Patent | Date |
---|
Method and apparatus for detecting and handling evil twin access points Grant 11,432,152 - Elliott , et al. August 30, 2 | 2022-08-30 |
Method And Apparatus For Detecting And Handling Evil Twin Access Points App 20210345112 - Elliott; Scott ;   et al. | 2021-11-04 |
Systems and methods for identifying and performing an action in response to identified malicious network traffic Grant 10,432,658 - Back , et al. O | 2019-10-01 |
Reputation-based method and system for determining a likelihood that a message is undesired Grant 10,193,898 - Gabe Ja | 2019-01-29 |
Location-aware configuration Grant 9,444,682 - Linden , et al. September 13, 2 | 2016-09-13 |
Cluster architecture for network security processing Grant 9,203,865 - Linden , et al. December 1, 2 | 2015-12-01 |
Systems and methods for the rapid deployment of network security devices Grant 9,003,485 - Marvais , et al. April 7, 2 | 2015-04-07 |
Systems and methods for scalable network monitoring Grant 8,977,746 - Hughes , et al. March 10, 2 | 2015-03-10 |
Systems And Methods For Scalable Network Monitoring App 20140289847 - Hughes; Mark D. ;   et al. | 2014-09-25 |
Systems And Methods For Scalable Network Monitoring App 20140289390 - Hughes; Mark D. ;   et al. | 2014-09-25 |
Systems and methods for scalable network monitoring Grant 8,839,402 - Hughes , et al. September 16, 2 | 2014-09-16 |
Systems and methods for the rapid deployment of network security devices Grant 8,799,992 - Marvais , et al. August 5, 2 | 2014-08-05 |
Location-aware Configuration App 20140059188 - Linden; Thomas ;   et al. | 2014-02-27 |
Scalable transparent proxy Grant 8,650,632 - Boscolo , et al. February 11, 2 | 2014-02-11 |
Reputation-based Method And System For Determining A Likelihood That A Message Is Undesired App 20130347108 - Gabe; Christopher John | 2013-12-26 |
Method and system for recognizing desired email Grant 8,572,190 - Alsop , et al. October 29, 2 | 2013-10-29 |
Location-aware configuration Grant 8,560,645 - Linden , et al. October 15, 2 | 2013-10-15 |
Reputation-based method and system for determining a likelihood that a message is undesired Grant 8,527,592 - Gabe September 3, 2 | 2013-09-03 |
Email server system and method Grant 8,504,675 - Walker August 6, 2 | 2013-08-06 |
Cluster Architecture For Network Security Processing App 20130191881 - Linden; Thomas ;   et al. | 2013-07-25 |
Cluster Architecture And Configuration For Network Security Devices App 20130173766 - Linden; Thomas ;   et al. | 2013-07-04 |
System and method for providing security for SIP-based communications Grant 8,464,329 - Fogel June 11, 2 | 2013-06-11 |
Cluster architecture for network security processing Grant 8,392,496 - Linden , et al. March 5, 2 | 2013-03-05 |
Cluster architecture and configuration for network security devices Grant 8,316,113 - Linden , et al. November 20, 2 | 2012-11-20 |
Email Server System And Method App 20120278415 - Walker; Bruce Murray | 2012-11-01 |
Scalable Transparent Proxy App 20120216275 - Boscolo; Christopher ;   et al. | 2012-08-23 |
Method and apparatus for controlling unsolicited messaging Grant 8,223,751 - Gilchrist , et al. July 17, 2 | 2012-07-17 |
Scalable transparent proxy Grant 8,191,132 - Boscolo , et al. May 29, 2 | 2012-05-29 |
Email server system and method Grant 8,176,162 - Walker May 8, 2 | 2012-05-08 |
Method and apparatus for controlling unsolicited messaging in real time messaging networks Grant 8,150,002 - Gilchrist , et al. April 3, 2 | 2012-04-03 |
Replicating message queues between clustered email gateway systems Grant 7,970,844 - Osborne , et al. June 28, 2 | 2011-06-28 |
Tunnel designation system for virtual private networks Grant 7,882,558 - Lin February 1, 2 | 2011-02-01 |
Method and system for detecting undesired email containing image-based messages Grant 7,882,187 - Gammage , et al. February 1, 2 | 2011-02-01 |
System directing flow of packets by-passing policy-based application for processing by policy engine according to action specification in policy cache Grant 7,773,604 - Lin August 10, 2 | 2010-08-10 |
Location-aware Configuration App 20100191837 - Linden; Thomas ;   et al. | 2010-07-29 |
Cluster Architecture and Configuration for Network Security Devices App 20100169446 - Linden; Thomas ;   et al. | 2010-07-01 |
Self-Monitoring Cluster of Network Security Devices App 20100162036 - Linden; Thomas ;   et al. | 2010-06-24 |
Cluster Architecture for Network Security Processing App 20100162383 - Linden; Thomas ;   et al. | 2010-06-24 |
Method And System For Recognizing Desired Email App 20100077052 - Alsop; John ;   et al. | 2010-03-25 |
Method And Apparatus For Controlling Unsolicited Messaging In Real Time Messaging Networks App 20100046723 - Gilchrist; Rod ;   et al. | 2010-02-25 |
Method And Apparatus For Controlling Unsolicited Messaging App 20100046727 - Gilchrist; Rod ;   et al. | 2010-02-25 |
Email Server System And Method App 20100049818 - Walker; Bruce Murray | 2010-02-25 |
Replicating Message Queues Between Clustered Email Gateway Systems App 20090320120 - Osborne; Robert ;   et al. | 2009-12-24 |
Method and system for recognizing desired email Grant 7,627,641 - Aslop , et al. December 1, 2 | 2009-12-01 |
Email server system and method Grant 7,617,305 - Walker November 10, 2 | 2009-11-10 |
Method and apparatus for controlling unsolicited messaging Grant 7,613,172 - Gilchrist , et al. November 3, 2 | 2009-11-03 |
Method and apparatus for controlling unsolicited messaging in real time messaging networks Grant 7,613,923 - Gilchrist , et al. November 3, 2 | 2009-11-03 |
System directing flow of packets by-passing policy-based application for processing by policy engine according to action specification in policy cache Grant 7,420,976 - Lin September 2, 2 | 2008-09-02 |
Remote management of properties, such as properties for establishing a virtual private network Grant 7,237,263 - Boscolo , et al. June 26, 2 | 2007-06-26 |
Tunnel designation system for virtual private networks Grant 7,117,530 - Lin October 3, 2 | 2006-10-03 |
Automatically identifying subnetworks in a network Grant 7,103,679 - Bonn September 5, 2 | 2006-09-05 |
System using stream specification and action specification stored in policy cache to process the flow of data packets by appropriate action processor Grant 7,006,502 - Lin February 28, 2 | 2006-02-28 |
Contacting a computing device outside a local network Grant 6,961,336 - Coggeshall November 1, 2 | 2005-11-01 |
Secure and differentiated delivery of network security information Grant 6,834,350 - Boroughs , et al. December 21, 2 | 2004-12-21 |
Denial-of-service attack blocking with selective passing and flexible monitoring Grant 6,751,668 - Lin , et al. June 15, 2 | 2004-06-15 |
Generalized network security policy templates for implementing similar network security policies across multiple networks Grant 6,738,908 - Bonn , et al. May 18, 2 | 2004-05-18 |
Software programmable calendar queue cache Grant 6,732,199 - Yu , et al. May 4, 2 | 2004-05-04 |
Managing multiple network security devices from a manager device Grant 6,678,827 - Rothermel , et al. January 13, 2 | 2004-01-13 |
Policy engine architecture Grant 6,625,150 - Yu September 23, 2 | 2003-09-23 |
Automatically identifying subnetworks in a network Grant 6,618,755 - Bonn September 9, 2 | 2003-09-09 |
Network packet classification Grant 6,597,661 - Bonn July 22, 2 | 2003-07-22 |
Portion of a display panel or computer screen with an icon image Grant D473,879 - Lee April 29, 2 | 2003-04-29 |
Policy engine using stream classifier and policy binding database to associate data packet with appropriate action processor for processing without involvement of a host processor Grant 6,542,508 - Lin April 1, 2 | 2003-04-01 |