US2021051178A1
|
|
Determination and autocorrection of modified security policies
|
US2021026871A1
|
|
Illuminating data related to application
|
US2021014233A1
|
|
Dynamically enforcing context sensitive network access control policies
|
US2020366648A1
|
|
Configuring hostname based firewall policies
|
US2020342094A1
|
|
Generating rule-based access control policies using a bytecode instrumentation system
|
US2020304477A1
|
|
Fully cloaked network communication model for remediation of traffic analysis based network attacks
|
US2020274781A1
|
|
Device for generating views corresponding to network data flow from source to destination and vice versa and a method thereof
|
US2020257687A1
|
|
Determining session count of unique sessions for requested time periods
|
US2020259780A1
|
|
Method for detecting user migration from enterprise network to non-enterprise network and a device thereof
|
US2020259795A1
|
|
Automatic vpn establishment with split tunnel for remote resources
|
US2020236027A1
|
|
Probe and secure the vulnerable network services using a centralized controller
|
US2020186538A1
|
|
Secure and seamless remote access to enterprise applications with zero user intervention
|
US2020186496A1
|
|
Local peer to peer direct connection in network address translator (nat) and overlay networks
|
US2020127923A1
|
|
System and method of performing load balancing over an overlay network
|
US2020127963A1
|
|
Establishing connection between different overlay networks using edge application gateway
|
US2020112510A1
|
|
Redirecting data packets between overlay network and underlay network
|
US2020112540A1
|
|
Computer implemented system and method for snooping PCP packets
|
US2020099668A1
|
|
Randomized traffic selection for flow deception in ipsec ad-hoc and cloaked networks
|
US2020099671A1
|
|
Peer to peer communication in ad-hoc and cloaked networks
|
US2020076733A1
|
|
Computer implemented system and method for preserving mapping information in IP-options
|