System and method for dynamically allocating computing resources for processing security information

AP Doukhvalov, AV Tikhomirov - US Patent 8,214,905, 2012 - Google Patents
Disclosed are systems, methods and computer program prod ucts for dynamically allocating
computing resources for pro cessing security information. In one example, the system …

Methods and apparatus for dealing with malware

M Morris, P Stubbs, M Hartwig, D Harter - US Patent 8,418,250, 2013 - Google Patents
The present invention relates generally to methods and apparatus for dealing with malware.
In one aspect, the present invention relates to a method and apparatus for classifying a …

Endpoint management using trust rating data

S Satish, B Hernacki - US Patent 8,239,915, 2012 - Google Patents
Techniques are disclosed for implementing dynamic end point management. In accordance
with one embodiment, whenever an endpoint joins a managed network for the first time, or …

Security system for detection and mitigation of malicious communications

M Woods, MB DeCotes, B Peterson… - US Patent 10,708,297, 2020 - Google Patents
Embodiments of the present invention relate to, in general, detecting and mitigating
malicious communications. Typically, a system of the present invention is configured to …

System and method for filtering network messages

R Bhatia - US Patent App. 10/745,851, 2005 - Google Patents
A system and method for filtering network messages, eg, electronic mail, instant messages,
etc. enables an administrator to control with whom other network users correspond, via a …

System and method for passive threat detection using virtual memory inspection

R Bhargava, DP Reese - US Patent 9,594,881, 2017 - Google Patents
Page 2 shutting down the virtual guest machine and alerting an 7,139,916 B2 11/2006
Billingsley et al. administrator. 7,152,148 B2 12/2006 Williams et al. 7,159,036 B2 1/2007 …

Methods and apparatus for dealing with malware

M Morris, P Stubbs, M Hartwig, D Harter - US Patent 8,726,389, 2014 - Google Patents
In one aspect, a method of classifying a computer object as malware includes receiving at a
base computer data about a computer object from each of plural remote computers on which …

Methods for searching forensic data

R Bousquet, JJS Wallia - US Patent 7,603,344, 2009 - Google Patents
An increasing number of criminal and terrorist acts and preparations leading to such acts are
leaving behind evidence in digital formats sometimes referred to as a “digital finger print …

Apparatus and method for filtering and selectively inspecting e-mail

WG Pagan - US Patent 7,752,274, 2010 - Google Patents
An apparatus and method are disclosed for selectively filtering and inspecting incoming e-
mail. The steps to selectively filter and inspect incoming e-mail include: assigning a risk …

Methods and apparatus for dealing with malware

M Morris, P Stubbs, M Hartwig, D Harter - US Patent 8,763,123, 2014 - Google Patents
In one aspect, a method of determining the protection that a remote computer has from
malware includes receiving at a base computer, details of all or selected security products …