| 11245716 |
Composing and applying security monitoring rules to a target environment |
Thomas M. Roelofs |
2022-02-08 |
| 11012455 |
Modifying a user session lifecycle in a cloud broker environment |
Shahnawaz Backer, Christopher J. Hockings, Rohit U. Satyanarayana |
2021-05-18 |
| 10685107 |
Detection of malicious intent in privileged identity environments |
Trevor S. Norvill, Rohit U. Satyanarayana, Suhas V. Kashyap |
2020-06-16 |
| 10581861 |
Endpoint access manager |
Yunfei Bai, Ken Yian Chow, Christopher J. Hockings, Guoguang Jason Lu, Roy Soumyajit +1 more |
2020-03-03 |
| 10320776 |
Protection of application passwords using a secure proxy |
Vivek Shankar |
2019-06-11 |
| 10291636 |
Modifying a user session lifecycle in a cloud broker environment |
Shahnawaz Backer, Christopher J. Hockings, Rohit U. Satyanarayana |
2019-05-14 |
| 10178096 |
Enhanced data leakage detection in cloud services |
Christopher J. Hockings, Budi Mulyono, Sumana S. Narasipur |
2019-01-08 |
| 10171455 |
Protection of application passwords using a secure proxy |
Vivek Shankar |
2019-01-01 |
| 10038690 |
Multifactor authentication processing using two or more devices |
Scott M. Andrews, Christopher J. Hockings, Sumana S. Narasipur |
2018-07-31 |
| 9998455 |
Protection of application passwords using a secure proxy |
Vivek Shankar |
2018-06-12 |
| 9998470 |
Enhanced data leakage detection in cloud services |
Christopher J. Hockings, Budi Mulyono, Sumana S. Narasipur |
2018-06-12 |
| 9887990 |
Protection of application passwords using a secure proxy |
Vivek Shankar |
2018-02-06 |
| 9264436 |
Policy-based automated consent |
Simon Gilbert Canning, Shane Bradley Weeden |
2016-02-16 |