| 12124592 |
Systems and methods for artificial intelligence (AI)-driven cybersecurity enclaves |
Joshua P. Bugryn, Lawrence A. Senechal, Michael C. Kunkel, Sereres C. Riordan |
2024-10-22 |
| 11652847 |
Decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment |
Edward G. Amoroso, Michelle Barry, Anthony Ramos, Daniel Solero, Duncan Kirkwood Sparrell +1 more |
2023-05-16 |
| 11636239 |
Method and apparatus for simulating events on smart cities |
Aleksey Ivanov, Barbara Laing, Carey Joseph, Donald Heatley |
2023-04-25 |
| 11575713 |
Decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment |
Edward G. Amoroso, Michelle Barry, Anthony Ramos, Daniel Solero, Duncan Kirkwood Sparrell +1 more |
2023-02-07 |
| 11349837 |
Identity vault service |
Thomas A. Cannon, JR., Aleksey Ivanov, Barbara Laing, Mark Easley |
2022-05-31 |
| 10440060 |
End-to-end secure cloud computing |
Gustavo de los Reyes, William R. Beckett, III, Jerry Birkes, Deepak Chawla, Joshua David Knight +1 more |
2019-10-08 |
| 10425685 |
Video content monitoring device and methods thereof |
— |
2019-09-24 |
| 10091245 |
Decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment |
Edward G. Amoroso, Michelle Barry, Anthony Ramos, Daniel Solero, Duncan Kirkwood Sparrell +1 more |
2018-10-02 |
| 9825973 |
Website security |
Daniel Sheleheda, Edward G. Amoroso, Cynthia Cama, Junlan Feng, Gregory Leibolt +3 more |
2017-11-21 |
| 9774634 |
End-to-end secure cloud computing |
Gustavo de los Reyes, William R. Beckett, III, Jerry Birkes, Deepak Chawla, Joshua David Knight +1 more |
2017-09-26 |
| 9635419 |
Video content monitoring device and methods thereof |
— |
2017-04-25 |
| 9456003 |
Decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment |
Edward G. Amoroso, Michelle Barry, Anthony Ramos, Daniel Solero, Duncan Kirkwood Sparrell +1 more |
2016-09-27 |
| 9400967 |
Devices, systems and methods for portable device location |
— |
2016-07-26 |
| 9392023 |
End-to-end secure cloud computing |
Gustavo de los Reyes, Willam R. Beckett, Jerry Birkes, Deepak Chawla, Joshua David Knight +1 more |
2016-07-12 |
| 9338175 |
Methods and systems for providing comprehensive cyber-security protection using an open application programming interface based platform solution |
Anthony Ramos, Daniel Solero |
2016-05-10 |
| 9172712 |
Method and system for improving website security |
Daniel Sheleheda, Edward G. Amoroso, Cynthia Cama, Junlan Feng, Gregory Leibolt +3 more |
2015-10-27 |
| 8856300 |
End-to-end secure cloud computing |
Gustavo de los Reyes, William R. Becket, III, Jerry Birkes, Deepak Chawla, Joshua David Knight +1 more |
2014-10-07 |
| 8812710 |
Video content monitoring and display based on popularity |
— |
2014-08-19 |
| 8661147 |
Monitoring requested content |
Daniel Sheleheda, Edward G. Amoroso, Cynthia Cama, Sanjay Macwan |
2014-02-25 |
| 8627373 |
System and method for presenting media services |
Nancy Grover, Edward G. Amoroso |
2014-01-07 |
| 8453178 |
System and method for presenting media services |
Nancy Grover, Edward G. Amoroso |
2013-05-28 |
| 8269609 |
Devices, systems and methods for portable device location |
— |
2012-09-18 |
| 8156518 |
System and method for filtering audio content |
— |
2012-04-10 |
| 8146146 |
Method and apparatus for integrated network security alert information retrieval |
John L. Coviello, Stephen Roderick, Michael Singer |
2012-03-27 |
| 7975286 |
Method and apparatus for evaluating assets for compliance to a security policy |
Kathryn Lynn Fickey, John F. Wallace, Debra Ann Walling, Deborah Ann Wilkinson |
2011-07-05 |