|
2025
|
Invention
|
Distributed network security system providing isolation of customer data.
Techniques for deliver... |
|
2024
|
Invention
|
Computer security system with remote browser isolation using forward proxying.
A client device i... |
|
|
Invention
|
Distributed network security system providing isolation of customer data. Techniques for deliveri... |
|
2023
|
Invention
|
Malware detection for proxy server networks. This specification generally relates to methods and ... |
|
|
Invention
|
Computer security system with remote browser isolation using forward proxying. A client device is... |
|
|
Invention
|
Applying network policies to devices based on their current access network. A server of a distrib... |
|
2022
|
Invention
|
Hybrid cloud computing network management with synchronization features across different cloud se... |
|
2021
|
Invention
|
Manage encrypted network traffic using dns responses. This present disclosure generally relates t... |
|
2020
|
Invention
|
Device-specific authentication credentials.
Methods and systems for providing device-specific au... |
|
2019
|
Invention
|
Applying network policies to devices based on their current access network.
This specification g... |
|
|
Invention
|
Malicious program identification based on program behavior. An execution of a data object is iden... |
|
|
Invention
|
Hybrid cloud computing network management. Techniques for delivering a distributed network securi... |
|
|
P/S
|
Electronic devices for computer network and data security, namely, computer servers, for the defe... |
|
2018
|
Invention
|
Restricting communication over an encrypted network connection to internet domains that share com... |
|
2017
|
Invention
|
Manage encrypted network traffic using dns responses. The present disclosure generally relates to... |
|
|
Invention
|
Detecting and managing abnormal data behavior. Methods and systems for providing destination-spec... |
|
|
Invention
|
Network traffic management using port number redirection. A first request is received from a devi... |
|
|
Invention
|
Implicitly linking access policies using group names.
Methods, systems, and apparatus, including... |
|
|
Invention
|
Manage encrypted network traffic using spoofed addresses.
Methods and systems for managing encry... |
|
|
Invention
|
Applying network policies to devices based on their current access network. This specification ge... |
|
|
Invention
|
Selectively altering references within encrypted pages using man in the middle. A request address... |
|
|
Invention
|
Web redirection for content scanning. This specification generally relates to using redirect mess... |
|
2016
|
Invention
|
Selectively performing man in the middle decryption. Methods, systems, and apparatus, including c... |
|
|
Invention
|
Applying policies to subnets. Associations are maintained among a plurality of subnets, policies,... |
|
|
Invention
|
Soft website block override. Methods, systems, and apparatus, including computer programs encoded... |
|
|
Invention
|
Malware detection for proxy server networks.
This specification generally relates to methods and... |
|
|
Invention
|
Applying group policies. Information corresponding to a set of signatures is maintained, and for ... |
|
|
Invention
|
Software program identification based on program behavior. Operations performed by a software app... |
|
|
Invention
|
Applying network policies to devices based on their current access network.
Methods and systems ... |
|
|
P/S
|
Downloadable computer network and data security software for the defense, prevention, detection, ... |
|
2015
|
Invention
|
High risk program identification based on program behavior. An execution of a data object is iden... |
|
|
P/S
|
Data and network security software for the defense, detection, monitoring, and quarantining of un... |
|
|
P/S
|
Electronic devices for computer network and data security,
namely, computer servers, for the def... |
|
2014
|
P/S
|
Electronic devices for computer network and data security; computer network and data security sof... |
|
|
P/S
|
Application service provider, namely, hosting, managing, developing, and maintaining applications... |