6,199,204* |
DISTRIBUTION OF SOFTWARE UPDATES VIA A COMPUTER NETWORK |
6,202,207* |
METHOD AND A MECHANISM FOR SYNCHRONIZED UPDATING OF INTEROPERATING SOFTWARE |
6,314,428* |
METHOD AND APPARATUS FOR APPLICATION MANAGEMENT IN COMPUTER NETWORKS |
6,584,569* |
SYSTEM FOR DETERMINING WEB APPLICATION VULNERABILITIES |
6,779,021 |
METHOD AND SYSTEM FOR PREDICTING AND MANAGING UNDESIRABLE ELECTRONIC MAIL |
6,785,732 |
WEB SERVER APPARATUS AND METHOD FOR VIRUS CHECKING |
6,826,716 |
TEST PROGRAMS FOR ENTERPRISE WEB APPLICATIONS |
6,907,531 |
METHOD AND SYSTEMS FOR IDENTIFYING, FIXING, AND UPDATING SECURITY VULNERABILITIES |
7,084,760 |
SYSTEM, METHOD, AND PROGRAM PRODUCT FOR MANAGING AN INTRUSION DETECTION SYSTEM |
7,140,041 |
DETECTING DISSEMINATION OF MALICIOUS PROGRAMS |
7,177,937* |
WEB SERVER APPARATUS AND METHOD FOR VIRUS CHECKING |
7,237,265* |
SYSTEM FOR DETERMINING WEB APPLICATION VULNERABILITIES |
7,340,776 |
METHOD AND SYSTEM FOR CONFIGURING AND SCHEDULING SECURITY AUDITS OF A COMPUTER NETWORK |
7,346,929* |
METHOD AND APPARATUS FOR AUDITING NETWORK SECURITY |
7,437,760 |
ANTIVIRAL NETWORK SYSTEM |
7,475,427 |
APPARATUS, METHODS AND COMPUTER PROGRAMS FOR IDENTIFYING OR MANAGING VULNERABILITIES WITHIN A DATA PROCESSING NETWORK |
7,487,543 |
METHOD AND APPARATUS FOR THE AUTOMATIC DETERMINATION OF POTENTIALLY WORM-LIKE BEHAVIOR OF A PROGRAM |
7,490,354 |
VIRUS DETECTION IN A NETWORK |
7,739,739 |
ANTIVIRAL NETWORK SYSTEM |
7,770,225* |
METHOD AND APPARATUS FOR AUDITING NETWORK SECURITY |
7,779,474 |
VIRUS DETECTION IN A NETWORK |
7,895,340 |
WEB SERVER APPARATUS AND METHOD FOR VIRUS CHECKING |
7,945,957 |
ANTIVIRAL NETWORK SYSTEM |
7,996,905 |
METHOD AND APPARATUS FOR THE AUTOMATIC DETERMINATION OF POTENTIALLY WORM-LIKE BEHAVIOR OF A PROGRAM |
8,006,289 |
METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODS |
8,261,354 |
SYSTEM, METHOD AND PROGRAM PRODUCT FOR DYNAMICALLY PERFORMING AN AUDIT AND SECURITY COMPLIANCE VALIDATION IN AN OPERATING ENVIRONMENT |
8,381,242 |
STATIC ANALYSIS FOR VERIFICATION OF SOFTWARE PROGRAM ACCESS TO SECURE RESOURCES FOR COMPUTER SYSTEMS |
8,458,793 |
METHODS, COMPUTER PROGRAM PRODUCTS AND DATA STRUCTURES FOR INTRUSION DETECTION, INTRUSION RESPONSE AND VULNERABILITY REMEDIATION ACROSS TARGET COMPUTER SYSTEMS |
8,495,357 |
DATA SECURITY POLICY ENFORCEMENT |
8,510,842 |
PINPOINTING SECURITY VULNERABILITIES IN COMPUTER SOFTWARE APPLICATIONS |
8,572,750 |
WEB APPLICATION EXPLOIT MITIGATION IN AN INFORMATION TECHNOLOGY ENVIRONMENT |
8,640,252 |
OBFUSCATING ENTRY OF SENSITIVE INFORMATION |
8,646,086 |
IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT |
8,683,599 |
STATIC ANALYSIS FOR VERIFICATION OF SOFTWARE PROGRAM ACCESS TO SECURE RESOURCES FOR COMPUTER SYSTEMS |
8,694,786 |
VIRTUAL MACHINE IMAGES ENCRYPTION USING TRUSTED COMPUTING GROUP SEALING |
8,695,098 |
DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS |
8,752,182 |
PINPOINTING SECURITY VULNERABILITIES IN COMPUTER SOFTWARE APPLICATIONS |
8,782,351 |
PROTECTING MEMORY OF A VIRTUAL GUEST |
8,788,763 |
PROTECTING MEMORY OF A VIRTUAL GUEST |
8,793,800 |
STATIC ANALYSIS FOR VERIFICATION OF SOFTWARE PROGRAM ACCESS TO SECURE RESOURCES FOR COMPUTER SYSTEMS |
8,800,047 |
SYSTEM, METHOD AND PROGRAM PRODUCT FOR DYNAMICALLY PERFORMING AN AUDIT AND SECURITY COMPLIANCE VALIDATION IN AN OPERATING ENVIRONMENT |
8,910,291 |
BLACK-BOX TESTING OF WEB APPLICATIONS WITH CLIENT-SIDE CODE EVALUATION |
8,935,794 |
VERIFYING APPLICATION SECURITY VULNERABILITIES |
8,943,599 |
CERTIFYING SERVER SIDE WEB APPLICATIONS AGAINST SECURITY VULNERABILITIES |
8,949,995 |
CERTIFYING SERVER SIDE WEB APPLICATIONS AGAINST SECURITY VULNERABILITIES |
8,955,094 |
USER SESSION MANAGEMENT FOR WEB APPLICATIONS |
8,984,642 |
DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS |
9,003,480 |
CLASSIFYING FILES ON A MOBILE COMPUTER DEVICE |
9,032,528 |
BLACK-BOX TESTING OF WEB APPLICATIONS WITH CLIENT-SIDE CODE EVALUATION |
9,032,529 |
DETECTING VULNERABILITIES IN WEB APPLICATIONS |
9,094,446 |
IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT |
9,124,624 |
DETECTING VULNERABILITIES IN WEB APPLICATIONS |
9,160,756 |
METHOD AND APPARATUS FOR PROTECTING MARKUP LANGUAGE DOCUMENT AGAINST CROSS-SITE SCRIPTING ATTACK |
9,160,762 |
VERIFYING APPLICATION SECURITY VULNERABILITIES |
9,172,717 |
SECURITY-AWARE ADMISSION CONTROL OF REQUESTS IN A DISTRIBUTED SYSTEM |
9,189,625 |
DATA MANAGEMENT OF POTENTIALLY MALICIOUS CONTENT |
9,231,970 |
SECURITY-AWARE ADMISSION CONTROL OF REQUESTS IN A DISTRIBUTED SYSTEM |
9,256,511 |
COMPUTER SOFTWARE APPLICATION SELF-TESTING |
9,264,443 |
BROWSER BASED METHOD OF ASSESSING WEB APPLICATION VULNERABILITY |
9,271,146 |
MOBILE PRIVACY INFORMATION PROXY |
9,317,697 |
PROCESSING OF RESTRICTED ACCESS DATA |
9,460,291 |
DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS |
9,471,787 |
DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS |
9,497,209 |
IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT |
9,530,016 |
USING SOURCE TAINT ANALYSIS TO REDUCE FALSE POSITIVES IN AN ADVANCED PERSISTENT THREAT (APT) PROTECTION SOLUTION |
9,536,085 |
DATA MANAGEMENT OF POTENTIALLY MALICIOUS CONTENT |
9,544,327 |
PRIORITIZING SECURITY FINDINGS IN A SAST TOOL BASED ON HISTORICAL SECURITY ANALYSIS |
9,679,159 |
MOBILE PRIVACY INFORMATION PROXY |
9,762,606 |
IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT |
9,838,412 |
COMPUTER SOFTWARE APPLICATION SELF-TESTING |
9,876,816 |
DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS |
9,882,926 |
DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS |