Techniques for discovering and managing security of applications

G Kirti, K Biswas, SN Perera, AF Simu - US Patent 10,536,478, 2020 - Google Patents
Techniques for discovery and management of applications in a computing environment of
an organization are disclosed. A security management system discovers use of applications …

Mechanisms for anomaly detection and access management

V Koottayi, VP Chathoth, A Balakrishnan… - US Patent …, 2020 - Google Patents
The present disclosure relates generally to threat detection, and more particularly, to
techniques for managing user access to resources in an enterprise environment. Some …

Method, system and computer program product for assessing information security

CC Baggett Jr, JJ Adams - US Patent 6,925,443, 2005 - Google Patents
The present invention is directed to methods and Systems for assessing information
Security. In an embodiment, the present invention queries users with technology based …

Dynamic data loss prevention in a multi-tenant environment

GB Roth, EJ Brandwine, GD Baer - US Patent 8,938,775, 2015 - Google Patents
The usage of data in a multi-tenant environment can be con trolled by utilizing functionality
at the hypervisor level of various resources in the environment. Data can be associated with …

Systems and methods for classifying security events as targeted attacks

KA Roundy, S Bhatkar - US Patent 9,754,106, 2017 - Google Patents
The disclosed computer-implemented method for classifying security events as targeted
attacks may include (1) detecting a security event in connection with at least one …

Firewall policy management

J Yin - US Patent 9,338,134, 2016 - Google Patents
Methods and systems are provided for creation and implementation of firewall policies.
Method of the present invention includes enabling a firewall device to maintain a log of …

Providing access to software over a network via keys

D Melchione, R Huang, C Vigue… - US Patent App. 10 …, 2004 - Google Patents
A method and system for providing access to software is described. A network reference (eg,
a URL) comprising a key is provided to a computer in an organization. The key can be used …

Non-intrusive techniques for discovering and using organizational relationships

N Rasumov - US Patent 10,268,976, 2019 - Google Patents
The present disclosure provides techniques for calculating an entity's cybersecurity risk
based on identified relation ships between the entity and one or more vendors. Cus …

Automated construction of network whitelists using host-based security controls

D Banerjee, S Hassall - US Patent 10,291,654, 2019 - Google Patents
Techniques are disclosed for constructing network whitelists in server endpoints using host-
based security controls. Once constructed, the network whitelists are used to detect …

Methods, systems and computer program products for monitoring protocol responses for a server application

D Motsinger, D Logan, K Gramley… - US Patent App. 10 …, 2005 - Google Patents
Methods, systems and computer program products are disclosed for monitoring protocol
responses for a server application in a computer network. The methods, systems, and …