| 9197668 |
Access control to files based on source information |
Peter Boucher, Michael Wright, Tim Cranny, Gabe Nault |
2015-11-24 |
| 9154299 |
Remote management of endpoint computing device with full disk encryption |
Brent R. Beachem |
2015-10-06 |
| 8588422 |
Key management to protect encrypted data of an endpoint computing device |
Brent R. Beachem |
2013-11-19 |
| 8566571 |
Pre-boot securing of operating system (OS) for endpoint evaluation |
Brent R. Beachem |
2013-10-22 |
| 8020192 |
Administration of protection of data accessible by a mobile device |
Michael Wright, Peter Boucher, Gabe Nault, Sterling Jacobson, Jonathan Wood +1 more |
2011-09-13 |
| 7636936 |
Administration of protection of data accessible by a mobile device |
Michael Wright, Peter Boucher, Gabe Nault, Sterling Jacobson, Jonathan Wood +1 more |
2009-12-22 |
| 7526800 |
Administration of protection of data accessible by a mobile device |
Michael Wright, Peter Boucher, Gabe Nault, Sterling Jacobson, Jonathan Wood +1 more |
2009-04-28 |
| 7478420 |
Administration of protection of data accessible by a mobile device |
Michael Wright, Peter Boucher, Gabe Nault, Sterling Jacobson, Jonathan Wood +1 more |
2009-01-13 |
| 7353533 |
Administration of protection of data accessible by a mobile device |
Michael Wright, Peter Boucher, Gabe Nault, Sterling Jacobson, Jonathan Wood +1 more |
2008-04-01 |
| 7308703 |
Protection of data accessible by a mobile device |
Michael Wright, Peter Boucher, Gabe Nault, Sterling Jacobson, Jonathan Wood +1 more |
2007-12-11 |
| 6792467 |
Layer manager |
Douglas Hale, Michael Wright, David O. Cox, Kyle Bryan Seegmiller, Jonathan Wood |
2004-09-14 |
| 6721274 |
Controlling packet flow through a stack using service records |
Douglas Hale, Michael Wright, David O. Cox, Kyle Bryan Seegmiller, Jonathan Wood |
2004-04-13 |