| 12401626 |
Multi-factor network segmentation |
Kaushal Bansal, Fiaz Hossain |
2025-08-26 |
| 12282419 |
Re-usable web-objects for use with automation tools |
Naveen V, Shanavas Madeen S, Ravikanth MALIPEDDU, Santhosh Reddy MEREDDY, Ajith G +2 more |
2025-04-22 |
| 12256039 |
Maintaining service availability |
Kaushal Bansal |
2025-03-18 |
| 12255925 |
Systems and methods for automatically rendering and deploying network security policies |
Gianstefano Monni, Jose Lejin P J, Megha Dixit, Praveenkumar Sowpati, Darragh Connaughton +6 more |
2025-03-18 |
| 12250197 |
Automated external IP address discovery of services in a public cloud environment |
Adam J. Salter, Deepanshu Badola, Stephen Fung, Santhosh Ram Vetrinadar Manohar, Varun Kulkarni Somashekhar +3 more |
2025-03-11 |
| 12170692 |
Network security orchestration and management across different clouds |
Toan Van Nguyen, Sriram Srinivasan, Syed Abdullah Shah, Santhosh Ram Vetrinadar Manohar, Varun Kulkarni Somashekhar +1 more |
2024-12-17 |
| 11977476 |
Incrementally validating security policy code using information from an infrastructure as code repository |
Kaushal Bansal, Selim Ciraci |
2024-05-07 |
| 11805021 |
Network path recommendations for services executing on cloud platforms |
Kaushal Bansal, Amitabh B. Chakrabarty, Alankar Sharma |
2023-10-31 |
| 9852296 |
Rollback feature |
Nitin Jyoti, Gangadharasa Srinivasa |
2017-12-26 |
| 9703958 |
Rollback feature |
Nitin Jyoti, Gangadharasa Srinivasa |
2017-07-11 |
| 9639696 |
Method and apparatus for analyzing end user license agreements |
Sree Hari Nagaralu |
2017-05-02 |
| 9607150 |
Rollback feature |
Nitin Jyoti, Gangadharasa Srinivasa |
2017-03-28 |
| 9607148 |
Method and apparatus for detecting malware on a computer system |
Sujit Magar, Anand Bodke, Abhijit Limaye |
2017-03-28 |
| 9577932 |
Techniques for managing ternary content-addressable memory (TCAM) resources in heterogeneous systems |
Anil Kumar Ravipati, Chirdeep Panduranga, Prateek Tambi |
2017-02-21 |
| 9323928 |
System and method for non-signature based detection of malicious processes |
Romanch Agarwal, Nitin Jyoti, Harinath Ramachetty Vishwanath, Palasamudram Ramagopal Prashanth |
2016-04-26 |
| 9032523 |
Rollback feature |
Nitin Jyoti, Gangadharasa Srinivasa |
2015-05-12 |
| 9015849 |
Method and apparatus for preventing data leakage of e-discovery data items |
Angshuman Bezbaruah, Ankur Panchbudhe |
2015-04-21 |
| 8677493 |
Dynamic cleaning for malware using cloud technology |
Palasamudram Ramagopal Prashanth, Nitin Jyoti |
2014-03-18 |
| 8539583 |
Rollback feature |
Nitin Jyoti, Gangadharasa Srinivasa |
2013-09-17 |
| 8306988 |
System, method, and computer program product for segmenting a database based, at least in part, on a prevalence associated with known objects included in the database |
Nitin Jyoti, Zhenyu Zhong, Guy Roberts, Jeffrey Martin Green, Sven Krasser |
2012-11-06 |