimized image archiving |
Robert Chester |
2014-09-16 |
| 8738871 |
Method and apparatus for mapping virtual drives |
David Teater |
2014-05-27 |
| 8676809 |
Method and apparatus for mapping virtual machine incremental images |
— |
2014-03-18 |
| 8635429 |
Method and apparatus for mapping virtual drives |
David Teater |
2014-01-21 |
| 8577845 |
Remote, granular restore from full virtual machine backup |
Sinh D. Nguyen |
2013-11-05 |
| 8495316 |
Efficient management of archival images of virtual machines having incremental snapshots |
Kuldeep Sureshrao Nagarkar |
2013-07-23 |
| 8495741 |
Remediating malware infections through obfuscation |
Mark Kennedy, Adam Glick |
2013-07-23 |
| 8438349 |
Proxy backup of virtual disk image files on NAS devices |
James Robert Olson, David Teater, Sinh D. Nguyen, James P. Ohr |
2013-05-07 |
| 8397295 |
Method and apparatus for detecting a rootkit |
— |
2013-03-12 |
| 8346727 |
Optimized image archiving |
Robert Chester |
2013-01-01 |
| 8185684 |
Method and apparatus for resolving volume identifiers associated with a virtual machine |
— |
2012-05-22 |
| 7831560 |
Snapshot-aware secure delete |
Michael Spertus |
2010-11-09 |
| 7634521 |
Technique for scanning stealthed, locked, and encrypted files |
Michael Spertus |
2009-12-15 |