| 12395501 |
Security event connectivity generated by linking enitities and actions from process tracking |
Marc Willebeek-LeMair, Brian Smith, Ian S. Nelson, Seth Goldhammer |
2025-08-19 |
| 9588740 |
Systems, methods and computer program products for construction of cloud applications |
Nathan J. Giardina, Beau Croteau, Robert Hucik |
2017-03-07 |
| 9412099 |
Automated item recognition for retail checkout systems |
— |
2016-08-09 |
| 9349013 |
Vulnerability-based remediation selection |
Kurt D'Mello, Sudhir Gandhe |
2016-05-24 |
| 9270543 |
Application centered network node selection |
Nathan J. Giardina, Robert Hucik, Beau Croteau |
2016-02-23 |
| 9235322 |
Systems, methods and computer program products for a cloud application editor |
Beau Croteau, Nathan J. Giardina, Robert Hucik |
2016-01-12 |
| 9189369 |
Systems, methods and computer program products for an automated test framework |
Nathan J. Giardina, Beau Croteau, Robert Hucik |
2015-11-17 |
| 9189560 |
Discovery of asset information through scanning of communication tags associated with assets |
Nathan J. Giardina |
2015-11-17 |
| 9130943 |
Managing communications between client applications and application resources of on-premises and cloud computing nodes |
Nathan J. Giardina, Beau Croteau, Robert Hucik |
2015-09-08 |
| 9077609 |
Scalable reusable scanning of application networks/systems |
— |
2015-07-07 |
| 9059858 |
User characteristic based digital signature of documents |
Nathan J. Giardina, Beau Croteau, Robert Hucik |
2015-06-16 |
| 8935768 |
Controlling client access to email responsive to email class levels |
— |
2015-01-13 |
| 8856315 |
Device classification system |
James E. Tomlinson |
2014-10-07 |
| 8756277 |
Automatically generating compliance questionnaires |
— |
2014-06-17 |
| 8635702 |
Determining technology-appropriate remediation for vulnerability |
Kurt D'Mello, Sudhir Gandhe, Eric David O'Brien |
2014-01-21 |
| 8561197 |
Vulnerability-based remediation selection |
Kurt D'Mello, Sudhir Gandhe |
2013-10-15 |
| 8468606 |
Security handling based on risk management |
Yves Van De Weyer, Henk Van Wulpen |
2013-06-18 |
| 8341710 |
Ubiquitous webtoken |
— |
2012-12-25 |
| 8171555 |
Determining technology-appropriate remediation for vulnerability |
Kurt D'Mello, Eric David O'Brien, Sudhir Gandhe |
2012-05-01 |
| 7774848 |
Mapping remediation to plurality of vulnerabilities |
Kurt D'Mello, Sudhir Gandhe |
2010-08-10 |
| 7694337 |
Data structure for vulnerability-based remediation selection |
Kurt D'Mello, Eric David O'Brien, Sudhir Gandhe |
2010-04-06 |