Movatterモバイル変換


[0]ホーム

URL:


US20070028291A1 - Parametric content control in a network security system - Google Patents

Parametric content control in a network security system
Download PDF

Info

Publication number
US20070028291A1
US20070028291A1US11/194,075US19407505AUS2007028291A1US 20070028291 A1US20070028291 A1US 20070028291A1US 19407505 AUS19407505 AUS 19407505AUS 2007028291 A1US2007028291 A1US 2007028291A1
Authority
US
United States
Prior art keywords
file
server
host
hosts
files
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/194,075
Inventor
Todd Brennan
Allen Hillery
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bit 9 Inc
Original Assignee
Bit 9 Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bit 9 IncfiledCriticalBit 9 Inc
Priority to US11/194,075priorityCriticalpatent/US20070028291A1/en
Assigned to BIT 9, INC.reassignmentBIT 9, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: BRENNAN, TODD F., HILLERY, ALLEN
Priority to JP2008524253Aprioritypatent/JP2009507271A/en
Priority to CA2617204Aprioritypatent/CA2617204C/en
Priority to CN201410112822.9Aprioritypatent/CN103984891A/en
Priority to EP06788969.1Aprioritypatent/EP1920338B1/en
Priority to PCT/US2006/029714prioritypatent/WO2007016478A2/en
Priority to BRPI0616018-2Aprioritypatent/BRPI0616018A2/en
Priority to CN200680034493.4Aprioritypatent/CN101569129B/en
Publication of US20070028291A1publicationCriticalpatent/US20070028291A1/en
Priority to JP2012046805Aprioritypatent/JP5809084B2/en
Priority to US13/459,957prioritypatent/US8782800B2/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A security system provides a defense from known and unknown viruses, worms, spyware, hackers, and social engineering attacks. The system can implement centralized policies that allow an administrator to approve, block, quarantine, or log file activities. The system can provide and update a security value that causes host computers to change security levels for a number of different policies. The policies are grouped into a master set of policies and options which are propagated to the hosts from a centralized server. The security value is stored on the hosts and the server, and changes of the value on the server are propagated to the hosts.

Description

Claims (45)

US11/194,0752005-07-292005-07-29Parametric content control in a network security systemAbandonedUS20070028291A1 (en)

Priority Applications (10)

Application NumberPriority DateFiling DateTitle
US11/194,075US20070028291A1 (en)2005-07-292005-07-29Parametric content control in a network security system
CN200680034493.4ACN101569129B (en)2005-07-292006-07-27 Network security system and method
EP06788969.1AEP1920338B1 (en)2005-07-292006-07-27Network security systems and methods
CA2617204ACA2617204C (en)2005-07-292006-07-27Network security systems and methods
CN201410112822.9ACN103984891A (en)2005-07-292006-07-27Network security systems and methods
JP2008524253AJP2009507271A (en)2005-07-292006-07-27 Network security system and method
PCT/US2006/029714WO2007016478A2 (en)2005-07-292006-07-27Network security systems and methods
BRPI0616018-2ABRPI0616018A2 (en)2005-07-292006-07-27 security systems and methods for computer networks
JP2012046805AJP5809084B2 (en)2005-07-292012-03-02 Network security system and method
US13/459,957US8782800B2 (en)2005-07-292012-04-30Parametric content control in a network security system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US11/194,075US20070028291A1 (en)2005-07-292005-07-29Parametric content control in a network security system

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US13/459,957ContinuationUS8782800B2 (en)2005-07-292012-04-30Parametric content control in a network security system

Publications (1)

Publication NumberPublication Date
US20070028291A1true US20070028291A1 (en)2007-02-01

Family

ID=37695869

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US11/194,075AbandonedUS20070028291A1 (en)2005-07-292005-07-29Parametric content control in a network security system
US13/459,957Expired - LifetimeUS8782800B2 (en)2005-07-292012-04-30Parametric content control in a network security system

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US13/459,957Expired - LifetimeUS8782800B2 (en)2005-07-292012-04-30Parametric content control in a network security system

Country Status (1)

CountryLink
US (2)US20070028291A1 (en)

Cited By (88)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060253458A1 (en)*2005-05-032006-11-09Dixon Christopher JDetermining website reputations using automatic testing
US20060253583A1 (en)*2005-05-032006-11-09Dixon Christopher JIndicating website reputations based on website handling of personal information
US20060253584A1 (en)*2005-05-032006-11-09Dixon Christopher JReputation of an entity associated with a content item
US20060253578A1 (en)*2005-05-032006-11-09Dixon Christopher JIndicating website reputations during user interactions
US20060253580A1 (en)*2005-05-032006-11-09Dixon Christopher JWebsite reputation product architecture
US20070142906A1 (en)*2005-11-042007-06-21Jen. Cardiotec GmbhSelf-expandable medical instrument for treating defects in a patient's heart
US20070157287A1 (en)*2005-12-292007-07-05Blue JungleTechniques and System for Specifying Policies Using Abstractions
US20080256019A1 (en)*2007-04-162008-10-16International Business Machines CorporationMethod and system for fast access to metainformation about possible files or other identifiable objects
EP2009865A1 (en)*2007-06-252008-12-31Alcatel LucentMethod of providing an access control system
US7530106B1 (en)*2008-07-022009-05-05Kaspersky Lab, ZaoSystem and method for security rating of computer processes
US20090300045A1 (en)*2008-05-282009-12-03Safe Channel Inc.Distributed security provisioning
US20100042931A1 (en)*2005-05-032010-02-18Christopher John DixonIndicating website reputations during website manipulation of user information
US20100083380A1 (en)*2008-09-292010-04-01Harris Mark DNetwork stream scanning facility
US20100281514A1 (en)*2007-12-052010-11-04Electronics And Telecommunications Research InstituteSystem for managing identity with privacy policy using number and method thereof
US20110314152A1 (en)*2010-06-212011-12-22Chad LoderSystems and methods for determining compliance of references in a website
US20120066762A1 (en)*2010-09-132012-03-15Rade TodorovicSystem and method of whitelisting parent virtual images
US20120198553A1 (en)*2009-09-142012-08-02Junko SuginakaSecure auditing system and secure auditing method
US20120266245A1 (en)*2011-04-152012-10-18Raytheon CompanyMulti-Nodal Malware Analysis
US20120324579A1 (en)*2011-06-162012-12-20Microsoft CorporationCloud malware false positive recovery
US20130055338A1 (en)*2011-08-242013-02-28Raytheon CompanyDetecting Addition of a File to a Computer System and Initiating Remote Analysis of the File for Malware
US20130111548A1 (en)*2010-05-072013-05-02Wael KanounMethod for adapting security policies of an information system infrastructure
US20130246349A1 (en)*2011-01-062013-09-19International Business Machines CorporationRecords declaration filesystem monitoring
US8635079B2 (en)2011-06-272014-01-21Raytheon CompanySystem and method for sharing malware analysis results
US8640246B2 (en)*2011-06-272014-01-28Raytheon CompanyDistributed malware detection
US20140033324A1 (en)*2012-07-302014-01-30Box, Inc.System and method for advanced control tools for administrators in a cloud-based service
US8701196B2 (en)*2006-03-312014-04-15Mcafee, Inc.System, method and computer program product for obtaining a reputation associated with a file
US20140108474A1 (en)*2012-10-162014-04-17Rackspace Us, Inc.System and Method for Exposing Cloud Stored Data to a Content Delivery Network
US20140123228A1 (en)*2012-10-252014-05-01Jacob Andrew BrillEvent Reporting and Handling
US20150006883A1 (en)*2012-02-222015-01-01International Business Machines CorporationVALlDATING A SYSTEM WITH MULTIPLE SUBSYSTEMS USING TRUSTED PLATFORM MODULES AND VIRTUAL PLATFORM MODULES
US20150163109A1 (en)*2013-12-052015-06-11Crowdstrike, Inc.Rpc call interception
US9065850B1 (en)2011-02-072015-06-23Zscaler, Inc.Phishing detection systems and methods
US9338187B1 (en)2013-11-122016-05-10Emc CorporationModeling user working time using authentication events within an enterprise network
US20160191570A1 (en)*2014-02-202016-06-30Nicira, Inc.Method and apparatus for distributing firewall rules
CN105760773A (en)*2015-07-062016-07-13卡巴斯基实验室股份制公司System and method of controlling opening of file by vulnerable application
US9396216B2 (en)2012-05-042016-07-19Box, Inc.Repository redundancy implementation of a system which incrementally updates clients with events that occurred via a cloud-enabled platform
US9396245B2 (en)2013-01-022016-07-19Box, Inc.Race condition handling in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform
US20160212212A1 (en)*2008-10-242016-07-21Compuverde AbDistributed data storage
US20160226901A1 (en)*2015-01-302016-08-04Securonix, Inc.Anomaly Detection Using Adaptive Behavioral Profiles
EP2939173A4 (en)*2012-12-272016-08-10Crowdstrike Inc REAL-TIME REPRESENTATION OF A RELEVANT SYSTEM STATUS FOR SECURITY
US9503468B1 (en)2013-11-122016-11-22EMC IP Holding Company LLCDetecting suspicious web traffic from an enterprise network
US9507795B2 (en)2013-01-112016-11-29Box, Inc.Functionalities, features, and user interface of a synchronization client to a cloud-based environment
US9516039B1 (en)*2013-11-122016-12-06EMC IP Holding Company LLCBehavioral detection of suspicious host activities in an enterprise
US20160371491A1 (en)*2008-12-192016-12-22Openpeak Inc.System and method for ensuring compliance with organizational policies
US9553758B2 (en)2012-09-182017-01-24Box, Inc.Sandboxing individual applications to specific user folders in a cloud-based service
US9558202B2 (en)2012-08-272017-01-31Box, Inc.Server side techniques for reducing database workload in implementing selective subfolder synchronization in a cloud-based environment
US9575981B2 (en)2012-04-112017-02-21Box, Inc.Cloud service enabled to handle a set of files depicted to a user as a single file in a native operating system
US9633037B2 (en)2013-06-132017-04-25Box, IncSystems and methods for synchronization event building and/or collapsing by a synchronization component of a cloud-based platform
US9652741B2 (en)2011-07-082017-05-16Box, Inc.Desktop application for access and interaction with workspaces in a cloud-based content management system and synchronization mechanisms thereof
US20170195335A1 (en)*2016-01-042017-07-06Bank Of America CorporationSystem for controlled data exchange in a file hosting service environment
US20170213023A1 (en)*2013-08-202017-07-27White Cloud Security, L.L.C.Application Trust Listing Service
US9773051B2 (en)2011-11-292017-09-26Box, Inc.Mobile platform file and folder selection functionalities for offline access and synchronization
US9798882B2 (en)2014-06-062017-10-24Crowdstrike, Inc.Real-time model of states of monitored devices
US9805050B2 (en)2013-06-212017-10-31Box, Inc.Maintaining and updating file system shadows on a local device by a synchronization client of a cloud-based platform
US20170351870A1 (en)*2016-06-032017-12-07Honeywell International Inc.Apparatus and method for device whitelisting and blacklisting to override protections for allowed media at nodes of a protected system
US9948716B2 (en)2010-04-232018-04-17Compuverde AbDistributed data storage
US9953036B2 (en)2013-01-092018-04-24Box, Inc.File system monitoring in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform
US9965542B2 (en)2011-09-022018-05-08Compuverde AbMethod for data maintenance
CN108370334A (en)*2016-01-292018-08-03微软技术许可有限责任公司Network connectivty detects
US10135727B2 (en)2016-04-292018-11-20Nicira, Inc.Address grouping for distributed service rules
US10235383B2 (en)2012-12-192019-03-19Box, Inc.Method and apparatus for synchronization of items with read-only permissions in a cloud-based environment
US10333989B2 (en)2006-09-132019-06-25Sophos LimitedPolicy management
US10348685B2 (en)2016-04-292019-07-09Nicira, Inc.Priority allocation for distributed service rules
US20190253443A1 (en)*2018-02-142019-08-15Paladion Networks Private LimitedUser Behavior Anomaly Detection
US10496812B2 (en)2013-09-062019-12-03Michael GuidrySystems and methods for security in computer systems
US10530854B2 (en)2014-05-302020-01-07Box, Inc.Synchronization of permissioned content in cloud-based environments
US10579615B2 (en)2011-09-022020-03-03Compuverde AbMethod for data retrieval from a distributed data storage system
US10599671B2 (en)2013-01-172020-03-24Box, Inc.Conflict resolution, retry condition management, and handling of problem files for the synchronization client to a cloud-based platform
US10725968B2 (en)2013-05-102020-07-28Box, Inc.Top down delete or unsynchronization on delete of and depiction of item synchronization with a synchronization client to a cloud-based platform
US10846074B2 (en)2013-05-102020-11-24Box, Inc.Identification and handling of items to be ignored for synchronization with a cloud-based platform by a synchronization client
US10878110B2 (en)2017-09-122020-12-29Sophos LimitedDashboard for managing enterprise network traffic
US20210026951A1 (en)*2017-08-012021-01-28PC Matic, IncSystem, Method, and Apparatus for Computer Security
US10915623B2 (en)*2017-09-042021-02-09Kabushiki Kaisha ToshibaInformation processing apparatus, information processing method, and computer program product
US10944722B2 (en)2016-05-012021-03-09Nicira, Inc.Using activities to manage multi-tenant firewall configuration
US10949532B2 (en)*2018-12-132021-03-16Beijing Jingdong Shangke Information Technology Co., Ltd.System and method for monitoring file integrity of multiple containers using one agent
US11082400B2 (en)2016-06-292021-08-03Nicira, Inc.Firewall configuration versioning
US11102248B2 (en)2013-09-202021-08-24Open Text Sa UlcSystem and method for remote wipe
US11108827B2 (en)*2013-09-202021-08-31Open Text Sa UlcApplication gateway architecture with multi-level security policy and rule promulgations
US11115382B2 (en)2015-06-302021-09-07Nicira, Inc.Global objects for federated firewall rule management
US11121965B2 (en)*2019-04-042021-09-14Huazhong University Of Science And TechnologyNetwork resource isolation method for container network and system thereof
US11171920B2 (en)2016-05-012021-11-09Nicira, Inc.Publication of firewall configuration
US11258761B2 (en)2016-06-292022-02-22Nicira, Inc.Self-service firewall configuration
US11310202B2 (en)2019-03-132022-04-19Vmware, Inc.Sharing of firewall rules among multiple workloads in a hypervisor
US11323482B2 (en)*2019-12-312022-05-03Mcafee, LlcMethods, systems, and media for protecting computer systems from user-created objects
US11388037B2 (en)2016-02-252022-07-12Open Text Sa UlcSystems and methods for providing managed services
US11425170B2 (en)2018-10-112022-08-23Honeywell International Inc.System and method for deploying and configuring cyber-security protection solution using portable storage device
US20220382892A1 (en)*2021-05-272022-12-01Microsoft Technology Licensing, LlcCentralized access control for cloud relational database management system resources
US11593075B2 (en)2015-11-032023-02-28Open Text Sa UlcStreamlined fast and efficient application building and customization systems and methods
US20240241980A1 (en)*2021-05-272024-07-18Microsoft Technology Licensing, LlcCentralized access control for cloud relational database management system resources

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8972511B2 (en)*2012-06-182015-03-03OpenQ, Inc.Methods and apparatus for analyzing social media for enterprise compliance issues
US8959595B2 (en)*2013-03-152015-02-17Bullaproof, Inc.Methods and systems for providing secure transactions
US9727727B2 (en)2014-09-262017-08-08Dropbox Inc.Scanning content items based on user activity
US10708285B2 (en)2016-02-172020-07-07Ziften Technologies, Inc.Supplementing network flow analysis with endpoint information
US20180145983A1 (en)*2016-11-222018-05-24Nexenta Systems, Inc.Distributed data storage system using a common manifest for storing and accessing versions of an object
US11271935B2 (en)2020-07-302022-03-08Bank Of America CorporationBlind authenticator
US20230140623A1 (en)*2021-11-042023-05-04Mastercard International IncorporatedMethod and system for tamper-resistant event sourcing using a distributed ledger
US11949696B2 (en)2021-12-172024-04-02Bank Of America CorporationData security system with dynamic intervention response
US20240086538A1 (en)*2022-09-092024-03-14Sandfly Security LimitedComputer investigation method and system for investigating authentication in remote host computers

Citations (99)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4809160A (en)*1985-10-281989-02-28Hewlett-Packard CompanyPrivilege level checking instruction for implementing a secure hierarchical computer system
US4908861A (en)*1987-08-281990-03-13International Business Machines CorporationData authentication using modification detection codes based on a public one way encryption function
US5278901A (en)*1992-04-301994-01-11International Business Machines CorporationPattern-oriented intrusion-detection system and method
US5283830A (en)*1991-12-171994-02-01International Computers LimitedSecurity mechanism for a computer system
US5485575A (en)*1994-11-211996-01-16International Business Machines CorporationAutomatic analysis of a computer virus structure and means of attachment to its hosts
US5495571A (en)*1992-09-301996-02-27Microsoft CorporationMethod and system for performing parametric testing of a functional programming interface
US5495533A (en)*1994-04-291996-02-27International Business Machines CorporationPersonal key archive
US5502815A (en)*1992-03-301996-03-26Cozza; Paul D.Method and apparatus for increasing the speed at which computer viruses are detected
US5613002A (en)*1994-11-211997-03-18International Business Machines CorporationGeneric disinfection of programs infected with a computer virus
US5613107A (en)*1992-12-221997-03-18Bull, S.A.Method and apparatus for managing file versions in an information processing system based on a predetermined amount of storage media
US5615373A (en)*1993-08-261997-03-25International Business Machines CorporationData lock management in a distributed file server system determines variable lock lifetime in response to request to access data object
US5708709A (en)*1995-12-081998-01-13Sun Microsystems, Inc.System and method for managing try-and-buy usage of application programs
US5708780A (en)*1995-06-071998-01-13Open Market, Inc.Internet server access control and monitoring systems
US5724578A (en)*1994-12-071998-03-03Fujitsu LimitedFile managing system for managing files shared with a plurality of users
US5727061A (en)*1995-02-131998-03-10Eta Technologies CorporationPersonal access management systems
US5859966A (en)*1995-10-101999-01-12Data General CorporationSecurity system for computer systems
US5878417A (en)*1996-11-201999-03-02International Business Machines CorporationMethod and apparatus for network security in browser based interfaces
US6018747A (en)*1997-11-262000-01-25International Business Machines CorporationMethod for generating and reconstructing in-place delta files
US6021510A (en)*1997-11-242000-02-01Symantec CorporationAntivirus accelerator
US6021491A (en)*1996-11-272000-02-01Sun Microsystems, Inc.Digital signatures for data streams and data archives
US6023723A (en)*1997-12-222000-02-08Accepted Marketing, Inc.Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms
US6023586A (en)*1998-02-102000-02-08Novell, Inc.Integrity verifying and correcting software
US6026402A (en)*1998-01-072000-02-15Hewlett-Packard CompanyProcess restriction within file system hierarchies
US6026502A (en)*1997-01-272000-02-15Wakayama; HironoriMethod and mechanism for preventing from invading of computer virus and/or hacker
US6029256A (en)*1997-12-312000-02-22Network Associates, Inc.Method and system for allowing computer programs easy access to features of a virus scanning engine
US6029175A (en)*1995-10-262000-02-22Teknowledge CorporationAutomatic retrieval of changed files by a network software agent
US6173284B1 (en)*1997-05-202001-01-09University Of Charlotte City Of CharlotteSystems, methods and computer program products for automatically monitoring police records for a crime profile
US6178508B1 (en)*1995-12-282001-01-23International Business Machines Corp.System for controlling access to encrypted data files by a plurality of users
US6195587B1 (en)*1993-10-292001-02-27Sophos PlcValidity checking
US20020002684A1 (en)*1998-05-012002-01-03Barbara L. FoxIntelligent trust management method and system
US6338141B1 (en)*1998-09-302002-01-08Cybersoft, Inc.Method and apparatus for computer virus detection, analysis, and removal in real time
US6338149B1 (en)*1998-07-312002-01-08Westinghouse Electric Company LlcChange monitoring system for a computer system
US20020004902A1 (en)*2000-07-072002-01-10Eng-Whatt TohSecure and reliable document delivery
US20020004908A1 (en)*2000-07-052002-01-10Nicholas Paul Andrew GaleaElectronic mail message anti-virus system and method
US20020019932A1 (en)*1999-06-102002-02-14Eng-Whatt TohCryptographically secure network
US6349311B1 (en)*1999-02-012002-02-19Symantec CorporationStorage of reverse delta updates
US6351776B1 (en)*1999-11-042002-02-26Xdrive, Inc.Shared internet storage resource, user interface system, and method
US20020026576A1 (en)*2000-08-182002-02-28Hewlett-Packard CompanyApparatus and method for establishing trust
US20030004922A1 (en)*2001-06-272003-01-02Ontrack Data International, Inc.System and method for data management
US6505300B2 (en)*1998-06-122003-01-07Microsoft CorporationMethod and system for secure running of untrusted content
US6505237B2 (en)*1998-07-242003-01-07Siemens Information & Communication Networks, Inc.Method and system for management of message attachments
US20030018903A1 (en)*2001-03-192003-01-23Greca Damon G. DellaMethod of containing spread of computer viruses
US6513122B1 (en)*2001-06-292003-01-28Networks Associates Technology, Inc.Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities
US6513111B2 (en)*1998-02-092003-01-28Reuters, LtdMethod of controlling software applications specific to a group of users
US6513039B1 (en)*1999-06-242003-01-28International Business Machines CorporationProfile inferencing through automated access control list analysis heuristics
US20030023866A1 (en)*2001-07-262003-01-30Hinchliffe Alex JamesCentrally managed malware scanning
US20030023560A1 (en)*2001-07-272003-01-30Fujitsu LimitedDesign asset information search system
US20030023864A1 (en)*2001-07-252003-01-30Igor MuttikOn-access malware scanning
US20030023857A1 (en)*2001-07-262003-01-30Hinchliffe Alexander JamesMalware infection suppression
US20030023867A1 (en)*2001-07-252003-01-30Thibadeau Robert H.Methods and systems for promoting security in a computer system employing attached storage devices
US6516395B1 (en)*1997-11-202003-02-04Advanced Micro Devices, Inc.System and method for controlling access to a privilege-partitioned address space with a fixed set of attributes
US20030028785A1 (en)*2001-08-012003-02-06Pak Michael Chin-HwanSystem and method for executing computer virus definitions containing general purpose programming language extensions
US20030033308A1 (en)*2001-08-032003-02-13Patel Sujal M.System and methods for providing a distributed file system utilizing metadata to track information about data stored throughout the system
US20030033303A1 (en)*2001-08-072003-02-13Brian CollinsSystem and method for restricting access to secured data
US20040003274A1 (en)*2002-06-282004-01-01Strom Clifford P.Protecting content on medium from unfettered distribution
US20040003279A1 (en)*2002-06-282004-01-01Beilinson Craig AdamUser controls for a computer
US6675205B2 (en)*1999-10-142004-01-06Arcessa, Inc.Peer-to-peer automated anonymous asynchronous file sharing
US20040010602A1 (en)*2002-07-102004-01-15Van Vleck Paul F.System and method for managing access to digital content via digital rights policies
US6681344B1 (en)*2000-09-142004-01-20Microsoft CorporationSystem and method for automatically diagnosing a computer problem
US6681387B1 (en)*1999-12-012004-01-20Board Of Trustees Of The University Of IllinoisMethod and apparatus for instruction execution hot spot detection and monitoring in a data processing unit
US6681227B1 (en)*1997-11-192004-01-20Ns Solutions CorporationDatabase system and a method of data retrieval from the system
US6684210B1 (en)*1998-04-062004-01-27Matsushita Electric Industrial Co., Ltd.File managing system, file management apparatus, file management method, and program storage medium
US20040019878A1 (en)*2002-07-232004-01-29Sreekrishna KotnurSoftware tool to detect and restore damaged or lost software components
US20040022004A1 (en)*2002-07-302004-02-05Toshihito HabukaSemiconductor integrated circuit device, wireless LAN system, and auto gain control system
US20040025043A1 (en)*2002-05-222004-02-05Microsoft CorporationSystem and method for identifying potential security risks in controls
US20040031028A1 (en)*2002-08-062004-02-12Aardwork Software LimitedUpdating of software
US20040030913A1 (en)*2002-08-082004-02-12Trend Micro IncorporatedSystem and method for computer protection against malicious electronic mails by analyzing, profiling and trapping the same
US6694457B2 (en)*2001-03-062004-02-17Hewlett-Packard Development Company, L.P.System and method for monitoring execution of privileged instructions
US6694336B1 (en)*2000-01-252004-02-17Fusionone, Inc.Data transfer and synchronization system
US6694328B1 (en)*2000-01-132004-02-17International Business Machines CorporationMethod for creating queries on version objects
US20040034638A1 (en)*2002-07-182004-02-19International Business Machines CorporationMethod for analyzing and characterizing the usage pattern of a device
US20040034794A1 (en)*2000-05-282004-02-19Yaron MayerSystem and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
US6697950B1 (en)*1999-12-222004-02-24Networks Associates Technology, Inc.Method and apparatus for detecting a macro computer virus using static analysis
US6697810B2 (en)*2001-04-192004-02-24Vigilance, Inc.Security system for event monitoring, detection and notification system
US20040039932A1 (en)*2002-08-232004-02-26Gidon ElazarApparatus, system and method for securing digital documents in a digital appliance
US20040039921A1 (en)*2000-10-172004-02-26Shyne-Song ChuangMethod and system for detecting rogue software
US20040039924A1 (en)*2001-04-092004-02-26Baldwin Robert W.System and method for security of computing devices
US6839721B2 (en)*2001-01-122005-01-04Hewlett-Packard Development Company, L.P.Integration of a database into file management software for protecting, tracking, and retrieving data
US20050004873A1 (en)*2003-02-032005-01-06Robin PouDistribution and rights management of digital content
US20050005168A1 (en)*2003-03-112005-01-06Richard DickVerified personal information database
US20050005017A1 (en)*2003-07-032005-01-06Arbor Networks, Inc.Method and system for reducing scope of self-propagating attack code in network
US20050004954A1 (en)*2003-07-012005-01-06Hand Held Products, Inc.Systems and methods for expedited data transfer in a communication system using hash segmentation
US20050005161A1 (en)*2003-07-042005-01-06Adrian BaldwinServices and secure processing environments
US20050004874A1 (en)*1998-09-182005-01-06Tacit Knowledge Systems, Inc.Method and apparatus for constructing and maintaining a user knowledge profile
US20050005105A1 (en)*2003-06-242005-01-06Brown Larry CecilRemote access control feature for limiting access to configuration file components
US20050010806A1 (en)*2003-04-182005-01-13Ounce Labs, Inc.Method and system for detecting privilege escalation vulnerabilities in source code
US20050010804A1 (en)*2002-12-192005-01-13Bruening Derek L.Secure execution of a computer program using a code cache
US20050015591A1 (en)*2003-06-122005-01-20International Business Machines CorporationMulti-level multi-user web services security system and method
US20050015760A1 (en)*2003-07-162005-01-20Oleg IvanovAutomatic detection and patching of vulnerable files
US20050015592A1 (en)*2003-07-152005-01-20Jeou-Kai LinSystem and method for application and user-based class of security
US20050015675A1 (en)*2003-07-032005-01-20Kolawa Adam K.Method and system for automatic error prevention for computer software
US20050021994A1 (en)*2003-07-212005-01-27Barton Christopher AndrewPre-approval of computer files during a malware detection
US20050022016A1 (en)*2002-12-122005-01-27Alexander ShippMethod of and system for heuristically detecting viruses in executable code
US20050022018A1 (en)*2003-06-302005-01-27Symantec CorporationSignature extraction system and method
US20050028002A1 (en)*2003-07-292005-02-03Mihai ChristodorescuMethod and apparatus to detect malicious software
US20050033976A1 (en)*2003-08-042005-02-10Sbc Knowledge Ventures, L.P.Host intrusion detection and isolation
US20050033975A1 (en)*2001-08-172005-02-10Pasi LahtiPreventing virus infection in a computer system
US20050033980A1 (en)*2003-08-072005-02-10Willman Bryan MarkProjection of trustworthiness from a trusted environment to an untrusted environment
US20050033978A1 (en)*2003-08-082005-02-10Hyser Chris D.Method and system for securing a computer system

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6119151A (en)1994-03-072000-09-12International Business Machines Corp.System and method for efficient cache management in a distributed file system
EP0752652B1 (en)1995-07-031998-12-16Sun Microsystems, Inc.System and method for implementing a hierarchical policy for computer system administration
US6202157B1 (en)1997-12-082001-03-13Entrust Technologies LimitedComputer network security system and method having unilateral enforceable security policy provision
US7392234B2 (en)*1999-05-182008-06-24Kom, Inc.Method and system for electronic file lifecycle management
WO2000046963A1 (en)1999-02-042000-08-10Apion Telecoms LimitedA telecommunications gateway
JP3546787B2 (en)1999-12-162004-07-28インターナショナル・ビジネス・マシーンズ・コーポレーション Access control system, access control method, and storage medium
JP3744361B2 (en)2001-02-162006-02-08株式会社日立製作所 Security management system
US7281267B2 (en)2001-02-202007-10-09Mcafee, Inc.Software audit system
US7373643B2 (en)2001-03-062008-05-13Cybersoft, Inc.Apparatus, methods and articles of manufacture for data transmission
AU2002252287A1 (en)2001-03-122002-09-24Smart Mediary Systems, LlcMany-to-many mediated commercial electronic publishing
US6920558B2 (en)2001-03-202005-07-19Networks Associates Technology, Inc.Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system
US7325249B2 (en)*2001-04-302008-01-29Aol LlcIdentifying unwanted electronic messages
US7203966B2 (en)2001-06-272007-04-10Microsoft CorporationEnforcement architecture and method for digital rights management system for roaming a license to a plurality of user devices
US7328210B2 (en)*2001-08-012008-02-05At&T Mobility Ii LlcAttribute rule enforcer for a directory
US7509316B2 (en)*2001-08-312009-03-24Rocket Software, Inc.Techniques for performing policy automated operations
US7188127B2 (en)*2003-10-072007-03-06International Business Machines CorporationMethod, system, and program for processing a file request
US8495227B2 (en)*2003-12-112013-07-23International Business Machines CorporationMethod and system to distribute policies

Patent Citations (99)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4809160A (en)*1985-10-281989-02-28Hewlett-Packard CompanyPrivilege level checking instruction for implementing a secure hierarchical computer system
US4908861A (en)*1987-08-281990-03-13International Business Machines CorporationData authentication using modification detection codes based on a public one way encryption function
US5283830A (en)*1991-12-171994-02-01International Computers LimitedSecurity mechanism for a computer system
US5502815A (en)*1992-03-301996-03-26Cozza; Paul D.Method and apparatus for increasing the speed at which computer viruses are detected
US5278901A (en)*1992-04-301994-01-11International Business Machines CorporationPattern-oriented intrusion-detection system and method
US5495571A (en)*1992-09-301996-02-27Microsoft CorporationMethod and system for performing parametric testing of a functional programming interface
US5613107A (en)*1992-12-221997-03-18Bull, S.A.Method and apparatus for managing file versions in an information processing system based on a predetermined amount of storage media
US5615373A (en)*1993-08-261997-03-25International Business Machines CorporationData lock management in a distributed file server system determines variable lock lifetime in response to request to access data object
US6195587B1 (en)*1993-10-292001-02-27Sophos PlcValidity checking
US5495533A (en)*1994-04-291996-02-27International Business Machines CorporationPersonal key archive
US5613002A (en)*1994-11-211997-03-18International Business Machines CorporationGeneric disinfection of programs infected with a computer virus
US5485575A (en)*1994-11-211996-01-16International Business Machines CorporationAutomatic analysis of a computer virus structure and means of attachment to its hosts
US5724578A (en)*1994-12-071998-03-03Fujitsu LimitedFile managing system for managing files shared with a plurality of users
US5727061A (en)*1995-02-131998-03-10Eta Technologies CorporationPersonal access management systems
US5708780A (en)*1995-06-071998-01-13Open Market, Inc.Internet server access control and monitoring systems
US5859966A (en)*1995-10-101999-01-12Data General CorporationSecurity system for computer systems
US6029175A (en)*1995-10-262000-02-22Teknowledge CorporationAutomatic retrieval of changed files by a network software agent
US5708709A (en)*1995-12-081998-01-13Sun Microsystems, Inc.System and method for managing try-and-buy usage of application programs
US6178508B1 (en)*1995-12-282001-01-23International Business Machines Corp.System for controlling access to encrypted data files by a plurality of users
US5878417A (en)*1996-11-201999-03-02International Business Machines CorporationMethod and apparatus for network security in browser based interfaces
US6021491A (en)*1996-11-272000-02-01Sun Microsystems, Inc.Digital signatures for data streams and data archives
US6026502A (en)*1997-01-272000-02-15Wakayama; HironoriMethod and mechanism for preventing from invading of computer virus and/or hacker
US6173284B1 (en)*1997-05-202001-01-09University Of Charlotte City Of CharlotteSystems, methods and computer program products for automatically monitoring police records for a crime profile
US6681227B1 (en)*1997-11-192004-01-20Ns Solutions CorporationDatabase system and a method of data retrieval from the system
US6516395B1 (en)*1997-11-202003-02-04Advanced Micro Devices, Inc.System and method for controlling access to a privilege-partitioned address space with a fixed set of attributes
US6021510A (en)*1997-11-242000-02-01Symantec CorporationAntivirus accelerator
US6018747A (en)*1997-11-262000-01-25International Business Machines CorporationMethod for generating and reconstructing in-place delta files
US6023723A (en)*1997-12-222000-02-08Accepted Marketing, Inc.Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms
US6029256A (en)*1997-12-312000-02-22Network Associates, Inc.Method and system for allowing computer programs easy access to features of a virus scanning engine
US6026402A (en)*1998-01-072000-02-15Hewlett-Packard CompanyProcess restriction within file system hierarchies
US6513111B2 (en)*1998-02-092003-01-28Reuters, LtdMethod of controlling software applications specific to a group of users
US6023586A (en)*1998-02-102000-02-08Novell, Inc.Integrity verifying and correcting software
US6684210B1 (en)*1998-04-062004-01-27Matsushita Electric Industrial Co., Ltd.File managing system, file management apparatus, file management method, and program storage medium
US20020002684A1 (en)*1998-05-012002-01-03Barbara L. FoxIntelligent trust management method and system
US6505300B2 (en)*1998-06-122003-01-07Microsoft CorporationMethod and system for secure running of untrusted content
US6505237B2 (en)*1998-07-242003-01-07Siemens Information & Communication Networks, Inc.Method and system for management of message attachments
US6338149B1 (en)*1998-07-312002-01-08Westinghouse Electric Company LlcChange monitoring system for a computer system
US20050004874A1 (en)*1998-09-182005-01-06Tacit Knowledge Systems, Inc.Method and apparatus for constructing and maintaining a user knowledge profile
US6338141B1 (en)*1998-09-302002-01-08Cybersoft, Inc.Method and apparatus for computer virus detection, analysis, and removal in real time
US6349311B1 (en)*1999-02-012002-02-19Symantec CorporationStorage of reverse delta updates
US20020019932A1 (en)*1999-06-102002-02-14Eng-Whatt TohCryptographically secure network
US6513039B1 (en)*1999-06-242003-01-28International Business Machines CorporationProfile inferencing through automated access control list analysis heuristics
US6675205B2 (en)*1999-10-142004-01-06Arcessa, Inc.Peer-to-peer automated anonymous asynchronous file sharing
US6351776B1 (en)*1999-11-042002-02-26Xdrive, Inc.Shared internet storage resource, user interface system, and method
US6681387B1 (en)*1999-12-012004-01-20Board Of Trustees Of The University Of IllinoisMethod and apparatus for instruction execution hot spot detection and monitoring in a data processing unit
US6697950B1 (en)*1999-12-222004-02-24Networks Associates Technology, Inc.Method and apparatus for detecting a macro computer virus using static analysis
US6694328B1 (en)*2000-01-132004-02-17International Business Machines CorporationMethod for creating queries on version objects
US6694336B1 (en)*2000-01-252004-02-17Fusionone, Inc.Data transfer and synchronization system
US20040034794A1 (en)*2000-05-282004-02-19Yaron MayerSystem and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
US20020004908A1 (en)*2000-07-052002-01-10Nicholas Paul Andrew GaleaElectronic mail message anti-virus system and method
US20020004902A1 (en)*2000-07-072002-01-10Eng-Whatt TohSecure and reliable document delivery
US20020026576A1 (en)*2000-08-182002-02-28Hewlett-Packard CompanyApparatus and method for establishing trust
US6681344B1 (en)*2000-09-142004-01-20Microsoft CorporationSystem and method for automatically diagnosing a computer problem
US20040039921A1 (en)*2000-10-172004-02-26Shyne-Song ChuangMethod and system for detecting rogue software
US6839721B2 (en)*2001-01-122005-01-04Hewlett-Packard Development Company, L.P.Integration of a database into file management software for protecting, tracking, and retrieving data
US6694457B2 (en)*2001-03-062004-02-17Hewlett-Packard Development Company, L.P.System and method for monitoring execution of privileged instructions
US20030018903A1 (en)*2001-03-192003-01-23Greca Damon G. DellaMethod of containing spread of computer viruses
US20040039924A1 (en)*2001-04-092004-02-26Baldwin Robert W.System and method for security of computing devices
US6697810B2 (en)*2001-04-192004-02-24Vigilance, Inc.Security system for event monitoring, detection and notification system
US20030004922A1 (en)*2001-06-272003-01-02Ontrack Data International, Inc.System and method for data management
US6513122B1 (en)*2001-06-292003-01-28Networks Associates Technology, Inc.Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities
US20030023864A1 (en)*2001-07-252003-01-30Igor MuttikOn-access malware scanning
US20030023867A1 (en)*2001-07-252003-01-30Thibadeau Robert H.Methods and systems for promoting security in a computer system employing attached storage devices
US20030023866A1 (en)*2001-07-262003-01-30Hinchliffe Alex JamesCentrally managed malware scanning
US20030023857A1 (en)*2001-07-262003-01-30Hinchliffe Alexander JamesMalware infection suppression
US20030023560A1 (en)*2001-07-272003-01-30Fujitsu LimitedDesign asset information search system
US20030028785A1 (en)*2001-08-012003-02-06Pak Michael Chin-HwanSystem and method for executing computer virus definitions containing general purpose programming language extensions
US20030033308A1 (en)*2001-08-032003-02-13Patel Sujal M.System and methods for providing a distributed file system utilizing metadata to track information about data stored throughout the system
US20030033303A1 (en)*2001-08-072003-02-13Brian CollinsSystem and method for restricting access to secured data
US20050033975A1 (en)*2001-08-172005-02-10Pasi LahtiPreventing virus infection in a computer system
US20040025043A1 (en)*2002-05-222004-02-05Microsoft CorporationSystem and method for identifying potential security risks in controls
US20040003279A1 (en)*2002-06-282004-01-01Beilinson Craig AdamUser controls for a computer
US20040003274A1 (en)*2002-06-282004-01-01Strom Clifford P.Protecting content on medium from unfettered distribution
US20040010602A1 (en)*2002-07-102004-01-15Van Vleck Paul F.System and method for managing access to digital content via digital rights policies
US20040034638A1 (en)*2002-07-182004-02-19International Business Machines CorporationMethod for analyzing and characterizing the usage pattern of a device
US20040019878A1 (en)*2002-07-232004-01-29Sreekrishna KotnurSoftware tool to detect and restore damaged or lost software components
US20040022004A1 (en)*2002-07-302004-02-05Toshihito HabukaSemiconductor integrated circuit device, wireless LAN system, and auto gain control system
US20040031028A1 (en)*2002-08-062004-02-12Aardwork Software LimitedUpdating of software
US20040030913A1 (en)*2002-08-082004-02-12Trend Micro IncorporatedSystem and method for computer protection against malicious electronic mails by analyzing, profiling and trapping the same
US20040039932A1 (en)*2002-08-232004-02-26Gidon ElazarApparatus, system and method for securing digital documents in a digital appliance
US20050022016A1 (en)*2002-12-122005-01-27Alexander ShippMethod of and system for heuristically detecting viruses in executable code
US20050010804A1 (en)*2002-12-192005-01-13Bruening Derek L.Secure execution of a computer program using a code cache
US20050004873A1 (en)*2003-02-032005-01-06Robin PouDistribution and rights management of digital content
US20050005168A1 (en)*2003-03-112005-01-06Richard DickVerified personal information database
US20050010806A1 (en)*2003-04-182005-01-13Ounce Labs, Inc.Method and system for detecting privilege escalation vulnerabilities in source code
US20050015591A1 (en)*2003-06-122005-01-20International Business Machines CorporationMulti-level multi-user web services security system and method
US20050005105A1 (en)*2003-06-242005-01-06Brown Larry CecilRemote access control feature for limiting access to configuration file components
US20050022018A1 (en)*2003-06-302005-01-27Symantec CorporationSignature extraction system and method
US20050004954A1 (en)*2003-07-012005-01-06Hand Held Products, Inc.Systems and methods for expedited data transfer in a communication system using hash segmentation
US20050005017A1 (en)*2003-07-032005-01-06Arbor Networks, Inc.Method and system for reducing scope of self-propagating attack code in network
US20050015675A1 (en)*2003-07-032005-01-20Kolawa Adam K.Method and system for automatic error prevention for computer software
US20050005161A1 (en)*2003-07-042005-01-06Adrian BaldwinServices and secure processing environments
US20050015592A1 (en)*2003-07-152005-01-20Jeou-Kai LinSystem and method for application and user-based class of security
US20050015760A1 (en)*2003-07-162005-01-20Oleg IvanovAutomatic detection and patching of vulnerable files
US20050021994A1 (en)*2003-07-212005-01-27Barton Christopher AndrewPre-approval of computer files during a malware detection
US20050028002A1 (en)*2003-07-292005-02-03Mihai ChristodorescuMethod and apparatus to detect malicious software
US20050033976A1 (en)*2003-08-042005-02-10Sbc Knowledge Ventures, L.P.Host intrusion detection and isolation
US20050033980A1 (en)*2003-08-072005-02-10Willman Bryan MarkProjection of trustworthiness from a trusted environment to an untrusted environment
US20050033978A1 (en)*2003-08-082005-02-10Hyser Chris D.Method and system for securing a computer system

Cited By (164)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8826155B2 (en)2005-05-032014-09-02Mcafee, Inc.System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface
US8429545B2 (en)2005-05-032013-04-23Mcafee, Inc.System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface
US20060253584A1 (en)*2005-05-032006-11-09Dixon Christopher JReputation of an entity associated with a content item
US20060253578A1 (en)*2005-05-032006-11-09Dixon Christopher JIndicating website reputations during user interactions
US20060253580A1 (en)*2005-05-032006-11-09Dixon Christopher JWebsite reputation product architecture
US8321791B2 (en)2005-05-032012-11-27Mcafee, Inc.Indicating website reputations during website manipulation of user information
US9384345B2 (en)2005-05-032016-07-05Mcafee, Inc.Providing alternative web content based on website reputation assessment
US20080114709A1 (en)*2005-05-032008-05-15Dixon Christopher JSystem, method, and computer program product for presenting an indicia of risk associated with search results within a graphical user interface
US8566726B2 (en)2005-05-032013-10-22Mcafee, Inc.Indicating website reputations based on website handling of personal information
US8516377B2 (en)2005-05-032013-08-20Mcafee, Inc.Indicating Website reputations during Website manipulation of user information
US20060253583A1 (en)*2005-05-032006-11-09Dixon Christopher JIndicating website reputations based on website handling of personal information
US8438499B2 (en)2005-05-032013-05-07Mcafee, Inc.Indicating website reputations during user interactions
US8296664B2 (en)2005-05-032012-10-23Mcafee, Inc.System, method, and computer program product for presenting an indicia of risk associated with search results within a graphical user interface
US8826154B2 (en)2005-05-032014-09-02Mcafee, Inc.System, method, and computer program product for presenting an indicia of risk associated with search results within a graphical user interface
US20060253458A1 (en)*2005-05-032006-11-09Dixon Christopher JDetermining website reputations using automatic testing
US7822620B2 (en)2005-05-032010-10-26Mcafee, Inc.Determining website reputations using automatic testing
US20100042931A1 (en)*2005-05-032010-02-18Christopher John DixonIndicating website reputations during website manipulation of user information
US20070142906A1 (en)*2005-11-042007-06-21Jen. Cardiotec GmbhSelf-expandable medical instrument for treating defects in a patient's heart
US20070157287A1 (en)*2005-12-292007-07-05Blue JungleTechniques and System for Specifying Policies Using Abstractions
US9384360B2 (en)*2005-12-292016-07-05Nextlabs, Inc.Techniques and system for specifying policies using abstractions
US8701196B2 (en)*2006-03-312014-04-15Mcafee, Inc.System, method and computer program product for obtaining a reputation associated with a file
US10333989B2 (en)2006-09-132019-06-25Sophos LimitedPolicy management
US10979459B2 (en)2006-09-132021-04-13Sophos LimitedPolicy management
US10333990B2 (en)2006-09-132019-06-25Sophos LimitedPolicy management
US20080256019A1 (en)*2007-04-162008-10-16International Business Machines CorporationMethod and system for fast access to metainformation about possible files or other identifiable objects
EP2009865A1 (en)*2007-06-252008-12-31Alcatel LucentMethod of providing an access control system
US20100281514A1 (en)*2007-12-052010-11-04Electronics And Telecommunications Research InstituteSystem for managing identity with privacy policy using number and method thereof
US8185510B2 (en)2008-05-282012-05-22Zscaler, Inc.Distributed security provisioning
CN102106114A (en)*2008-05-282011-06-22兹斯卡勒公司Distributed security provisioning
US20110138468A1 (en)*2008-05-282011-06-09Zscaler, Inc.Distributed Security Provisioning
US7899849B2 (en)2008-05-282011-03-01Zscaler, Inc.Distributed security provisioning
WO2009154945A3 (en)*2008-05-282010-04-01Zscaler, Inc.Distributed security provisioning
US20090300045A1 (en)*2008-05-282009-12-03Safe Channel Inc.Distributed security provisioning
US7530106B1 (en)*2008-07-022009-05-05Kaspersky Lab, ZaoSystem and method for security rating of computer processes
US8607347B2 (en)*2008-09-292013-12-10Sophos LimitedNetwork stream scanning facility
US20100083380A1 (en)*2008-09-292010-04-01Harris Mark DNetwork stream scanning facility
US11468088B2 (en)2008-10-242022-10-11Pure Storage, Inc.Selection of storage nodes for storage of data
US20160212212A1 (en)*2008-10-242016-07-21Compuverde AbDistributed data storage
US11907256B2 (en)2008-10-242024-02-20Pure Storage, Inc.Query-based selection of storage nodes
US10650022B2 (en)*2008-10-242020-05-12Compuverde AbDistributed data storage
US10726126B2 (en)*2008-12-192020-07-28Samsung Electronics Co., Ltd.System and method for ensuring compliance with organizational policies
US20160371491A1 (en)*2008-12-192016-12-22Openpeak Inc.System and method for ensuring compliance with organizational policies
US20120198553A1 (en)*2009-09-142012-08-02Junko SuginakaSecure auditing system and secure auditing method
US9948716B2 (en)2010-04-232018-04-17Compuverde AbDistributed data storage
US8973092B2 (en)*2010-05-072015-03-03Alcatel LucentMethod for adapting security policies of an information system infrastructure
US20130111548A1 (en)*2010-05-072013-05-02Wael KanounMethod for adapting security policies of an information system infrastructure
US9251282B2 (en)*2010-06-212016-02-02Rapid7 LLCSystems and methods for determining compliance of references in a website
US20110314152A1 (en)*2010-06-212011-12-22Chad LoderSystems and methods for determining compliance of references in a website
US20120066762A1 (en)*2010-09-132012-03-15Rade TodorovicSystem and method of whitelisting parent virtual images
US8407804B2 (en)*2010-09-132013-03-26Sophos PlcSystem and method of whitelisting parent virtual images
US9075815B2 (en)2011-01-062015-07-07International Business Machines CorporationRecords declaration filesystem monitoring
US20130246349A1 (en)*2011-01-062013-09-19International Business Machines CorporationRecords declaration filesystem monitoring
US9959283B2 (en)*2011-01-062018-05-01International Business Machines CorporationRecords declaration filesystem monitoring
US9065850B1 (en)2011-02-072015-06-23Zscaler, Inc.Phishing detection systems and methods
US8839434B2 (en)*2011-04-152014-09-16Raytheon CompanyMulti-nodal malware analysis
US20120266245A1 (en)*2011-04-152012-10-18Raytheon CompanyMulti-Nodal Malware Analysis
US9858415B2 (en)*2011-06-162018-01-02Microsoft Technology Licensing, LlcCloud malware false positive recovery
US20120324579A1 (en)*2011-06-162012-12-20Microsoft CorporationCloud malware false positive recovery
US8635079B2 (en)2011-06-272014-01-21Raytheon CompanySystem and method for sharing malware analysis results
US8640246B2 (en)*2011-06-272014-01-28Raytheon CompanyDistributed malware detection
US9652741B2 (en)2011-07-082017-05-16Box, Inc.Desktop application for access and interaction with workspaces in a cloud-based content management system and synchronization mechanisms thereof
US8627404B2 (en)*2011-08-242014-01-07Raytheon CompanyDetecting addition of a file to a computer system and initiating remote analysis of the file for malware
US20130055338A1 (en)*2011-08-242013-02-28Raytheon CompanyDetecting Addition of a File to a Computer System and Initiating Remote Analysis of the File for Malware
US9965542B2 (en)2011-09-022018-05-08Compuverde AbMethod for data maintenance
US10579615B2 (en)2011-09-022020-03-03Compuverde AbMethod for data retrieval from a distributed data storage system
US11372897B1 (en)2011-09-022022-06-28Pure Storage, Inc.Writing of data to a storage system that implements a virtual file structure on an unstructured storage layer
US10430443B2 (en)2011-09-022019-10-01Compuverde AbMethod for data maintenance
US10769177B1 (en)2011-09-022020-09-08Pure Storage, Inc.Virtual file structure for data storage system
US10909110B1 (en)2011-09-022021-02-02Pure Storage, Inc.Data retrieval from a distributed data storage system
US11537630B2 (en)2011-11-292022-12-27Box, Inc.Mobile platform file and folder selection functionalities for offline access and synchronization
US11853320B2 (en)2011-11-292023-12-26Box, Inc.Mobile platform file and folder selection functionalities for offline access and synchronization
US10909141B2 (en)2011-11-292021-02-02Box, Inc.Mobile platform file and folder selection functionalities for offline access and synchronization
US12242507B2 (en)2011-11-292025-03-04Box, Inc.Mobile platform file and folder selection functionalities for offline access and synchronization
US9773051B2 (en)2011-11-292017-09-26Box, Inc.Mobile platform file and folder selection functionalities for offline access and synchronization
US20150006883A1 (en)*2012-02-222015-01-01International Business Machines CorporationVALlDATING A SYSTEM WITH MULTIPLE SUBSYSTEMS USING TRUSTED PLATFORM MODULES AND VIRTUAL PLATFORM MODULES
US9575981B2 (en)2012-04-112017-02-21Box, Inc.Cloud service enabled to handle a set of files depicted to a user as a single file in a native operating system
US9396216B2 (en)2012-05-042016-07-19Box, Inc.Repository redundancy implementation of a system which incrementally updates clients with events that occurred via a cloud-enabled platform
US9794256B2 (en)*2012-07-302017-10-17Box, Inc.System and method for advanced control tools for administrators in a cloud-based service
US20140033324A1 (en)*2012-07-302014-01-30Box, Inc.System and method for advanced control tools for administrators in a cloud-based service
US9558202B2 (en)2012-08-272017-01-31Box, Inc.Server side techniques for reducing database workload in implementing selective subfolder synchronization in a cloud-based environment
US9553758B2 (en)2012-09-182017-01-24Box, Inc.Sandboxing individual applications to specific user folders in a cloud-based service
US9489395B2 (en)2012-10-162016-11-08Rackspace Us, Inc.System and method for exposing cloud stored data to a content delivery network
US9015212B2 (en)*2012-10-162015-04-21Rackspace Us, Inc.System and method for exposing cloud stored data to a content delivery network
US20140108474A1 (en)*2012-10-162014-04-17Rackspace Us, Inc.System and Method for Exposing Cloud Stored Data to a Content Delivery Network
US20140123228A1 (en)*2012-10-252014-05-01Jacob Andrew BrillEvent Reporting and Handling
US9660993B2 (en)*2012-10-252017-05-23Facebook, Inc.Event reporting and handling
US10235383B2 (en)2012-12-192019-03-19Box, Inc.Method and apparatus for synchronization of items with read-only permissions in a cloud-based environment
EP2939173A4 (en)*2012-12-272016-08-10Crowdstrike Inc REAL-TIME REPRESENTATION OF A RELEVANT SYSTEM STATUS FOR SECURITY
US10409980B2 (en)2012-12-272019-09-10Crowdstrike, Inc.Real-time representation of security-relevant system state
US9396245B2 (en)2013-01-022016-07-19Box, Inc.Race condition handling in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform
US9953036B2 (en)2013-01-092018-04-24Box, Inc.File system monitoring in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform
US9507795B2 (en)2013-01-112016-11-29Box, Inc.Functionalities, features, and user interface of a synchronization client to a cloud-based environment
US10599671B2 (en)2013-01-172020-03-24Box, Inc.Conflict resolution, retry condition management, and handling of problem files for the synchronization client to a cloud-based platform
US10846074B2 (en)2013-05-102020-11-24Box, Inc.Identification and handling of items to be ignored for synchronization with a cloud-based platform by a synchronization client
US10725968B2 (en)2013-05-102020-07-28Box, Inc.Top down delete or unsynchronization on delete of and depiction of item synchronization with a synchronization client to a cloud-based platform
US10877937B2 (en)2013-06-132020-12-29Box, Inc.Systems and methods for synchronization event building and/or collapsing by a synchronization component of a cloud-based platform
US9633037B2 (en)2013-06-132017-04-25Box, IncSystems and methods for synchronization event building and/or collapsing by a synchronization component of a cloud-based platform
US9805050B2 (en)2013-06-212017-10-31Box, Inc.Maintaining and updating file system shadows on a local device by a synchronization client of a cloud-based platform
US11531648B2 (en)2013-06-212022-12-20Box, Inc.Maintaining and updating file system shadows on a local device by a synchronization client of a cloud-based platform
US20170213023A1 (en)*2013-08-202017-07-27White Cloud Security, L.L.C.Application Trust Listing Service
US10496812B2 (en)2013-09-062019-12-03Michael GuidrySystems and methods for security in computer systems
US11115438B2 (en)2013-09-202021-09-07Open Text Sa UlcSystem and method for geofencing
US11108827B2 (en)*2013-09-202021-08-31Open Text Sa UlcApplication gateway architecture with multi-level security policy and rule promulgations
US11102248B2 (en)2013-09-202021-08-24Open Text Sa UlcSystem and method for remote wipe
US9503468B1 (en)2013-11-122016-11-22EMC IP Holding Company LLCDetecting suspicious web traffic from an enterprise network
US9516039B1 (en)*2013-11-122016-12-06EMC IP Holding Company LLCBehavioral detection of suspicious host activities in an enterprise
US9338187B1 (en)2013-11-122016-05-10Emc CorporationModeling user working time using authentication events within an enterprise network
US11876784B2 (en)2013-12-052024-01-16Crowdstrike, Inc.RPC call interception
US11082404B2 (en)2013-12-052021-08-03Crowdstrike, Inc.RPC call interception
US20150163109A1 (en)*2013-12-052015-06-11Crowdstrike, Inc.Rpc call interception
US10356047B2 (en)*2013-12-052019-07-16Crowdstrike, Inc.RPC call interception
US10264021B2 (en)*2014-02-202019-04-16Nicira, Inc.Method and apparatus for distributing firewall rules
US11122085B2 (en)2014-02-202021-09-14Nicira, Inc.Method and apparatus for distributing firewall rules
US20160191570A1 (en)*2014-02-202016-06-30Nicira, Inc.Method and apparatus for distributing firewall rules
US12184698B2 (en)2014-02-202024-12-31Nicira, Inc.Method and apparatus for distributing firewall rules
US10530854B2 (en)2014-05-302020-01-07Box, Inc.Synchronization of permissioned content in cloud-based environments
US9798882B2 (en)2014-06-062017-10-24Crowdstrike, Inc.Real-time model of states of monitored devices
US9544321B2 (en)*2015-01-302017-01-10Securonix, Inc.Anomaly detection using adaptive behavioral profiles
US20160226901A1 (en)*2015-01-302016-08-04Securonix, Inc.Anomaly Detection Using Adaptive Behavioral Profiles
US11128600B2 (en)2015-06-302021-09-21Nicira, Inc.Global object definition and management for distributed firewalls
US11115382B2 (en)2015-06-302021-09-07Nicira, Inc.Global objects for federated firewall rule management
US9697361B2 (en)*2015-07-062017-07-04AO Kaspersky LabSystem and method of controlling opening of files by vulnerable applications
CN105760773A (en)*2015-07-062016-07-13卡巴斯基实验室股份制公司System and method of controlling opening of file by vulnerable application
US20170262631A1 (en)*2015-07-062017-09-14AO Kaspersky LabSystem and method of controlling file access of applications based on vulnerabilities of applications
US10621356B2 (en)*2015-07-062020-04-14AO Kaspersky LabSystem and method of controlling file access of applications based on vulnerabilities of applications
US11593075B2 (en)2015-11-032023-02-28Open Text Sa UlcStreamlined fast and efficient application building and customization systems and methods
US20170195335A1 (en)*2016-01-042017-07-06Bank Of America CorporationSystem for controlled data exchange in a file hosting service environment
US10027673B2 (en)*2016-01-042018-07-17Bank Of America CorporationSystem for controlled data exchange in a file hosting service environment
CN108370334A (en)*2016-01-292018-08-03微软技术许可有限责任公司Network connectivty detects
US11388037B2 (en)2016-02-252022-07-12Open Text Sa UlcSystems and methods for providing managed services
US11005815B2 (en)2016-04-292021-05-11Nicira, Inc.Priority allocation for distributed service rules
US10135727B2 (en)2016-04-292018-11-20Nicira, Inc.Address grouping for distributed service rules
US10348685B2 (en)2016-04-292019-07-09Nicira, Inc.Priority allocation for distributed service rules
US11425095B2 (en)2016-05-012022-08-23Nicira, Inc.Fast ordering of firewall sections and rules
US10944722B2 (en)2016-05-012021-03-09Nicira, Inc.Using activities to manage multi-tenant firewall configuration
US11171920B2 (en)2016-05-012021-11-09Nicira, Inc.Publication of firewall configuration
US10402577B2 (en)*2016-06-032019-09-03Honeywell International Inc.Apparatus and method for device whitelisting and blacklisting to override protections for allowed media at nodes of a protected system
US20170351870A1 (en)*2016-06-032017-12-07Honeywell International Inc.Apparatus and method for device whitelisting and blacklisting to override protections for allowed media at nodes of a protected system
US11088990B2 (en)2016-06-292021-08-10Nicira, Inc.Translation cache for firewall configuration
US11082400B2 (en)2016-06-292021-08-03Nicira, Inc.Firewall configuration versioning
US11258761B2 (en)2016-06-292022-02-22Nicira, Inc.Self-service firewall configuration
US20210026951A1 (en)*2017-08-012021-01-28PC Matic, IncSystem, Method, and Apparatus for Computer Security
US11487868B2 (en)*2017-08-012022-11-01Pc Matic, Inc.System, method, and apparatus for computer security
US10915623B2 (en)*2017-09-042021-02-09Kabushiki Kaisha ToshibaInformation processing apparatus, information processing method, and computer program product
US11620396B2 (en)2017-09-122023-04-04Sophos LimitedSecure firewall configurations
US10878110B2 (en)2017-09-122020-12-29Sophos LimitedDashboard for managing enterprise network traffic
US12039036B2 (en)2017-09-122024-07-16Sophos LimitedSecure firewall configurations
US10997303B2 (en)2017-09-122021-05-04Sophos LimitedManaging untyped network traffic flows
US11966482B2 (en)2017-09-122024-04-23Sophos LimitedManaging untyped network traffic flows
US11017102B2 (en)2017-09-122021-05-25Sophos LimitedCommunicating application information to a firewall
US11093624B2 (en)2017-09-122021-08-17Sophos LimitedProviding process data to a data recorder
US10885211B2 (en)2017-09-122021-01-05Sophos LimitedSecuring interprocess communications
US20190253443A1 (en)*2018-02-142019-08-15Paladion Networks Private LimitedUser Behavior Anomaly Detection
US10757122B2 (en)*2018-02-142020-08-25Paladion Networks Private LimitedUser behavior anomaly detection
US11425170B2 (en)2018-10-112022-08-23Honeywell International Inc.System and method for deploying and configuring cyber-security protection solution using portable storage device
US10949532B2 (en)*2018-12-132021-03-16Beijing Jingdong Shangke Information Technology Co., Ltd.System and method for monitoring file integrity of multiple containers using one agent
US12058108B2 (en)2019-03-132024-08-06VMware LLCSharing of firewall rules among multiple workloads in a hypervisor
US11310202B2 (en)2019-03-132022-04-19Vmware, Inc.Sharing of firewall rules among multiple workloads in a hypervisor
US11121965B2 (en)*2019-04-042021-09-14Huazhong University Of Science And TechnologyNetwork resource isolation method for container network and system thereof
US11323482B2 (en)*2019-12-312022-05-03Mcafee, LlcMethods, systems, and media for protecting computer systems from user-created objects
US20240241980A1 (en)*2021-05-272024-07-18Microsoft Technology Licensing, LlcCentralized access control for cloud relational database management system resources
US11934548B2 (en)*2021-05-272024-03-19Microsoft Technology Licensing, LlcCentralized access control for cloud relational database management system resources
US20220382892A1 (en)*2021-05-272022-12-01Microsoft Technology Licensing, LlcCentralized access control for cloud relational database management system resources
US12259992B2 (en)*2021-05-272025-03-25Microsoft Technology Licensing, LlcCentralized access control for cloud relational database management system resources

Also Published As

Publication numberPublication date
US8782800B2 (en)2014-07-15
US20120216246A1 (en)2012-08-23

Similar Documents

PublicationPublication DateTitle
US8782800B2 (en)Parametric content control in a network security system
US8272058B2 (en)Centralized timed analysis in a network security system
US7895651B2 (en)Content tracking in a network security system
US8984636B2 (en)Content extractor and analysis system
EP1920338B1 (en)Network security systems and methods
US20070028302A1 (en)Distributed meta-information query in a network
US12314396B2 (en)Systems and methods for providing security services during power management mode
US12294595B2 (en)Computer investigation method and system
US12292966B2 (en)Systems and methods for folder and file sequestration
US20240086538A1 (en)Computer investigation method and system for investigating authentication in remote host computers

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:BIT 9, INC., MASSACHUSETTS

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BRENNAN, TODD F.;HILLERY, ALLEN;REEL/FRAME:017004/0093

Effective date:20051012

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION


[8]ページ先頭

©2009-2025 Movatter.jp