Method and apparatus for identifying legitimate files using partial hash based cloud reputation
CN104364790A
Systems and methods for implementing multi-factor authentication
CN104364763A
Systems and methods for disaster recovery of multi-tier applications
CN104412228A
Live migration protocols and cluster server failover protocols
CN104335159A
Interval-controlled replication
CN103493034A
Automatic user authentication, online checkout and electronic payments via mobile communication device with imaging system
CN103329106A
Detection and handling of ALUA preferences and state transitions by host
CN103262043A
Method and system of performing a granular restore of a database from a differential backup
CN102576322A
Proxy backup of virtual disk image files on NAS devices
CN102187316A
Backing up and restoring security information for selected database objects
CN101853260A
System and method for detecting e-mail content
CN101398770A
System for and method of migrating one or more virtual machines
CN101374146A
Access to virtual representation of physical computer system based on requirement
CN101360102A
Method for detecting dns redirects or fraudulent local certificates for ssl sites in pharming/phishing schemes by remote validation and using a credential manager and recorded certificate attributes
CN101334791A
Techniques for performing intelligent content indexing
US2006156401A1
Distributed traffic scanning through data stream security tagging
CN1969524A
Method and system for identifying the content of files in a network