Movatterモバイル変換


[0]ホーム

URL:


US20090178131A1 - Globally distributed infrastructure for secure content management - Google Patents

Globally distributed infrastructure for secure content management
Download PDF

Info

Publication number
US20090178131A1
US20090178131A1US12/164,078US16407808AUS2009178131A1US 20090178131 A1US20090178131 A1US 20090178131A1US 16407808 AUS16407808 AUS 16407808AUS 2009178131 A1US2009178131 A1US 2009178131A1
Authority
US
United States
Prior art keywords
security
user
pops
product
pop
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/164,078
Inventor
Efim Hudis
Yigal Edery
Oleg Ananiev
Nir Nice
John F. Wohlfert
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft CorpfiledCriticalMicrosoft Corp
Priority to US12/164,078priorityCriticalpatent/US20090178131A1/en
Assigned to MICROSOFT CORPORATIONreassignmentMICROSOFT CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: ANANIEV, OLEG, HUDIS, EFIM, WOHLFERT, JOHN F., EDERY, YIGAL, NICE, NIR
Publication of US20090178131A1publicationCriticalpatent/US20090178131A1/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLCreassignmentMICROSOFT TECHNOLOGY LICENSING, LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: MICROSOFT CORPORATION
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Secure content management is enabled as a cloud-based service through which security protection and policy enforcement may be implemented for both on-premise network users and roaming users. The global SCM service integrates the security functionalities—such as anti-virus, spyware and phishing protection, firewall, intrusion detection, centralized management, and the like—that are typically provided by enterprise network SCM appliance hardware or servers into a cloud-based service that users reach via Internet-based points-of-presence (“POPs”). The POPs are configured with forward proxy servers, and in some implementations, caching and network acceleration components, and coupled to hubs which provide configuration management and identity management services such as active directory services.

Description

Claims (20)

1. An infrastructure for providing a security protection service to an IT device, comprising:
a plurality of POPs, each POP including a suite of security products, each product in the suite arranged for providing one or more security functionalities, one of the security products comprising a forward proxy server for forwarding traffic from the IT device to resource servers on the Internet;
a hub operatively coupled to one or more POPs, the hub providing configuration management for forward proxy servers disposed in the hub, and further providing identity management to authenticate and authorize a user of the IT device for the security protection service; and
a management operations center operatively coupled to the hub for implementing centralized management for the infrastructure, the centralized management including monitoring and auditing.
15. A method for providing a security protection service for IT devices, the method comprising the steps of:
utilizing an infrastructure that is accessible by users from the Internet, the infrastructure including a plurality of POPs, each POP in the plurality including at least a forward proxy server for forwarding traffic from the IT devices to resource servers that are accessible on the Internet;
authenticating and authorizing users of the IT devices for the security protection service;
redirecting a user to a co-located POP, a POP being co-located when a set of parameters is optimized including network latency compared with non-co-located POPs and localization of a user experience may be implemented; and
managing the forward proxy servers in the POPs using an enterprise management subsystem located in a hub that is coupled to one or more POPs
US12/164,0782008-01-082008-06-29Globally distributed infrastructure for secure content managementAbandonedUS20090178131A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US12/164,078US20090178131A1 (en)2008-01-082008-06-29Globally distributed infrastructure for secure content management

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US1973908P2008-01-082008-01-08
US12/164,078US20090178131A1 (en)2008-01-082008-06-29Globally distributed infrastructure for secure content management

Publications (1)

Publication NumberPublication Date
US20090178131A1true US20090178131A1 (en)2009-07-09

Family

ID=40845311

Family Applications (5)

Application NumberTitlePriority DateFiling Date
US12/164,078AbandonedUS20090178131A1 (en)2008-01-082008-06-29Globally distributed infrastructure for secure content management
US12/192,111Active2031-06-19US8881223B2 (en)2008-01-082008-08-14Enterprise security assessment sharing for off-premise users using globally distributed infrastructure
US12/192,107Expired - Fee RelatedUS8910268B2 (en)2008-01-082008-08-14Enterprise security assessment sharing for consumers using globally distributed infrastructure
US12/192,113Active2030-07-09US8296178B2 (en)2008-01-082008-08-14Services using globally distributed infrastructure for secure content management
US12/193,070Active2030-12-14US8935742B2 (en)2008-01-082008-08-18Authentication in a globally distributed infrastructure for secure content management

Family Applications After (4)

Application NumberTitlePriority DateFiling Date
US12/192,111Active2031-06-19US8881223B2 (en)2008-01-082008-08-14Enterprise security assessment sharing for off-premise users using globally distributed infrastructure
US12/192,107Expired - Fee RelatedUS8910268B2 (en)2008-01-082008-08-14Enterprise security assessment sharing for consumers using globally distributed infrastructure
US12/192,113Active2030-07-09US8296178B2 (en)2008-01-082008-08-14Services using globally distributed infrastructure for secure content management
US12/193,070Active2030-12-14US8935742B2 (en)2008-01-082008-08-18Authentication in a globally distributed infrastructure for secure content management

Country Status (1)

CountryLink
US (5)US20090178131A1 (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090300739A1 (en)*2008-05-272009-12-03Microsoft CorporationAuthentication for distributed secure content management system
WO2010025007A2 (en)2008-08-282010-03-04Microsoft CorporationProtecting a virtual guest machine from attacks by an infected host
US20110119104A1 (en)*2009-11-172011-05-19Xerox CorporationIndividualized behavior-based service bundling and pricing
US20110162033A1 (en)*2009-12-282011-06-30International Business Machines CorporationLocation based security over wireless networks
US20110264804A1 (en)*2010-03-232011-10-27Mario VuksanCloud-based web content filtering
US20110289054A1 (en)*2010-05-192011-11-24Southern Company ServicesContent Management Migration Manager System and Method
US20120240183A1 (en)*2011-03-182012-09-20Amit SinhaCloud based mobile device security and policy enforcement
CN104504330A (en)*2014-12-122015-04-08北京奇虎科技有限公司Virtual safety detecting method and system
US9037797B2 (en)2011-05-242015-05-19International Business Machines CorporationIntelligent caching
US9160761B2 (en)2013-07-312015-10-13Hewlett-Packard Development Company, L.P.Selection of a countermeasure
US9191369B2 (en)2009-07-172015-11-17Aryaka Networks, Inc.Application acceleration as a service system and method
US9928375B2 (en)2011-06-132018-03-27International Business Machines CorporationMitigation of data leakage in a multi-site computing infrastructure
US10044719B2 (en)2016-01-292018-08-07Zscaler, Inc.Client application based access control in cloud security systems for mobile devices
US10142362B2 (en)2016-06-022018-11-27Zscaler, Inc.Cloud based systems and methods for determining security risks of users and groups
US10243925B2 (en)2009-12-122019-03-26Akamai Technologies, Inc.Cloud based firewell system and service
US10498605B2 (en)2016-06-022019-12-03Zscaler, Inc.Cloud based systems and methods for determining and visualizing security risks of companies, users, and groups
US10523710B2 (en)2011-03-182019-12-31Zscaler, Inc.Mobile device security, device management, and policy enforcement in a cloud based system
CN111131230A (en)*2019-12-232020-05-08合肥学院 A big data analysis system using computer verification code technology
EP2899940B1 (en)*2014-01-232020-06-03Vodafone GmbHConnection method for secure connecting of a mobile device system to a network
US11297058B2 (en)2016-03-282022-04-05Zscaler, Inc.Systems and methods using a cloud proxy for mobile device management and policy

Families Citing this family (258)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8782654B2 (en)2004-03-132014-07-15Adaptive Computing Enterprises, Inc.Co-allocating a reservation spanning different compute resources types
US8151103B2 (en)2004-03-132012-04-03Adaptive Computing Enterprises, Inc.System and method for providing object triggers
US20070266388A1 (en)2004-06-182007-11-15Cluster Resources, Inc.System and method for providing advanced reservations in a compute environment
US8176490B1 (en)2004-08-202012-05-08Adaptive Computing Enterprises, Inc.System and method of interfacing a workload manager and scheduler with an identity manager
WO2006053093A2 (en)2004-11-082006-05-18Cluster Resources, Inc.System and method of providing system jobs within a compute environment
US8863143B2 (en)2006-03-162014-10-14Adaptive Computing Enterprises, Inc.System and method for managing a hybrid compute environment
US9413687B2 (en)2005-03-162016-08-09Adaptive Computing Enterprises, Inc.Automatic workload transfer to an on-demand center
US9231886B2 (en)2005-03-162016-01-05Adaptive Computing Enterprises, Inc.Simple integration of an on-demand compute environment
US9015324B2 (en)2005-03-162015-04-21Adaptive Computing Enterprises, Inc.System and method of brokering cloud computing resources
ES2614751T3 (en)2005-04-072017-06-01Iii Holdings 12, Llc Access on demand to computer resources
US8782120B2 (en)2005-04-072014-07-15Adaptive Computing Enterprises, Inc.Elastic management of compute resources between a web server and an on-demand compute environment
GB0513375D0 (en)2005-06-302005-08-03Retento LtdComputer security
US8041773B2 (en)2007-09-242011-10-18The Research Foundation Of State University Of New YorkAutomatic clustering for self-organizing grids
US8458658B2 (en)2008-02-292013-06-04Red Hat, Inc.Methods and systems for dynamically building a software appliance
US8935692B2 (en)*2008-05-222015-01-13Red Hat, Inc.Self-management of virtual machines in cloud-based networks
KR20090121579A (en)*2008-05-222009-11-26주식회사 이베이지마켓 System and method for checking vulnerability of server
US8375104B2 (en)*2008-05-222013-02-12Samsung Electronics Co., Ltd.Method and apparatus for providing remote access service
US7886038B2 (en)*2008-05-272011-02-08Red Hat, Inc.Methods and systems for user identity management in cloud-based networks
US8849971B2 (en)*2008-05-282014-09-30Red Hat, Inc.Load balancing in cloud-based networks
US9092243B2 (en)2008-05-282015-07-28Red Hat, Inc.Managing a software appliance
US20090300423A1 (en)*2008-05-282009-12-03James Michael FerrisSystems and methods for software test management in cloud-based network
US8239509B2 (en)2008-05-282012-08-07Red Hat, Inc.Systems and methods for management of virtual appliances in cloud-based network
US10657466B2 (en)*2008-05-292020-05-19Red Hat, Inc.Building custom appliances in a cloud-based network
US8943497B2 (en)2008-05-292015-01-27Red Hat, Inc.Managing subscriptions for cloud-based virtual machines
US8108912B2 (en)2008-05-292012-01-31Red Hat, Inc.Systems and methods for management of secure data in cloud-based network
US8868721B2 (en)2008-05-292014-10-21Red Hat, Inc.Software appliance management using broadcast data
US8341625B2 (en)2008-05-292012-12-25Red Hat, Inc.Systems and methods for identification and management of cloud-based virtual machines
US10372490B2 (en)*2008-05-302019-08-06Red Hat, Inc.Migration of a virtual machine from a first cloud computing environment to a second cloud computing environment in response to a resource or services in the second cloud computing environment becoming available
US9489647B2 (en)2008-06-192016-11-08Csc Agility Platform, Inc.System and method for a cloud computing abstraction with self-service portal for publishing resources
US20140201017A1 (en)2008-06-192014-07-17Servicemesh, Inc.Systems and methods for providing repeated use of computing resources
US9069599B2 (en)2008-06-192015-06-30Servicemesh, Inc.System and method for a cloud computing abstraction layer with security zone facilities
US10411975B2 (en)2013-03-152019-09-10Csc Agility Platform, Inc.System and method for a cloud computing abstraction with multi-tier deployment policy
AU2009259876A1 (en)2008-06-192009-12-23Servicemesh, Inc.Cloud computing gateway, cloud computing hypervisor, and methods for implementing same
US10146926B2 (en)*2008-07-182018-12-04Microsoft Technology Licensing, LlcDifferentiated authentication for compartmentalized computing resources
US9842004B2 (en)*2008-08-222017-12-12Red Hat, Inc.Adjusting resource usage for cloud-based networks
US9910708B2 (en)2008-08-282018-03-06Red Hat, Inc.Promotion of calculations to cloud-based computation resources
US8238256B2 (en)*2008-09-082012-08-07Nugent Raymond MSystem and method for cloud computing
US9443084B2 (en)*2008-11-032016-09-13Microsoft Technology Licensing, LlcAuthentication in a network using client health enforcement framework
US9037692B2 (en)2008-11-262015-05-19Red Hat, Inc.Multiple cloud marketplace aggregation
US10025627B2 (en)2008-11-262018-07-17Red Hat, Inc.On-demand cloud computing environments
US9210173B2 (en)*2008-11-262015-12-08Red Hat, Inc.Securing appliances for use in a cloud computing environment
US9870541B2 (en)*2008-11-262018-01-16Red Hat, Inc.Service level backup using re-cloud network
US8984505B2 (en)2008-11-262015-03-17Red Hat, Inc.Providing access control to user-controlled resources in a cloud computing environment
US8782233B2 (en)*2008-11-262014-07-15Red Hat, Inc.Embedding a cloud-based resource request in a specification language wrapper
US20120005724A1 (en)*2009-02-092012-01-05Imera Systems, Inc.Method and system for protecting private enterprise resources in a cloud computing environment
US9485117B2 (en)*2009-02-232016-11-01Red Hat, Inc.Providing user-controlled resources for cloud computing environments
US9930138B2 (en)2009-02-232018-03-27Red Hat, Inc.Communicating with third party resources in cloud computing environment
US8977750B2 (en)*2009-02-242015-03-10Red Hat, Inc.Extending security platforms to cloud-based networks
CN101854335A (en)*2009-03-302010-10-06华为技术有限公司 A filtering method, system and network equipment
US8555381B2 (en)*2009-04-012013-10-08Honeywell International Inc.Cloud computing as a security layer
US9311162B2 (en)*2009-05-272016-04-12Red Hat, Inc.Flexible cloud management
US9104407B2 (en)2009-05-282015-08-11Red Hat, Inc.Flexible cloud management with power management support
US9450783B2 (en)*2009-05-282016-09-20Red Hat, Inc.Abstracting cloud management
US20100306767A1 (en)*2009-05-292010-12-02Dehaan Michael PaulMethods and systems for automated scaling of cloud computing systems
US9201485B2 (en)*2009-05-292015-12-01Red Hat, Inc.Power management in managed network having hardware based and virtual resources
US9703609B2 (en)*2009-05-292017-07-11Red Hat, Inc.Matching resources associated with a virtual machine to offered resources
US8832459B2 (en)*2009-08-282014-09-09Red Hat, Inc.Securely terminating processes in a cloud computing environment
US8316125B2 (en)*2009-08-312012-11-20Red Hat, Inc.Methods and systems for automated migration of cloud processes to external clouds
US8862720B2 (en)2009-08-312014-10-14Red Hat, Inc.Flexible cloud management including external clouds
US8271653B2 (en)*2009-08-312012-09-18Red Hat, Inc.Methods and systems for cloud management using multiple cloud management schemes to allow communication between independently controlled clouds
US8769083B2 (en)2009-08-312014-07-01Red Hat, Inc.Metering software infrastructure in a cloud computing environment
US8504443B2 (en)*2009-08-312013-08-06Red Hat, Inc.Methods and systems for pricing software infrastructure for a cloud computing environment
WO2011027352A1 (en)*2009-09-032011-03-10Mcafee, Inc.Network access control
US8584221B2 (en)2009-10-232013-11-12Microsoft CorporationAuthenticating using cloud authentication
US11720290B2 (en)2009-10-302023-08-08Iii Holdings 2, LlcMemcached server functionality in a cluster of data processing nodes
US10877695B2 (en)2009-10-302020-12-29Iii Holdings 2, LlcMemcached server functionality in a cluster of data processing nodes
US8375223B2 (en)*2009-10-302013-02-12Red Hat, Inc.Systems and methods for secure distributed storage
CN102055730B (en)*2009-11-022013-09-11华为终端有限公司Cloud processing system, cloud processing method and cloud computing agent device
US8302189B2 (en)*2009-11-302012-10-30At&T Intellectual Property I, L.P.Methods, devices, systems, and computer program products for edge driven communications network security monitoring
US9971880B2 (en)2009-11-302018-05-15Red Hat, Inc.Verifying software license compliance in cloud computing environments
US9389980B2 (en)2009-11-302016-07-12Red Hat, Inc.Detecting events in cloud computing environments and performing actions upon occurrence of the events
US10402544B2 (en)*2009-11-302019-09-03Red Hat, Inc.Generating a software license knowledge base for verifying software license compliance in cloud computing environments
US9529689B2 (en)2009-11-302016-12-27Red Hat, Inc.Monitoring cloud computing environments
US10268522B2 (en)2009-11-302019-04-23Red Hat, Inc.Service aggregation using graduated service levels in a cloud network
US20110153644A1 (en)*2009-12-222011-06-23Nokia CorporationMethod and apparatus for utilizing a scalable data structure
CN102687482B (en)2009-12-292016-03-09诺基亚技术有限公司The distributed authentication of data cloud
US8745397B2 (en)*2010-01-042014-06-03Microsoft CorporationMonitoring federation for cloud based services and applications
US11922196B2 (en)*2010-02-262024-03-05Red Hat, Inc.Cloud-based utilization of software entitlements
US9053472B2 (en)2010-02-262015-06-09Red Hat, Inc.Offering additional license terms during conversion of standard software licenses for use in cloud computing environments
US20110213687A1 (en)*2010-02-262011-09-01James Michael FerrisSystems and methods for or a usage manager for cross-cloud appliances
US8402139B2 (en)*2010-02-262013-03-19Red Hat, Inc.Methods and systems for matching resource requests with cloud computing environments
US20110214124A1 (en)*2010-02-262011-09-01James Michael FerrisSystems and methods for generating cross-cloud computing appliances
US8255529B2 (en)*2010-02-262012-08-28Red Hat, Inc.Methods and systems for providing deployment architectures in cloud computing environments
US10783504B2 (en)*2010-02-262020-09-22Red Hat, Inc.Converting standard software licenses for use in cloud computing environments
US8606667B2 (en)*2010-02-262013-12-10Red Hat, Inc.Systems and methods for managing a software subscription in a cloud network
US9544143B2 (en)2010-03-032017-01-10Duo Security, Inc.System and method of notifying mobile devices to complete transactions
US9532222B2 (en)2010-03-032016-12-27Duo Security, Inc.System and method of notifying mobile devices to complete transactions after additional agent verification
CN102236610B (en)*2010-04-302016-03-30深圳市朗科科技股份有限公司Movable storage device and method, anti-intrusion system
US8713676B2 (en)2010-05-132014-04-29Verisign, Inc.Systems and methods for identifying malicious domains using internet-wide DNS lookup patterns
US9552478B2 (en)2010-05-182017-01-24AO Kaspersky LabTeam security for portable information devices
US9202225B2 (en)2010-05-282015-12-01Red Hat, Inc.Aggregate monitoring of utilization data for vendor products in cloud networks
US8606897B2 (en)2010-05-282013-12-10Red Hat, Inc.Systems and methods for exporting usage history data as input to a management platform of a target cloud-based network
US9354939B2 (en)2010-05-282016-05-31Red Hat, Inc.Generating customized build options for cloud deployment matching usage profile against cloud infrastructure options
US8954564B2 (en)2010-05-282015-02-10Red Hat, Inc.Cross-cloud vendor mapping service in cloud marketplace
US8504689B2 (en)2010-05-282013-08-06Red Hat, Inc.Methods and systems for cloud deployment analysis featuring relative cloud resource importance
US9436459B2 (en)2010-05-282016-09-06Red Hat, Inc.Generating cross-mapping of vendor software in a cloud computing environment
US8364819B2 (en)2010-05-282013-01-29Red Hat, Inc.Systems and methods for cross-vendor mapping service in cloud networks
US8909783B2 (en)2010-05-282014-12-09Red Hat, Inc.Managing multi-level service level agreements in cloud-based network
US8880700B2 (en)2010-05-282014-11-04Red Hat, Inc.Delivery of user-controlled resources in cloud environments via a resource specification language wrapper
US8997196B2 (en)2010-06-142015-03-31Microsoft CorporationFlexible end-point compliance and strong authentication for distributed hybrid enterprises
US8782748B2 (en)*2010-06-222014-07-15Microsoft CorporationOnline service access controls using scale out directory features
CN107608755A (en)2010-07-012018-01-19纽戴纳公司Split process between cluster by process type to optimize the use of cluster particular configuration
US20120011590A1 (en)*2010-07-122012-01-12John Joseph DonovanSystems, methods and devices for providing situational awareness, mitigation, risk analysis of assets, applications and infrastructure in the internet and cloud
US11308490B2 (en)2010-07-282022-04-19Cox Communications, Inc.Security system and method that allows users to securely setup and maintain system security for all business systems
US8881247B2 (en)*2010-09-242014-11-04Microsoft CorporationFederated mobile authentication using a network operator infrastructure
FR2966669B1 (en)2010-10-212013-07-05Ipanema Technologies METHOD OF OPTIMIZING THE TRANSFER OF SECURE DATA STREAMS VIA AN AUTONOMOUS NETWORK
US20130067582A1 (en)*2010-11-122013-03-14John Joseph DonovanSystems, methods and devices for providing device authentication, mitigation and risk analysis in the internet and cloud
US8904005B2 (en)2010-11-232014-12-02Red Hat, Inc.Indentifying service dependencies in a cloud deployment
US9736252B2 (en)2010-11-232017-08-15Red Hat, Inc.Migrating subscribed services in a cloud deployment
US8909784B2 (en)2010-11-232014-12-09Red Hat, Inc.Migrating subscribed services from a set of clouds to a second set of clouds
US8612577B2 (en)2010-11-232013-12-17Red Hat, Inc.Systems and methods for migrating software modules into one or more clouds
US8612615B2 (en)2010-11-232013-12-17Red Hat, Inc.Systems and methods for identifying usage histories for producing optimized cloud utilization
US9442771B2 (en)2010-11-242016-09-13Red Hat, Inc.Generating configurable subscription parameters
US8713147B2 (en)2010-11-242014-04-29Red Hat, Inc.Matching a usage history to a new cloud
US8825791B2 (en)2010-11-242014-09-02Red Hat, Inc.Managing subscribed resource in cloud network using variable or instantaneous consumption tracking periods
US8949426B2 (en)2010-11-242015-02-03Red Hat, Inc.Aggregation of marginal subscription offsets in set of multiple host clouds
US8924539B2 (en)2010-11-242014-12-30Red Hat, Inc.Combinatorial optimization of multiple resources across a set of cloud-based networks
US10192246B2 (en)2010-11-242019-01-29Red Hat, Inc.Generating multi-cloud incremental billing capture and administration
US9563479B2 (en)2010-11-302017-02-07Red Hat, Inc.Brokering optimized resource supply costs in host cloud-based network using predictive workloads
US9606831B2 (en)2010-11-302017-03-28Red Hat, Inc.Migrating virtual machine operations
US9241003B2 (en)*2010-12-152016-01-19At&T Intellectual Property I, L.P.Methods, systems, and computer program products for authenticating an entity through use of a global identity of the entity that serves as a proxy for one or more local identities of the entity
KR101742578B1 (en)*2011-01-142017-06-01삼성전자주식회사Content management method and apparatus for applying the same
WO2012100092A2 (en)*2011-01-192012-07-26Servicemesh, Inc.System and method for a cloud computing abstraction layer with security zone facilities
US20120260304A1 (en)*2011-02-152012-10-11Webroot Inc.Methods and apparatus for agent-based malware management
US8959221B2 (en)2011-03-012015-02-17Red Hat, Inc.Metering cloud resource consumption using multiple hierarchical subscription periods
US8832219B2 (en)2011-03-012014-09-09Red Hat, Inc.Generating optimized resource consumption periods for multiple users on combined basis
US9531758B2 (en)2011-03-182016-12-27Zscaler, Inc.Dynamic user identification and policy enforcement in cloud-based secure web gateways
US9065800B2 (en)2011-03-182015-06-23Zscaler, Inc.Dynamic user identification and policy enforcement in cloud-based secure web gateways
US20120254610A1 (en)*2011-03-312012-10-04Microsoft CorporationRemote disabling of applications
US8612541B2 (en)*2011-04-292013-12-17Blue Coat Systems, Inc.Method and apparatus for multi-tenant policy management in a network device
US8631099B2 (en)2011-05-272014-01-14Red Hat, Inc.Systems and methods for cloud deployment engine for selective workload migration or federation based on workload conditions
US10102018B2 (en)2011-05-272018-10-16Red Hat, Inc.Introspective application reporting to facilitate virtual machine movement between cloud hosts
US8984104B2 (en)2011-05-312015-03-17Red Hat, Inc.Self-moving operating system installation in cloud-based network
US10360122B2 (en)2011-05-312019-07-23Red Hat, Inc.Tracking cloud installation information using cloud-aware kernel of operating system
US8782192B2 (en)2011-05-312014-07-15Red Hat, Inc.Detecting resource consumption events over sliding intervals in cloud-based network
US9037723B2 (en)2011-05-312015-05-19Red Hat, Inc.Triggering workload movement based on policy stack having multiple selectable inputs
US8578443B2 (en)*2011-06-012013-11-05Mobileasap, Inc.Real-time mobile application management
US8891772B2 (en)2011-06-172014-11-18Microsoft CorporationCloud key escrow system
US8627508B2 (en)2011-06-172014-01-07Microsoft CorporationCloud key directory for federating data exchanges
US9161249B1 (en)*2011-07-072015-10-13Symantec CorporationSystems and methods for performing internet site security analyses
WO2013019241A1 (en)*2011-08-042013-02-07Hewlett-Packard Development Company, L.P.Federation for information technology service management
US9467463B2 (en)2011-09-022016-10-11Duo Security, Inc.System and method for assessing vulnerability of a mobile device
US8214904B1 (en)2011-12-212012-07-03Kaspersky Lab ZaoSystem and method for detecting computer security threats based on verdicts of computer users
US8949938B2 (en)2011-10-272015-02-03Cisco Technology, Inc.Mechanisms to use network session identifiers for software-as-a-service authentication
US9141887B2 (en)2011-10-312015-09-22Hewlett-Packard Development Company, L.P.Rendering permissions for rendering content
RU2494453C2 (en)2011-11-242013-09-27Закрытое акционерное общество "Лаборатория Касперского"Method for distributed performance of computer security tasks
US8209758B1 (en)2011-12-212012-06-26Kaspersky Lab ZaoSystem and method for classifying users of antivirus software based on their level of expertise in the field of computer security
US8214905B1 (en)2011-12-212012-07-03Kaspersky Lab ZaoSystem and method for dynamically allocating computing resources for processing security information
US20130166622A1 (en)*2011-12-272013-06-27Citrix Systems, IncUsing Mobile Device Location Data with Remote Resources
KR101312125B1 (en)*2012-02-222013-09-26주식회사 팬택Contents filtering apparatus and method thereof
US10176335B2 (en)*2012-03-202019-01-08Microsoft Technology Licensing, LlcIdentity services for organizations transparently hosted in the cloud
CN102710742A (en)*2012-04-112012-10-03佳都新太科技股份有限公司Offline file synchronous processing mechanism based on cloud computing virtual application
US9253209B2 (en)2012-04-262016-02-02International Business Machines CorporationPolicy-based dynamic information flow control on mobile devices
US9462080B2 (en)2012-04-272016-10-04Hewlett-Packard Development Company, L.P.Management service to manage a file
US9912638B2 (en)2012-04-302018-03-06Zscaler, Inc.Systems and methods for integrating cloud services with information management systems
US8955091B2 (en)2012-04-302015-02-10Zscaler, Inc.Systems and methods for integrating cloud services with information management systems
US9152781B2 (en)2012-08-092015-10-06Cisco Technology, Inc.Secure mobile client with assertions for access to service provider applications
CN103701834A (en)*2012-09-272014-04-02中国人民解放军国防科学技术大学Proxy based mobile cloud service access system and method
US9904791B1 (en)*2012-09-302018-02-27Emc CorporationProcessing device having secure container for accessing enterprise data over a network
US8782284B2 (en)*2012-11-152014-07-15Carefusion 303, Inc.Extensible deployment system
US9294495B1 (en)2013-01-062016-03-22Spheric Security SolutionsSystem and method for evaluating and enhancing the security level of a network system
US11843625B2 (en)2013-01-062023-12-12Security Inclusion Now Usa LlcSystem and method for evaluating and enhancing the security level of a network system
WO2014143000A1 (en)*2013-03-152014-09-18Mcafee, Inc.Server-assisted anti-malware
US20140282839A1 (en)*2013-03-152014-09-18Microsoft CorporationUnified enterprise device enrollment
US9143519B2 (en)2013-03-152015-09-22Mcafee, Inc.Remote malware remediation
US9614865B2 (en)2013-03-152017-04-04Mcafee, Inc.Server-assisted anti-malware client
US10409987B2 (en)*2013-03-312019-09-10AO Kaspersky LabSystem and method for adaptive modification of antivirus databases
US9380023B2 (en)*2013-05-132016-06-28Owl Computing Technologies, Inc.Enterprise cross-domain solution having configurable data filters
US9197601B2 (en)2013-06-052015-11-24Bat Blue Networks, Inc.System and method for providing a single global borderless virtual perimeter through distributed points of presence
US9614857B2 (en)2013-06-282017-04-04Intel CorporationSupervised online identity
US9313189B2 (en)2013-07-112016-04-12Sap SeAutomatic management of secure connections
US9456003B2 (en)2013-07-242016-09-27At&T Intellectual Property I, L.P.Decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment
US10225162B1 (en)2013-09-262019-03-05EMC IP Holding Company LLCMethods and apparatus for array agnostic automated storage tiering
US9569139B1 (en)*2013-09-262017-02-14EMC IP Holding Company LLCMethods and apparatus for shared service provisioning
US9537935B2 (en)*2013-09-302017-01-03Eric Trent DrydenConsumer PC in the cloud
US9386103B2 (en)2013-10-042016-07-05Breakingpoint Systems, Inc.Application identification and dynamic signature generation for managing network communications
US10908937B2 (en)2013-11-112021-02-02Amazon Technologies, Inc.Automatic directory join for virtual machine instances
US10530742B2 (en)2013-11-112020-01-07Amazon Technologies Inc.Managed directory service
US9626720B2 (en)2013-11-252017-04-18Apple Inc.Linked user accounts
US9584989B2 (en)2013-11-252017-02-28At&T Intellectual Property I, L.P.System and method for crowd-sourcing mobile messaging spam detection and defense
US9531784B2 (en)2013-12-172016-12-27International Business Machines CorporationIdentity service management in limited connectivity environments
CN103795710A (en)*2014-01-102014-05-14河海大学Method for constructing intrusion detection system based on Cloud Stack
US9361432B2 (en)*2014-01-152016-06-07Hewlett-Packard Development Company, L.P.Configuring a security setting for a set of devices using a security policy
US9294462B2 (en)2014-01-152016-03-22Cisco Technology, Inc.Redirect to inspection proxy using single-sign-on bootstrapping
WO2015130700A1 (en)*2014-02-262015-09-03Secureauth CorporationSecurity object creation, validation, and assertion for single sign on authentication
KR101535502B1 (en)*2014-04-222015-07-09한국인터넷진흥원System and method for controlling virtual network including security function
US10255449B2 (en)2014-05-302019-04-09Apple Inc.Permission request
US20150355946A1 (en)*2014-06-102015-12-10Dan-Chyi Kang“Systems of System” and method for Virtualization and Cloud Computing System
US9734250B2 (en)*2014-07-232017-08-15David KelseyDigital asset management for enterprises
US9516700B1 (en)2014-09-252016-12-06Google Inc.Cloud-based controller for managing access points
US9485221B2 (en)2014-10-232016-11-01International Business Machines CorporationSelective content cloud storage with device synchronization
US9253206B1 (en)*2014-12-182016-02-02Docusign, Inc.Systems and methods for protecting an online service attack against a network-based attack
US10509663B1 (en)2015-02-042019-12-17Amazon Technologies, Inc.Automatic domain join for virtual machine instances
US10114966B2 (en)2015-03-192018-10-30Netskope, Inc.Systems and methods of per-document encryption of enterprise information stored on a cloud computing service (CCS)
US10091270B2 (en)2015-04-222018-10-02SafeNet International LLCMethod and system for allowing cloud-based applications to automatically integrate network enabled sensors during runtime
US9930060B2 (en)2015-06-012018-03-27Duo Security, Inc.Method for enforcing endpoint health standards
US10425447B2 (en)*2015-08-282019-09-24International Business Machines CorporationIncident response bus for data security incidents
CN106487774B (en)2015-09-012019-06-25阿里巴巴集团控股有限公司A kind of cloud host services authority control method, device and system
US10749854B2 (en)2015-11-122020-08-18Microsoft Technology Licensing, LlcSingle sign-on identity management between local and remote systems
CN105610909B (en)*2015-12-212019-01-18北京大学A kind of loaded and optimized method of mobile browser resource cooperateed with based on cloud-end
CN105549661A (en)*2015-12-292016-05-04西安理工大学Facility agriculture cloud service system based on Internet Plus, and control method
US11405423B2 (en)2016-03-112022-08-02Netskope, Inc.Metadata-based data loss prevention (DLP) for cloud resources
ES2728292T3 (en)2016-05-172019-10-23Nolve Dev S L Server and method to provide secure access to network-based services
US10853482B2 (en)2016-06-032020-12-01Honeywell International Inc.Secure approach for providing combined environment for owners/operators and multiple third parties to cooperatively engineer, operate, and maintain an industrial process control and automation system
US10270788B2 (en)2016-06-062019-04-23Netskope, Inc.Machine learning based anomaly detection
WO2018004600A1 (en)2016-06-302018-01-04Sophos LimitedProactive network security using a health heartbeat
US10476907B2 (en)2016-08-102019-11-12Netskope, Inc.Systems and methods of detecting and responding to a data attack on a file system
US10310467B2 (en)2016-08-302019-06-04Honeywell International Inc.Cloud-based control platform with connectivity to remote embedded devices in distributed control system
US10298699B2 (en)2016-09-082019-05-21Microsoft Technology Licensing, LlcPhysical location determination of internal network components
EP3526943A4 (en)*2016-10-122020-05-27Nokia Technologies OyCloud service security management
CN106656987A (en)*2016-11-032017-05-10郑州理工职业学院Computer information security management system
CN108092916A (en)*2016-11-212018-05-29中兴通讯股份有限公司A kind of method, apparatus and routing device of control terminal network data
US11323427B2 (en)2016-12-022022-05-03Carrier CorporationMixed-mode cloud on-premise secure communication
US10966091B1 (en)*2017-05-242021-03-30Jonathan GrierAgile node isolation using packet level non-repudiation for mobile networks
US10834113B2 (en)2017-07-252020-11-10Netskope, Inc.Compact logging of network traffic events
CN108197130A (en)*2017-08-142018-06-22陈玉A kind of method and system of content of pages displaying switching
US10412113B2 (en)2017-12-082019-09-10Duo Security, Inc.Systems and methods for intelligently configuring computer security
CN109981523B (en)*2017-12-272022-02-25中国移动通信集团云南有限公司Multimedia file processing method and device and cloud computing platform
US11237550B2 (en)2018-03-282022-02-01Honeywell International Inc.Ultrasonic flow meter prognostics with near real-time condition based uncertainty analysis
US11140195B2 (en)2018-04-042021-10-05Sophos LimitedSecure endpoint in a heterogenous enterprise network
US11271950B2 (en)2018-04-042022-03-08Sophos LimitedSecuring endpoints in a heterogenous enterprise network
US10673855B2 (en)2018-04-102020-06-02Sap SeConsolidated identity management system provisioning to manage access across landscapes
US11138274B2 (en)*2018-05-032021-10-05Citrix Systems, Inc.Virtualization environment providing user-based search index roaming and related methods
US11087179B2 (en)2018-12-192021-08-10Netskope, Inc.Multi-label classification of text documents
US10986150B2 (en)2019-03-012021-04-20Netskope, Inc.Load balancing in a dynamic scalable services mesh
US12015644B2 (en)*2019-04-112024-06-18Level 3 Communications, LlcSystem and method for utilization of threat data for network security
US11876798B2 (en)*2019-05-202024-01-16Citrix Systems, Inc.Virtual delivery appliance and system with remote authentication and related methods
US11316741B1 (en)2020-11-232022-04-26Netskope, Inc.Multi-environment networking management system
US11558189B2 (en)2020-11-302023-01-17Microsoft Technology Licensing, LlcHandling requests to service resources within a security boundary using a security gateway instance
US11516240B2 (en)2020-12-292022-11-29Capital One Services, LlcDetection of anomalies associated with fraudulent access to a service platform
US11222112B1 (en)2021-02-242022-01-11Netskope, Inc.Signatureless detection of malicious MS office documents containing advanced threats in macros
US11336698B1 (en)2021-04-222022-05-17Netskope, Inc.Synthetic request injection for cloud policy enforcement
US11997127B2 (en)2021-05-072024-05-28Netskope, Inc.Policy based vulnerability identification, correlation, remediation, and mitigation
US11671430B2 (en)2021-05-262023-06-06Netskope, Inc.Secure communication session using encryption protocols and digitally segregated secure tunnels
US11790121B2 (en)*2021-07-232023-10-17Haier Us Appliance Solutions, Inc.System and method for detecting appliance tampering
US11475158B1 (en)2021-07-262022-10-18Netskope, Inc.Customized deep learning classifier for detecting organization sensitive data in images on premises
US11392705B1 (en)2021-07-292022-07-19Netskope, Inc.Disk encryption key management for booting of a device
US11528279B1 (en)2021-11-122022-12-13Netskope, Inc.Automatic user directory synchronization and troubleshooting
CN114625074A (en)*2021-11-262022-06-14中国大唐集团科学技术研究院有限公司火力发电技术研究院 A safety protection system and method for DCS system of thermal power unit
US11553008B1 (en)2021-12-302023-01-10Netskope, Inc.Electronic agent scribe and communication protections
US12166782B2 (en)2022-12-052024-12-10Netskope, Inc.Policy-based IP address allocation
US11847486B1 (en)2023-01-312023-12-19Netskope, Inc.Capacity resolver for point of presence (POP) systems
US12315231B2 (en)2023-08-162025-05-27Netskope, Inc.Image classification and accelerated classification training using deep learning image fingerprinting models and indexed embeddings
US12243294B1 (en)2023-08-162025-03-04Netskope, Inc.Image fingerprinting conversion between different image fingerprinting models
US12238177B1 (en)2024-01-262025-02-25Netskope, Inc.Mid-link forensic system for remote application environment
US12197590B1 (en)2024-01-292025-01-14Netskope, Inc.Hierarchical risk scoring for SaaS applications
US12166776B1 (en)2024-01-312024-12-10Netskope, Inc.Middle-ware artificial intelligence (AI) engine
US12316647B1 (en)2024-01-312025-05-27Netskope, Inc.Video data loss prevention (vDLP)
US12244637B1 (en)2024-02-092025-03-04Netskope, Inc.Machine learning powered cloud sandbox for malware detection
US12266209B1 (en)2024-02-262025-04-01Netskope, Inc.Image classifier automated testing and outlier detection
US12255877B1 (en)2024-05-102025-03-18Netskope, Inc.Cloud packet tap
US12278845B1 (en)2024-05-212025-04-15Netskope, Inc.Security and privacy inspection of bidirectional generative artificial intelligence traffic using API notifications
US12282545B1 (en)2024-05-212025-04-22Netskope, Inc.Efficient training data generation for training machine learning models for security and privacy inspection of bidirectional generative artificial intelligence traffic
US12284222B1 (en)2024-05-212025-04-22Netskope, Inc.Security and privacy inspection of bidirectional generative artificial intelligence traffic using a reverse proxy
US12273392B1 (en)2024-05-212025-04-08Netskope, Inc.Security and privacy inspection of bidirectional generative artificial intelligence traffic using a forward proxy
US12245036B1 (en)2024-07-102025-03-04Netskope, Inc.Global secure SIM clientless SASE architecture for cellular devices
US12219360B1 (en)2024-07-242025-02-04Netskope, Inc.Cellular IoT security using dynamic policy-driven mechanisms for threat mitigation
US12361680B1 (en)2024-08-152025-07-15Netskope, Inc.Webpage categorization based on image classification of webpage screen capture

Citations (75)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5987610A (en)*1998-02-121999-11-16Ameritech CorporationComputer virus screening methods and systems
US6052788A (en)*1996-10-172000-04-18Network Engineering Software, Inc.Firewall providing enhanced network security and user transparency
US6182148B1 (en)*1999-03-182001-01-30Walid, Inc.Method and system for internationalizing domain names
US6347375B1 (en)*1998-07-082002-02-12Ontrack Data International, IncApparatus and method for remote virus diagnosis and repair
US6484203B1 (en)*1998-11-092002-11-19Sri International, Inc.Hierarchical event monitoring and analysis
US20030005152A1 (en)*2001-03-092003-01-02Arif DiwanContent-request redirection method and system
US20030051026A1 (en)*2001-01-192003-03-13Carter Ernst B.Network surveillance and security system
US6535227B1 (en)*2000-02-082003-03-18Harris CorporationSystem and method for assessing the security posture of a network and having a graphical user interface
US20030055994A1 (en)*2001-07-062003-03-20Zone Labs, Inc.System and methods providing anti-virus cooperative enforcement
US20030061506A1 (en)*2001-04-052003-03-27Geoffrey CooperSystem and method for security policy
US20030110392A1 (en)*2001-12-062003-06-12Aucsmith David W.Detecting intrusions
US6650890B1 (en)*2000-09-292003-11-18Postini, Inc.Value-added electronic messaging services and transparent implementation thereof using intermediate server
US20040019656A1 (en)*2001-10-042004-01-29Smith Jeffrey C.System and method for monitoring global network activity
US20040064693A1 (en)*2002-09-262004-04-01Pabla Kuldipsingh A.Distributed indexing of identity information in a peer-to-peer network
US20040073701A1 (en)*2002-07-082004-04-15Yennun HuangPacket routing via payload inspection for quality of service management
US20040093419A1 (en)*2002-10-232004-05-13Weihl William E.Method and system for secure content delivery
US20040103315A1 (en)*2001-06-072004-05-27Geoffrey CooperAssessment tool
US6757740B1 (en)*1999-05-032004-06-29Digital Envoy, Inc.Systems and methods for determining collecting and using geographic locations of internet users
US6760768B2 (en)*1996-07-302004-07-06Micron Technology, Inc.Method and system for establishing a security perimeter in computer networks
US6789202B1 (en)*1999-10-152004-09-07Networks Associates Technology, Inc.Method and apparatus for providing a policy-driven intrusion detection system
US20040193691A1 (en)*2003-03-312004-09-30Chang William I.System and method for providing an open eMail directory
US20040210767A1 (en)*2003-04-152004-10-21Microsoft CorporationSmall-scale secured computer network group without centralized management
US20040254921A1 (en)*1998-06-262004-12-16Edith CohenMethod and apparatus for improving end to end performance of a data network
US20040255167A1 (en)*2003-04-282004-12-16Knight James MichaelMethod and system for remote network security management
US20050010821A1 (en)*2003-04-292005-01-13Geoffrey CooperPolicy-based vulnerability assessment
US6871279B2 (en)*2001-03-202005-03-22Networks Associates Technology, Inc.Method and apparatus for securely and dynamically managing user roles in a distributed system
US6920558B2 (en)*2001-03-202005-07-19Networks Associates Technology, Inc.Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system
US20050177869A1 (en)*2004-02-102005-08-11Savage James A.Firewall permitting access to network based on accessing party identity
US20050195854A1 (en)*2003-12-192005-09-08Gideon AgmonService connection method and architecture
US20050216572A1 (en)*1997-03-272005-09-29Intel CorporationSystem for delivery of dynamic content to a client device
US20050216421A1 (en)*1997-09-262005-09-29Mci. Inc.Integrated business systems for web based telecommunications management
US20060015645A1 (en)*2004-07-132006-01-19Teneros, Inc.Network traffic routing
US20060026683A1 (en)*2004-07-302006-02-02Lim Keng Leng AIntrusion protection system and method
US20060031938A1 (en)*2002-10-222006-02-09Unho ChoiIntegrated emergency response system in information infrastructure and operating method therefor
US7003117B2 (en)*2003-02-052006-02-21Voltage Security, Inc.Identity-based encryption system for secure data distribution
US20060069912A1 (en)*2003-05-302006-03-30Yuliang ZhengSystems and methods for enhanced network security
US20060075467A1 (en)*2004-06-282006-04-06Sanda Frank SSystems and methods for enhanced network access
US7043563B2 (en)*2000-04-172006-05-09Circadence CorporationMethod and system for redirection to arbitrary front-ends in a communication system
US20060107036A1 (en)*2002-10-252006-05-18Randle William MSecure service network and user gateway
US7058970B2 (en)*2002-02-272006-06-06Intel CorporationOn connect security scan and delivery by a network security authority
US7096215B2 (en)*2000-06-152006-08-22International Business Machines CorporationVirus checking and reporting for computer database search results
US7124438B2 (en)*2002-03-082006-10-17Ciphertrust, Inc.Systems and methods for anomaly detection in patterns of monitored communications
US20070033641A1 (en)*2005-07-072007-02-08Acenet Technology Inc.Distributed Network Security System
US7178166B1 (en)*2000-09-192007-02-13Internet Security Systems, Inc.Vulnerability assessment and authentication of a computer by a local scanner
US20070039053A1 (en)*2005-08-032007-02-15Aladdin Knowledge Systems Ltd.Security server in the cloud
US20070067847A1 (en)*2005-09-222007-03-22AlcatelInformation system service-level security risk analysis
US7221935B2 (en)*2002-02-282007-05-22Telefonaktiebolaget Lm Ericsson (Publ)System, method and apparatus for federated single sign-on services
US20070118879A1 (en)*2005-09-202007-05-24Lg Electronics Inc.Security protocol model for ubiquitous networks
US20070130457A1 (en)*2005-12-022007-06-07Kamat Sanjay DMethod and apparatus for providing secure remote access to enterprise networks
US20070150934A1 (en)*2005-12-222007-06-28Nortel Networks Ltd.Dynamic Network Identity and Policy management
US20070198432A1 (en)*2001-01-192007-08-23Pitroda Satyan GTransactional services
US20070194097A1 (en)*2006-02-232007-08-23Rockwell Automation Technologies, Inc.Data acquisition and processing system for risk assessment
US7287271B1 (en)*1997-04-082007-10-23Visto CorporationSystem and method for enabling secure access to services in a computer network
US20070250920A1 (en)*2006-04-242007-10-25Jeffrey Dean LindsaySecurity Systems for Protecting an Asset
US20070283416A1 (en)*2006-05-042007-12-06Martin RenaudSystem and method of enhancing user authentication using response parameters
US20080005780A1 (en)*2001-10-022008-01-03Singleton Richard BMaster security policy server
US7318237B2 (en)*1998-10-282008-01-08Bea Systems, Inc.System and method for maintaining security in a distributed computer network
US20080028445A1 (en)*2006-07-312008-01-31Fortinet, Inc.Use of authentication information to make routing decisions
US20080034425A1 (en)*2006-07-202008-02-07Kevin OvercashSystem and method of securing web applications across an enterprise
US7346923B2 (en)*2003-11-212008-03-18International Business Machines CorporationFederated identity management within a distributed portal server
US20080072301A1 (en)*2004-07-092008-03-20Matsushita Electric Industrial Co., Ltd.System And Method For Managing User Authentication And Service Authorization To Achieve Single-Sign-On To Access Multiple Network Interfaces
US7370364B2 (en)*2000-07-312008-05-06Ellacoya Networks, Inc.Managing content resources
US20080127333A1 (en)*2006-08-042008-05-29Gabriel Raffi TVerification Authentication System and Method
US20080123854A1 (en)*2006-11-272008-05-29Christian PeelMethod and system for content management in a secure communication system
US7383433B2 (en)*2001-07-312008-06-03Sun Microsystems, Inc.Trust spectrum for certificate distribution in distributed peer-to-peer networks
US20080159313A1 (en)*2006-12-282008-07-03Nokia CorporationInterworking policy and charging control and network address translator
US20080229385A1 (en)*2007-01-312008-09-18Feder Peretz MMobility Aware Policy and Charging Control in a Wireless Communication Network
US20090019156A1 (en)*2007-04-042009-01-15Zte CorporationSystem and Method of Providing Services via a Peer-To-Peer-Based Next Generation Network
US7496658B2 (en)*2003-07-082009-02-24Hewlett-Packard Development Company, L.P.Systems and methods for testing network services
US20090086742A1 (en)*2007-08-242009-04-02Rajat GhaiProviding virtual services with an enterprise access gateway
US7562382B2 (en)*2004-12-162009-07-14International Business Machines CorporationSpecializing support for a federation relationship
US7594224B2 (en)*2003-10-102009-09-22Bea Systems, Inc.Distributed enterprise security system
US20100106599A1 (en)*2007-06-262010-04-29Tyler KohnSystem and method for providing targeted content
US7761923B2 (en)*2004-03-012010-07-20Invensys Systems, Inc.Process control methods and apparatus for intrusion detection, protection and network hardening
US7899849B2 (en)*2008-05-282011-03-01Zscaler, Inc.Distributed security provisioning

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6119235A (en)1997-05-272000-09-12Ukiah Software, Inc.Method and apparatus for quality of service management

Patent Citations (77)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6760768B2 (en)*1996-07-302004-07-06Micron Technology, Inc.Method and system for establishing a security perimeter in computer networks
US6052788A (en)*1996-10-172000-04-18Network Engineering Software, Inc.Firewall providing enhanced network security and user transparency
US20050216572A1 (en)*1997-03-272005-09-29Intel CorporationSystem for delivery of dynamic content to a client device
US7287271B1 (en)*1997-04-082007-10-23Visto CorporationSystem and method for enabling secure access to services in a computer network
US20050216421A1 (en)*1997-09-262005-09-29Mci. Inc.Integrated business systems for web based telecommunications management
US5987610A (en)*1998-02-121999-11-16Ameritech CorporationComputer virus screening methods and systems
US20040254921A1 (en)*1998-06-262004-12-16Edith CohenMethod and apparatus for improving end to end performance of a data network
US6347375B1 (en)*1998-07-082002-02-12Ontrack Data International, IncApparatus and method for remote virus diagnosis and repair
US7318237B2 (en)*1998-10-282008-01-08Bea Systems, Inc.System and method for maintaining security in a distributed computer network
US6484203B1 (en)*1998-11-092002-11-19Sri International, Inc.Hierarchical event monitoring and analysis
US6182148B1 (en)*1999-03-182001-01-30Walid, Inc.Method and system for internationalizing domain names
US6757740B1 (en)*1999-05-032004-06-29Digital Envoy, Inc.Systems and methods for determining collecting and using geographic locations of internet users
US6789202B1 (en)*1999-10-152004-09-07Networks Associates Technology, Inc.Method and apparatus for providing a policy-driven intrusion detection system
US6535227B1 (en)*2000-02-082003-03-18Harris CorporationSystem and method for assessing the security posture of a network and having a graphical user interface
US7043563B2 (en)*2000-04-172006-05-09Circadence CorporationMethod and system for redirection to arbitrary front-ends in a communication system
US7096215B2 (en)*2000-06-152006-08-22International Business Machines CorporationVirus checking and reporting for computer database search results
US7370364B2 (en)*2000-07-312008-05-06Ellacoya Networks, Inc.Managing content resources
US7178166B1 (en)*2000-09-192007-02-13Internet Security Systems, Inc.Vulnerability assessment and authentication of a computer by a local scanner
US6650890B1 (en)*2000-09-292003-11-18Postini, Inc.Value-added electronic messaging services and transparent implementation thereof using intermediate server
US20070198432A1 (en)*2001-01-192007-08-23Pitroda Satyan GTransactional services
US20030051026A1 (en)*2001-01-192003-03-13Carter Ernst B.Network surveillance and security system
US20030005152A1 (en)*2001-03-092003-01-02Arif DiwanContent-request redirection method and system
US6920558B2 (en)*2001-03-202005-07-19Networks Associates Technology, Inc.Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system
US6871279B2 (en)*2001-03-202005-03-22Networks Associates Technology, Inc.Method and apparatus for securely and dynamically managing user roles in a distributed system
US20030061506A1 (en)*2001-04-052003-03-27Geoffrey CooperSystem and method for security policy
US20040103315A1 (en)*2001-06-072004-05-27Geoffrey CooperAssessment tool
US20030055994A1 (en)*2001-07-062003-03-20Zone Labs, Inc.System and methods providing anti-virus cooperative enforcement
US7383433B2 (en)*2001-07-312008-06-03Sun Microsystems, Inc.Trust spectrum for certificate distribution in distributed peer-to-peer networks
US20080005780A1 (en)*2001-10-022008-01-03Singleton Richard BMaster security policy server
US20040019656A1 (en)*2001-10-042004-01-29Smith Jeffrey C.System and method for monitoring global network activity
US20030110392A1 (en)*2001-12-062003-06-12Aucsmith David W.Detecting intrusions
US7058970B2 (en)*2002-02-272006-06-06Intel CorporationOn connect security scan and delivery by a network security authority
US7221935B2 (en)*2002-02-282007-05-22Telefonaktiebolaget Lm Ericsson (Publ)System, method and apparatus for federated single sign-on services
US7124438B2 (en)*2002-03-082006-10-17Ciphertrust, Inc.Systems and methods for anomaly detection in patterns of monitored communications
US20040073701A1 (en)*2002-07-082004-04-15Yennun HuangPacket routing via payload inspection for quality of service management
US20040064693A1 (en)*2002-09-262004-04-01Pabla Kuldipsingh A.Distributed indexing of identity information in a peer-to-peer network
US20060031938A1 (en)*2002-10-222006-02-09Unho ChoiIntegrated emergency response system in information infrastructure and operating method therefor
US20040093419A1 (en)*2002-10-232004-05-13Weihl William E.Method and system for secure content delivery
US20060107036A1 (en)*2002-10-252006-05-18Randle William MSecure service network and user gateway
US7003117B2 (en)*2003-02-052006-02-21Voltage Security, Inc.Identity-based encryption system for secure data distribution
US20040193691A1 (en)*2003-03-312004-09-30Chang William I.System and method for providing an open eMail directory
US20040210767A1 (en)*2003-04-152004-10-21Microsoft CorporationSmall-scale secured computer network group without centralized management
US20040255167A1 (en)*2003-04-282004-12-16Knight James MichaelMethod and system for remote network security management
US7451488B2 (en)*2003-04-292008-11-11Securify, Inc.Policy-based vulnerability assessment
US20050010821A1 (en)*2003-04-292005-01-13Geoffrey CooperPolicy-based vulnerability assessment
US20060069912A1 (en)*2003-05-302006-03-30Yuliang ZhengSystems and methods for enhanced network security
US7496658B2 (en)*2003-07-082009-02-24Hewlett-Packard Development Company, L.P.Systems and methods for testing network services
US7594224B2 (en)*2003-10-102009-09-22Bea Systems, Inc.Distributed enterprise security system
US7603548B2 (en)*2003-10-102009-10-13Bea Systems, Inc.Security provider development model
US7346923B2 (en)*2003-11-212008-03-18International Business Machines CorporationFederated identity management within a distributed portal server
US20050195854A1 (en)*2003-12-192005-09-08Gideon AgmonService connection method and architecture
US20050177869A1 (en)*2004-02-102005-08-11Savage James A.Firewall permitting access to network based on accessing party identity
US7761923B2 (en)*2004-03-012010-07-20Invensys Systems, Inc.Process control methods and apparatus for intrusion detection, protection and network hardening
US20060075467A1 (en)*2004-06-282006-04-06Sanda Frank SSystems and methods for enhanced network access
US20080072301A1 (en)*2004-07-092008-03-20Matsushita Electric Industrial Co., Ltd.System And Method For Managing User Authentication And Service Authorization To Achieve Single-Sign-On To Access Multiple Network Interfaces
US20060015645A1 (en)*2004-07-132006-01-19Teneros, Inc.Network traffic routing
US20060026683A1 (en)*2004-07-302006-02-02Lim Keng Leng AIntrusion protection system and method
US7562382B2 (en)*2004-12-162009-07-14International Business Machines CorporationSpecializing support for a federation relationship
US20070033641A1 (en)*2005-07-072007-02-08Acenet Technology Inc.Distributed Network Security System
US20070039053A1 (en)*2005-08-032007-02-15Aladdin Knowledge Systems Ltd.Security server in the cloud
US20070118879A1 (en)*2005-09-202007-05-24Lg Electronics Inc.Security protocol model for ubiquitous networks
US20070067847A1 (en)*2005-09-222007-03-22AlcatelInformation system service-level security risk analysis
US20070130457A1 (en)*2005-12-022007-06-07Kamat Sanjay DMethod and apparatus for providing secure remote access to enterprise networks
US20070150934A1 (en)*2005-12-222007-06-28Nortel Networks Ltd.Dynamic Network Identity and Policy management
US20070194097A1 (en)*2006-02-232007-08-23Rockwell Automation Technologies, Inc.Data acquisition and processing system for risk assessment
US20070250920A1 (en)*2006-04-242007-10-25Jeffrey Dean LindsaySecurity Systems for Protecting an Asset
US20070283416A1 (en)*2006-05-042007-12-06Martin RenaudSystem and method of enhancing user authentication using response parameters
US20080034425A1 (en)*2006-07-202008-02-07Kevin OvercashSystem and method of securing web applications across an enterprise
US20080028445A1 (en)*2006-07-312008-01-31Fortinet, Inc.Use of authentication information to make routing decisions
US20080127333A1 (en)*2006-08-042008-05-29Gabriel Raffi TVerification Authentication System and Method
US20080123854A1 (en)*2006-11-272008-05-29Christian PeelMethod and system for content management in a secure communication system
US20080159313A1 (en)*2006-12-282008-07-03Nokia CorporationInterworking policy and charging control and network address translator
US20080229385A1 (en)*2007-01-312008-09-18Feder Peretz MMobility Aware Policy and Charging Control in a Wireless Communication Network
US20090019156A1 (en)*2007-04-042009-01-15Zte CorporationSystem and Method of Providing Services via a Peer-To-Peer-Based Next Generation Network
US20100106599A1 (en)*2007-06-262010-04-29Tyler KohnSystem and method for providing targeted content
US20090086742A1 (en)*2007-08-242009-04-02Rajat GhaiProviding virtual services with an enterprise access gateway
US7899849B2 (en)*2008-05-282011-03-01Zscaler, Inc.Distributed security provisioning

Cited By (30)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8910255B2 (en)2008-05-272014-12-09Microsoft CorporationAuthentication for distributed secure content management system
US20090300739A1 (en)*2008-05-272009-12-03Microsoft CorporationAuthentication for distributed secure content management system
WO2010025007A2 (en)2008-08-282010-03-04Microsoft CorporationProtecting a virtual guest machine from attacks by an infected host
US9191369B2 (en)2009-07-172015-11-17Aryaka Networks, Inc.Application acceleration as a service system and method
US9832170B2 (en)2009-07-172017-11-28Aryaka Networks, Inc.Application acceleration as a service system and method
US20110119104A1 (en)*2009-11-172011-05-19Xerox CorporationIndividualized behavior-based service bundling and pricing
US10243925B2 (en)2009-12-122019-03-26Akamai Technologies, Inc.Cloud based firewell system and service
US20110162033A1 (en)*2009-12-282011-06-30International Business Machines CorporationLocation based security over wireless networks
US20110264804A1 (en)*2010-03-232011-10-27Mario VuksanCloud-based web content filtering
US9323835B2 (en)*2010-03-232016-04-26Reversing Labs International GmbhCloud-based web content filtering
US20110289054A1 (en)*2010-05-192011-11-24Southern Company ServicesContent Management Migration Manager System and Method
US9609460B2 (en)2011-03-182017-03-28Zscaler, Inc.Cloud based mobile device security and policy enforcement
US9119017B2 (en)*2011-03-182015-08-25Zscaler, Inc.Cloud based mobile device security and policy enforcement
US11716359B2 (en)2011-03-182023-08-01Zscaler, Inc.Mobile device security, device management, and policy enforcement in a cloud-based system
US11489878B2 (en)2011-03-182022-11-01Zscaler, Inc.Mobile device security, device management, and policy enforcement in a cloud-based system
US20120240183A1 (en)*2011-03-182012-09-20Amit SinhaCloud based mobile device security and policy enforcement
US11134106B2 (en)2011-03-182021-09-28Zscaler, Inc.Mobile device security, device management, and policy enforcement in a cloud-based system
US10523710B2 (en)2011-03-182019-12-31Zscaler, Inc.Mobile device security, device management, and policy enforcement in a cloud based system
US10749907B2 (en)2011-03-182020-08-18Zscaler, Inc.Mobile device security, device management, and policy enforcement in a cloud based system
US9037797B2 (en)2011-05-242015-05-19International Business Machines CorporationIntelligent caching
US9928375B2 (en)2011-06-132018-03-27International Business Machines CorporationMitigation of data leakage in a multi-site computing infrastructure
US9160761B2 (en)2013-07-312015-10-13Hewlett-Packard Development Company, L.P.Selection of a countermeasure
EP2899940B1 (en)*2014-01-232020-06-03Vodafone GmbHConnection method for secure connecting of a mobile device system to a network
CN104504330A (en)*2014-12-122015-04-08北京奇虎科技有限公司Virtual safety detecting method and system
US10728252B2 (en)2016-01-292020-07-28Zscaler, Inc.Client application based access control in cloud security systems for mobile devices
US10044719B2 (en)2016-01-292018-08-07Zscaler, Inc.Client application based access control in cloud security systems for mobile devices
US11297058B2 (en)2016-03-282022-04-05Zscaler, Inc.Systems and methods using a cloud proxy for mobile device management and policy
US10498605B2 (en)2016-06-022019-12-03Zscaler, Inc.Cloud based systems and methods for determining and visualizing security risks of companies, users, and groups
US10142362B2 (en)2016-06-022018-11-27Zscaler, Inc.Cloud based systems and methods for determining security risks of users and groups
CN111131230A (en)*2019-12-232020-05-08合肥学院 A big data analysis system using computer verification code technology

Also Published As

Publication numberPublication date
US20090178108A1 (en)2009-07-09
US20090177514A1 (en)2009-07-09
US8935742B2 (en)2015-01-13
US20090178132A1 (en)2009-07-09
US8296178B2 (en)2012-10-23
US20090178109A1 (en)2009-07-09
US8910268B2 (en)2014-12-09
US8881223B2 (en)2014-11-04

Similar Documents

PublicationPublication DateTitle
US8296178B2 (en)Services using globally distributed infrastructure for secure content management
US12341814B2 (en)Implementing decoys in a network environment
US10979391B2 (en)Cyber threat attenuation using multi-source threat data analysis
US9942270B2 (en)Database deception in directory services
US9185127B2 (en)Network protection service
US10397273B1 (en)Threat intelligence system
US8484726B1 (en)Key security indicators
US9609019B2 (en)System and method for directing malicous activity to a monitoring system
US8413238B1 (en)Monitoring darknet access to identify malicious activity
US8181250B2 (en)Personalized honeypot for detecting information leaks and security breaches
EP2837131B1 (en)System and method for determining and using local reputations of users and hosts to protect information in a network environment
EP2387746B1 (en)Methods and systems for securing and protecting repositories and directories
Chanti et al.A literature review on classification of phishing attacks
US8763120B1 (en)Exploitation detection
US12003537B2 (en)Mitigating phishing attempts
WO2016081561A1 (en)System and method for directing malicious activity to a monitoring system
US20230319093A1 (en)Containerized network activity filtering
KaramanosInvestigation of home router security
Li et al.IPv6: a catalyst and evasion tool for botnets and malware delivery networks
Chapin et al.Malware Landscape 2022
WO2025174601A1 (en)Enabling device context awareness, data ingestion and real-time actions in mobile networks
GB2618655A (en)Containerized network activity filtering
Hellberg et al.German Cities Exposed

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:MICROSOFT CORPORATION, WASHINGTON

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HUDIS, EFIM;EDERY, YIGAL;ANANIEV, OLEG;AND OTHERS;REEL/FRAME:022200/0408;SIGNING DATES FROM 20080906 TO 20080915

ASAssignment

Owner name:MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034564/0001

Effective date:20141014

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp