| 11586609 |
Abnormal event analysis |
Teodora Sandra Buda, Hitham Ahmed Assem Aly Salama, Bora Caglayan, Faisal Ghaffar, Andres Omar Portillo Dominguez +1 more |
2023-02-21 |
| 11456872 |
Offline protection of secrets |
Nicolae Voicu |
2022-09-27 |
| 10911238 |
Offline protection of secrets |
Nicolae Voicu |
2021-02-02 |
| 10326795 |
Techniques to provide network security through just-in-time provisioned accounts |
Siddhartha Mathur, Rajalakshmi Dani, Santosh Kumar, Luke Schoen, David Hetherington |
2019-06-18 |
| 9838424 |
Techniques to provide network security through just-in-time provisioned accounts |
Siddhartha Mathur, Rajalakshmi Dani, Santosh Kumar, Luke Schoen, David Hetherington |
2017-12-05 |
| 8881249 |
Scalable and automated secret management |
James W. Nunn, Michael Allan Friedman, Andrey Lukyanov, Rajmohan Rajagopalan, Rage Hawley +1 more |
2014-11-04 |
| 8839257 |
Superseding of recovery actions based on aggregation of requests for automated sequencing and cancellation |
Andrey Lukyanov, Rajmohan Rajagopalan |
2014-09-16 |
| 8823536 |
Automated recovery and escalation in complex distributed applications |
Jon Avner, Wing Man Yim, Haruya Shida, Selim Yazicioglu, Andrey Lukyanov +2 more |
2014-09-02 |
| 8626845 |
Method and system for dynamically generating electronic communications |
Scott W. Lynn, John Linden |
2014-01-07 |
| 8572679 |
Automatic system upgrade orchestrator |
Ruiyi Wang, Jaskaran Singh, Vinod Kumar, Ann Williams, Alexander MacLeod |
2013-10-29 |