US2021120029A1
|
|
Modeling Application Dependencies to Identify Operational Risk
|
US2020382363A1
|
|
Cloud Security Management
|
US2020382557A1
|
|
Reliability Prediction for Cloud Security Policies
|
US2020382556A1
|
|
Template-Driven Intent-Based Security
|
US2020382560A1
|
|
Validation of Cloud Security Policies
|
US2017180421A1
|
|
Deception using distributed threat detection
|
US2017134422A1
|
|
Deception Techniques Using Policy
|
US2018191779A1
|
|
Flexible Deception Architecture
|
US9787639B1
|
|
Granular segmentation using events
|
US2017223033A1
|
|
Multi-node affinity-based examination for computer network security remediation
|
US2017374032A1
|
|
Autonomic Protection of Critical Network Applications Using Deception Techniques
|
US2017063791A1
|
|
Segmented networks that implement scanning
|
US2016323245A1
|
|
Security session forwarding following virtual machine migration
|
US2017374101A1
|
|
Security policy generation for virtualization, bare-metal server, and cloud computing environments
|
US2018005296A1
|
|
Systems and methods for continually scoring and segmenting open opportunities using client data and product predictors
|
US9560081B1
|
|
Data network microsegmentation
|
US9680852B1
|
|
Recursive multi-layer examination for computer network security remediation
|
US9521115B1
|
|
Security policy generation using container metadata
|
US2016294875A1
|
|
System and method for threat-driven security policy controls
|
US2017168864A1
|
|
Directing data traffic between intra-server virtual machines
|