Match Document Document Title
US20140096225 MESSAGING SYSTEM FOR HEALTHCARE COMMUNITY  
A messaging system for a health care community includes a private network. Electronic medical records are accessible via the private network. A calendar system includes appointments of patients...
US20110276986 MANAGING A PRINTING DEVICE BEHIND A FIREWALL  
One embodiment is method that receives, at a computer, a request to manage a printing device located behind a firewall that blocks the request. The request is executed with an agent authorized to...
US20140380454 WHITE-LIST FIREWALL BASED ON THE DOCUMENT OBJECT MODEL  
Some embodiments provide firewalls and methods for guarding against attacks by leveraging the Document Object Model (DOM). The firewall renders the DOM tree to produce a white-list rendering of...
US20110225645 BASIC ARCHITECTURE FOR SECURE INTERNET COMPUTERS  
Hardware or firmware-based firewalls or other access barriers are disclosed. The firewalls or access barriers establish one or more private units disconnected from a public unit that is connected...
US20100325588 SYSTEMS AND METHODS FOR PROVIDING A VISUALIZER FOR RULES OF AN APPLICATION FIREWALL  
The present invention is directed towards systems and methods for generating a representation a plurality of learned rules from a learning engine of an application firewall. The representation may...
US20140331304 METHOD AND SYSTEM FOR MITIGATION OF DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS  
A system and method for mitigating the effects of malicious internet traffic, including DDOS attacks, by utilizing a DNS Traffic Analyzer and Firewall to analyze network traffic intended for a DNS...
US20140173712 NETWORK SECURITY SYSTEM WITH CUSTOMIZABLE RULE-BASED ANALYTICS ENGINE FOR IDENTIFYING APPLICATION LAYER VIOLATIONS  
Methods, devices, and storage media storing instructions to obtain logs from a security device and one or multiple service-providing devices, wherein the logs include information pertaining to...
US20110131644 NETWORK SECURITY SYSTEM HAVING A DEVICE PROFILER COMMUNICATIVELY COUPLED TO A TRAFFIC MONITOR  
A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives....
US20100138902 STANDING ORDER DATABASE SEARCH SYSTEM AND METHOD FOR INTERNET AND INTRANET APPLICATION  
An internet and/or intranet based database search system and method for conducting searches of highly confidential records such as individual patient medical records and to automate the process of...
US20110296516 INTEGRATED FIREWALL, IPS, AND VIRUS SCANNER SYSTEM AND METHOD  
A system, method and computer program product are provided including a router and a security sub-system coupled to the router. Such security sub-system includes a plurality of virtual firewalls, a...
US20120030747 Computers and microchips with at least one internal hardware firewall and at least two microprocessors or processing units outside the at least one firewall  
A computer, comprising: at least one internal hardware firewall; at least two microprocessors being located outside of the at least one internal hardware firewall; and the at least two...
US20100333165 FIREWALL CONFIGURED WITH DYNAMIC MEMBERSHIP SETS REPRESENTING MACHINE ATTRIBUTES  
A method is provided to control the flow of packets within a system that includes one or more computer networks comprising: policy rules are provided that set forth attribute dependent conditions...
US20120216272 ROUTING VOIP CALLS THROUGH MULTIPLE SECURITY ZONES  
Call setup signaling is performed across at least a first security zone, a second security zone, and a third security zone to set up a call. At least one gate is then established between the first...
US20150229638 MOBILE CLOUD SERVICE ARCHITECTURE  
Techniques are described for implementing a cloud computer system to facilitate communication between a computing device (e.g., a mobile computing device) and enterprise computer systems. In...
US20110314536 System and Method for Testing Functionality of a Firewall  
Described are computer-based methods and apparatuses, including computer program products, for testing functionality of a firewall. The testing the functionality of the firewall can include a...
US20100313260 METHOD AND SYSTEM OF PROVIDING FIREWALL IN HANDSET  
A method of providing firewall in handset is disclosed. The method includes receiving a request with a telephone number by a handset. The handset determines if the telephone number meets a...
US20150020187 SYSTEM AND METHOD FOR DETECTING A COMPROMISED COMPUTING SYSTEM  
A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an undetected and/or unknown digital...
US20110010768 Method and Apparatuses for End-to-Edge Media Protection in ANIMS System  
An IMS system includes an IMS initiator user entity. The system includes an IMS responder user entity that is called by the initiator user entity. The system includes a calling side S-CSCF in...
US20120210416 LOAD BALANCING IN A NETWORK WITH SESSION INFORMATION  
Methods and systems for balancing load among firewall security devices are provided. According to one embodiment, a switch maintains a session table the session entries of which represent...
US20130298220 SYSTEM AND METHOD FOR MANAGING FILTERING INFORMATION OF ATTACK TRAFFIC  
The present disclosure relates to a system and a method for managing filtering information of attack traffic, and more particularly, to a system and a method for managing filtering information of...
US20070226788 Flexible network security system and method for permitting trusted process  
Disclosed herein is a flexible network security system and method for permitting a trusted process. The system includes a port monitoring unit for extracting information about a server port being...
US20130055374 System and Method for Denial of Service Attack Mitigation Using Cloud Services  
A method to mitigate attack by an upstream service provider using cloud mitigation services. An edge detection device, which located at the subscriber's network edge, is able to communicate...
US20110252468 METHOD AND SYSTEM FOR PROTECTING A COMPUTER AGAINTS MALICIOUS SOFTWARE  
A method of protecting a computer by having security software be set to clean mode where the clean mode acts as if files installed or modified before the clean date are safe and installed or...
US20110231926 BASIC ARCHITECTURE FOR SECURE INTERNET COMPUTERS  
A method or apparatus for a computer or microchip with one or more inner hardware-based access barriers or firewalls that establish one or more private units disconnected from a public unit having...
US20150180892 COUNTERING SECURITY THREATS WITH THE DOMAIN NAME SYSTEM  
Described herein are methods, systems, and apparatus in which the functionality of a DNS server is modified to take into account security intelligence when determining an answer to return in...
US20150101021 HYBRID SYNCHRONIZATION BETWEEN CLOUD AND ON-PREMISE SYSTEMS IN A CONTENT MANAGEMENT SYSTEM  
Content maintained in a first repository of a first installation (which can optionally be an on-premise installation) of a content management system, as well as metadata associated with the...
US20150180829 HUMAN USER VERIFICATION OF HIGH-RISK NETWORK ACCESS  
Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to one embodiment, when an intermediary...
US20130291087 SYSTEMS AND METHODS FOR INTEGRATING CLOUD SERVICES WITH INFORMATION MANAGEMENT SYSTEMS  
A system includes an enterprise network including an internal management system communicatively coupled thereon, the enterprise network includes security and the internal management system is...
US20110225644 BEHAVIOR-BASED SECURITY SYSTEM  
Described herein are techniques for operating a security server to determine behavioral profiles for entities in a network and to detect attacks or unauthorized traffic in a network based on those...
US20130232564 Method of using a secure private network to actively configure the hardware of a computer or microchip  
A method for a computer or microchip with one or more inner hardware-based access barriers or firewalls that establish one or more private units disconnected from a public unit or units having...
US20120311690 METHOD OF USING A SECURE PRIVATE NETWORK TO ACTIVELY CONFIGURE THE HARDWARE OF A COMPUTER MICROCHIP  
A method for a computer or microchip with one or more inner hardware-based access barriers or firewalls that establish one or more private units disconnected from a public unit or units having...
US20140250492 SYSTEM AND METHOD FOR INTERLOCKING A HOST AND A GATEWAY  
A method is described in example embodiments below that include receiving a content tag associated with transferring a file over a network connection. A session descriptor may also be received....
US20130254868 SYSTEM AND METHOD FOR MULTIMEDIA MULTI-PARTY PEERING (M2P2)  
Embodiments of the present invention pertain to systems and methods for implementing a platform to support multimedia services peering with multiple independent competing parties, such as carriers...
US20150143502 SYSTEM AND METHOD FOR AUTOMATED CONFIGURATION OF APPLICATION FIREWALLS  
In a system for configuring a web application firewall, one or more parameters of the firewall are adjusted such that a test configured for exposing a vulnerability of an application protected by...
US20140189842 METHOD FOR DEFENDING AGAINST SESSION HIJACKING ATTACKS AND FIREWALL  
The present disclosure provides a method for defending against session hijacking attacks, including: receiving a first access request transmitted from a legal client side and transmitting the...
US20150067816 AUTOMATED SECURITY GATEWAY  
A security device may be configured to receive information regarding traffic that has been outputted by a particular user device; and compare the information regarding the traffic to security...
US20110283348 SYSTEM AND METHOD FOR DETERMINING FIREWALL EQUIVALENCE, UNION, INTERSECTION AND DIFFERENCE  
Aspects of the invention pertain to integrated compliance analysis of multiple firewalls and access control lists for network segregation and partitioning. Access control lists may have many...
US20110072504 Policy-Based Virtualization Method Involving Adaptive Enforcement  
A method is provided in which a permission for running a system software instance alongside another system software instance is issued on the basis of a first policy rule concerning the operation...
US20120324561 ROAD BLOCK the next evolution of security software for network operations  
Road Block simply put is a blockade against any and all hacker attempts. It is a security software program that resides on a server and the user machine with specific coding interchanging between...
US20100325717 System and Method for Managing Access to a Plurality of Servers in an Organization  
A system for managing access to resources in a plurality of servers by a plurality of client computers by using an operating system independent Secure Shell (SSH) protocol running in each server...
US20130007870 SYSTEMS FOR BI-DIRECTIONAL NETWORK TRAFFIC MALWARE DETECTION AND REMOVAL  
An exemplary bi-directional network traffic malware detection and removal system may comprise a scrubbing center running one or more server computer communicatively coupled to a network configured...
US20140282998 METHOD OF USING A SECURE PRIVATE NETWORK TO ACTIVELY CONFIGURE THE HARDWARE OF A COMPUTER OR MICROCHIP  
A microchip comprising one or more buffer zones each excluding integrated circuitry; two or more zones each including integrated circuitry; and the one or more buffer zones forming one or more...
US20150095636 TUNNEL INTERFACE FOR SECURING TRAFFIC OVER A NETWORK  
Methods and systems for a flexible, scalable hardware and software platform that allows a managed security service provider to easily provide security services to multiple customers are provided....
US20120185929 INCORPORATING NETWORK CONNECTION SECURITY LEVELS INTO FIREWALL RULES  
Embodiments of the present invention are directed to establishing and/or implementing firewall rules that may employ parameters based on connection security levels for a connection between...
US20100318784 CLIENT IDENTIFICATION FOR TRANSPORTATION LAYER SECURITY SESSIONS  
Systems, methods, and other embodiments associated with client identification for transportation layer security sessions are described. One example method includes monitoring a first...
US20140123269 FILTERING OF APPLICATIONS FOR ACCESS TO AN ENTERPRISE NETWORK  
A computer-readable storage medium has embedded thereon non-transient computer-readable code for controlling access to a protected computer network, by intercepting packets that are being...
US20130290180 TECHNIQUES FOR AUTOMATICALLY PROVISIONING A DATABASE OVER A WIDE AREA NETWORK  
Techniques for provisioning databases for users on a wide area network such as the Internet include a first party managing one or more database systems. Second parties subscribe to database...
US20140208412 FIREWALL EVENT REDUCTION FOR RULE USE COUNTING  
An illustrative embodiment of a method for firewall rule use counting receives log messages comprising one or more log data sets from each firewall rule in a particular network whose counts are to...
US20110154473 SYSTEMS AND METHODS FOR CROSS SITE FORGERY PROTECTION  
The present solution described herein is directed towards systems and methods to prevent cross-site request forgeries based on web form verification using unique identifiers. The present solution...
US20110023105 IPv6-over-IPv4 Architecture  
Mobile clients can execute IPv6 applications in an IPv4 environment without the need for any specialized IPv6 hardware or upgrades to the network infrastructure. The architecture provides a...