| 12107879 |
Determining data risk and managing permissions in computing environments |
Carl A. Waldspurger, Shaun Robert APPLEGATE-SWANSON, Venkata Adusumilli, Naga Venkata Naveen Teja Jangalapalli, Nicholas James Barretta +2 more |
2024-10-01 |
| 11818175 |
Method and system for quantifying and improving conformance to least privilege security policies |
Shaun Robert APPLEGATE-SWANSON, Carl A. Waldspurger, Naveen Teja JANGALAPALLI, Maya Neelakandhan, Venkata Adusumilli +1 more |
2023-11-14 |
| 11632373 |
Activity based authorization for accessing and operating enterprise infrastructure |
Venkata Adusumilli, Maya Neelakandhan, Naga Venkata Naveen Teja Jangalapalli |
2023-04-18 |
| 10454935 |
Method and system to detect discrepancy in infrastructure security configurations from translated security best practice configurations in heterogeneous environments |
Koteswara Rao Cherukuri |
2019-10-22 |
| 10454934 |
Activity based access control in heterogeneous environments |
Koteswara Rao Cherukuri |
2019-10-22 |
| 9063768 |
Method and apparatus for comparing configuration and topology of virtualized datacenter inventories |
Vijayaraghavan Soundararajan |
2015-06-23 |
| 9049257 |
Methods and apparatus for an E-mail-based management interface for virtualized environments |
Vijayaraghavan Soundararajan, Conrad H. ALBRECHT-BUEHLER, Raja Rao DV |
2015-06-02 |
| 8938680 |
Methods and apparatus for E-mail-based management of virtualized environments |
Vijayaraghavan Soundararajan, Raja Rao DV |
2015-01-20 |
| 8909602 |
Programmatic snapshot and revert of virtualized data center inventory |
Vijayaraghavan Soundararajan |
2014-12-09 |