Issued Patents All Time
Showing 1–25 of 33 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12032702 | Automated health-check risk assessment of computing assets | Muhammed Fatih Bulut, Robert Filepp, Sai Zeng, Steven Ocepek, Srinivas B. Tummalapenta +1 more | 2024-07-09 |
| 12014174 | Testing and remediating endpoint device compliance controls | Constantin Mircea Adam, Richard Jay Cohen, Robert Filepp, Brian Peterson, Maja Vukovic +3 more | 2024-06-18 |
| 11924239 | Vulnerability and attack technique association | Lilian Mathias Ngweta, Steven Ocepek, Constantin Mircea Adam, Sai Zeng, Muhammed Fatih Bulut | 2024-03-05 |
| 11659006 | Computer environment compliance | Anup Kalia, Brian Peterson, Vugranam C. Sreedhar, Sai Zeng | 2023-05-23 |
| 11537602 | Computer implemented live cross walks in compliance mappings in response to regulatory changes and assessing risks of changes | Muhammed Fatih Bulut, Arun Kumar, Kuntal Dey, Constantin Mircea Adam | 2022-12-27 |
| 11533296 | Testing and remediating compliance controls | Constantin Mircea Adam, Richard Jay Cohen, Robert Filepp, Brian Peterson, Maja Vukovic +3 more | 2022-12-20 |
| 11502995 | Testing and remediating compliance controls | Constantin Mircea Adam, Richard Jay Cohen, Robert Filepp, Brian Peterson, Maja Vukovic +3 more | 2022-11-15 |
| 11411979 | Compliance process risk assessment | Muhammed Fatih Bulut, Jinho Hwang, Constantin Mircea Adam, Daniel S. Riley | 2022-08-09 |
| 11244012 | Compliance by clustering assets according to deviations | Constantin Mircea Adam, Muhammed Fatih Bulut, Maja Vukovic | 2022-02-08 |
| 11178110 | Controlling compliance remediations | Constantin Mircea Adam, Jeffrey Edward Lammers, Muhammed Fatih Bulut, Maja Vukovic | 2021-11-16 |
| 11176508 | Minimizing compliance risk using machine learning techniques | Jinho Hwang, Constantin Mircea Adam, Muhammed Fatih Bulut | 2021-11-16 |
| 11128668 | Hybrid network infrastructure management | Jinho Hwang, Nikolaos Anerousis, Brian Peterson | 2021-09-21 |
| 11093619 | Automated fixups based on partial goal satisfaction | Constantin Mircea Adam, Muhammed Fatih Bulut, Anup Kalia, John Rofrano, Maja Vukovic | 2021-08-17 |
| 10979456 | Computer environment compliance | Anup Kalia, Brian Peterson, Vugranam C. Sreedhar, Sai Zeng | 2021-04-13 |
| 10789204 | Enterprise-level data protection with variable data granularity and data disclosure control with hierarchical summarization, topical structuring, and traversal audit | Lawrence D. Bergman, Kumar Bhaskaran, Winnie Cheng, Robert Alan Flavin, Hai Huang +3 more | 2020-09-29 |
| 10778713 | Method and system to manage risk of vulnerabilities and corresponding change actions to address malware threats | Sai Zeng, Vugranam C. Sreedhar, Karin Murthy, Jinho Hwang, Lisa M. Chavez +4 more | 2020-09-15 |
| 10454676 | Automatic key management using enterprise user identity management | Constantin Mircea Adam, Vugranam C. Sreedhar, Prema Vivekanandan | 2019-10-22 |
| 10348727 | Automatic key management using enterprise user identity management | Constantin Mircea Adam, Vugranam C. Sreedhar, Prema Vivekanandan | 2019-07-09 |
| 10171310 | Ensuring regulatory compliance during application migration to cloud-based containers | Jill L. Jermyn, Clifford A. Pickover, Maja Vukovic | 2019-01-01 |
| 9959273 | Enterprise-level data protection with variable data granularity and data disclosure control with hierarchical summarization, topical structuring, and traversal audit | Lawrence D. Bergman, Kumar Bhaskaran, Winnie Cheng, Robert Alan Flavin, Hai Huang +3 more | 2018-05-01 |
| 9940466 | Computer-implemented command control in information technology service environment | Constantin Mircea Adam, Nikolaos Anerousis, Vysakh K. Chandran, Debasisha Padhi, Yaoping Ruan +3 more | 2018-04-10 |
| 9628357 | Service compliance enforcement using user activity monitoring and work request verification | Jim A. Laredo, Mattias Marder, Yaoping Ruan, Nandagopal Seshagiri | 2017-04-18 |
| 9608881 | Service compliance enforcement using user activity monitoring and work request verification | Jim A. Laredo, Mattias Marder, Yaoping Ruan, Nandagopal Seshagiri | 2017-03-28 |
| 9584378 | Computer-implemented command control in information technology service environment | Constantin Mircea Adam, Nikolaos Anerousis, Vysakh K. Chandran, Debasisha Padhi, Yaoping Ruan +3 more | 2017-02-28 |
| 9088562 | Using service request ticket for multi-factor authentication | Paul Driscoll, Paul D. Jennings, Chee Meng Low, Yaoping Ruan, Larisa Shwartz | 2015-07-21 |