| 12388789 |
Security solution orchestration |
Faizan Amjad Mohammed, Venkatesh Nataraj, Gowri Mahendran Lingam Chandramohan, Saravanan Radhakrishnan |
2025-08-12 |
| 12335237 |
Service optimization in networks and cloud interconnects |
Balaji Sundararajan, Venkatesh Nataraj, Padmanabha Nallur, Abha Jain, Kushal A. Patel |
2025-06-17 |
| 12289232 |
Systems and methods for asymmetrical peer forwarding in an SD-WAN environment |
Laxmikantha Reddy Ponnuru, Arul Manickam, Michael David Tracy, Hamzah Kardame |
2025-04-29 |
| 12225051 |
Identity-based policy enforcement in wide area networks |
Balaji Sundararajan, Vishnuprasad Raghavan, Ramana Babu Polamarasetti, Mahalakshmi Rajaram |
2025-02-11 |
| 11824770 |
Systems and methods for asymmetrical peer forwarding in an SD-WAN environment |
Laxmikantha Reddy Ponnuru, Arul Manickam, Michael David Tracy, Hamzah Kardame |
2023-11-21 |
| 11681413 |
Guided drilldown framework for computer-implemented task definition |
Jaison Jacob |
2023-06-20 |
| 11182049 |
Guided drilldown framework for computer-implemented task definition |
Jaison Jacob |
2021-11-23 |
| 10601664 |
Dynamic network and security policy for IoT devices |
Brian Weis, Rashmikant B. Shah, Manoj Nayak |
2020-03-24 |
| 10298581 |
Zero-touch IoT device provisioning |
Rashmikant B. Shah, Brian Weis, Manoj Nayak |
2019-05-21 |