| 12423373 |
Identifying and monitoring relevant enterprise data stored in software development repositories |
Ajay Arora, Payman Kamali, Paul Gerlich |
2025-09-23 |
| 12271497 |
Monitoring code provenance |
Ajay Arora, Vladimir Buzuev |
2025-04-08 |
| 11599659 |
Documenting and annotating code activities |
Ajay Arora, Vladimir Buzuev |
2023-03-07 |
| 11556642 |
Code monitoring and restricting of egress operations |
Ajay Arora, Vladimir Buzuev |
2023-01-17 |
| 11550943 |
Monitoring code provenance |
Ajay Arora, Vladimir Buzuev |
2023-01-10 |
| 11010483 |
Policy enforcement |
Ajay Arora, Vladimir Buzuev, Maurice C. Evans, Justin Sisley, Nicolas Vautier |
2021-05-18 |
| 10607020 |
Securing files |
Ajay Arora, Vladimir Buzuev, Maurice C. Evans |
2020-03-31 |
| 10545884 |
Access files |
Ajay Arora, Vladimir Buzuev, Maurice C. Evans, Justin Sisley |
2020-01-28 |
| 10387665 |
Policy enforcement |
Ajay Arora, Vladimir Buzuev, Maurice C. Evans, Justin Sisley, Nicolas Vautier |
2019-08-20 |
| 10089246 |
Access files |
Ajay Arora, Vladimir Buzuev, Maurice C. Evans, Justin Sisley |
2018-10-02 |
| 10073791 |
Securing files |
Ajay Arora, Vladimir Buzuev, Maurice C. Evans |
2018-09-11 |
| 9921976 |
Access files |
Ajay Arora, Vladimir Buzuev, Maurice C. Evans, Justin Sisley |
2018-03-20 |
| 9253170 |
Method and apparatus for securing mobile applications |
Ajay Arora |
2016-02-02 |
| 8572741 |
Providing security for a virtual machine by selectively triggering a host security scan |
Constantine P. Sapuntzakis, Burt A. Toma, Phanindra V. R. Ganti, Robert Iannucci |
2013-10-29 |