US8856916B1
|
|
User associated geo-location based reauthorization to protect confidential information
|
US2014068273A1
|
|
Secure app ecosystem with key and data exchange according to enterprise information control policy
|
US8561142B1
|
|
Clustered device access control based on physical and temporal proximity to the user
|
US8505100B1
|
|
User account level anti-malware exclusions
|
US2012254380A1
|
|
Enabling selective policy driven propagation of configuration elements between and among a host and a plurality of guests
|
US9059919B1
|
|
Systems and methods for preserving network settings for use in a pre-boot environment
|
US2012239896A1
|
|
Optimized shrinking of virtual disks
|
US9075497B1
|
|
Enabling selective policy driven seamless user interface presentation between and among a host and a plurality of guests
|
US2012240229A1
|
|
Systems and methods for looking up anti-malware metadata
|
US8938369B1
|
|
Systems and methods for ensuring that critical computing decisions are intentionally made
|
US8610600B1
|
|
Techniques for providing missed arrival notifications
|
US8572730B1
|
|
Systems and methods for revoking digital signatures
|
US8909845B1
|
|
Systems and methods for identifying candidate duplicate memory pages in a virtual environment
|
US8910155B1
|
|
Methods and systems for injecting endpoint management agents into virtual machines
|
US2012096516A1
|
|
Software signing certificate reputation model
|
US8996875B1
|
|
Detecting malware signed with multiple credentials
|
US8656490B1
|
|
Safe and secure access to dynamic domain name systems
|
US8762980B1
|
|
Rolling incremental updates
|
US2012054729A1
|
|
Safely Updating Latent Applications to Reduce Attack Surface
|
US8700896B1
|
|
Techniques for automatic management of file system encryption drivers
|