| 9912654 |
IP security certificate exchange based on certificate attributes |
Anatoliy Panasyuk, Abhishek Shukla |
2018-03-06 |
| 9582652 |
Federation among services for supporting virtual-network overlays |
Hasan Alkhatib, Geoffrey Outhred, Deepak Bansal, Anatoliy Panasyuk |
2017-02-28 |
| 9531674 |
Virtual host security profiles |
Jeffrey Goldian |
2016-12-27 |
| 9379946 |
Model-based virtual networking |
Anatoliy Panasyuk, Ram Viswanathan, Anthony S. Chavez, Jiazhen Chen, Morgan Asher Brown +2 more |
2016-06-28 |
| 8977867 |
Corralling virtual machines with encryption keys |
Robert M. Fries |
2015-03-10 |
| 8869146 |
Virtual machine migration |
Robert M. Fries |
2014-10-21 |
| 8819801 |
Secure machine enrollment in multi-tenant subscription environment |
Murali Sangubhatla, Morgan Asher Brown, Jiazhen Chen, Anthony S. Chavez |
2014-08-26 |
| 8688994 |
Federation among services for supporting virtual-network overlays |
Hasan Alkhatib, Geoffrey Outhred, Deepak Bansal, Anatoliy Panasyuk, Anthony S. Chavez |
2014-04-01 |
| 8650326 |
Smart client routing |
Prashant J. Dongale, Sufian A. Dar, Ram Viswanathan |
2014-02-11 |
| 8606760 |
Configuring a data protection system |
Brian M. Wahlert, Mike Jazayeri, Catharine van Ingen, Brian T. Berkowitz, Nikhil Chandhok +4 more |
2013-12-10 |
| 8479194 |
Virtual machine migration |
Robert M. Fries |
2013-07-02 |
| 8463747 |
Configuring a data protection system |
Brian M. Wahlert, Mike Jazayeri, Catharine van Ingen, Brian T. Berkowitz, Nikhil Chandhok +4 more |
2013-06-11 |
| 8364983 |
Corralling virtual machines with encryption keys |
Robert M. Fries |
2013-01-29 |
| 8078587 |
Configuring a data protection system |
Brian M. Wahlert, Mike Jazayeri, Catharine van Ingen, Brian T. Berkowitz, Nikhil Chandhok +4 more |
2011-12-13 |
| 7631194 |
Method, system, and apparatus for creating saved searches and auto discovery groups for a data protection system |
Brian M. Wahlert, Brian T. Berkowitz, Catharine van Ingen, Mike Jazayeri |
2009-12-08 |
| 7567974 |
Method, system, and apparatus for configuring a data protection system |
Brian M. Wahlert, Mike Jazayeri, Catharine van Ingen, Brian T. Berkowitz, Nikhil Chandhok +4 more |
2009-07-28 |