Match Document Document Title
US20150156170 Security Event Routing In a Distributed Hash Table  
Embodiments include components of a computer defense network (CND) architecture, e.g. a content addressable network (CAN) gateway, a CAN peer or a CND controller. The gateway is configured to...
US20130283364 DISTRIBUTED VIRTUAL SWITCH ARCHITECTURE FOR A HYBRID CLOUD  
In one embodiment, a secure transport layer tunnel may be established over a public network between a first cloud gateway in a private cloud and a second cloud gateway in a public cloud, where the...
US20110128945 ANCHOR GATEWAY, COMMUNICATION METHOD AND TANGIBLE MACHINE-READABLE MEDIUM THEREOF  
An anchor gateway, a communication method and a tangible machine-readable medium are provided. The anchor gateway is for use in a WiMAX network comprising an authentication gateway and a serving...
US20110119749 SYSTEM AND METHOD FOR FILTERING SIP-BASED SPAM  
A system for filtering SIP (Session Initiation Protocol)-based spam includes a spam detection unit for receiving a SIP message where labeling is performed from a sending user agent and detecting...
US20130133059 REVERSE PROXY DATABASE SYSTEM AND METHOD  
A system and method for providing a comprehensive security solution for databases through a reverse proxy, optionally featuring translating database queries across a plurality of different...
US20130247169 METHOD AND SYSTEM FOR MANAGEMENT OF SECURITY RULE SET  
There are provided a method of automated managing an ordered set of security rules implemented at a plurality of security gateways and a system thereof. The method comprises obtaining data...
US20110231927 Internet Mediation  
Systems and methods for a user to personalize Internet content from an Internet service provider using selected policy applications. The policy applications may be discrete, single purpose...
US20120216272 ROUTING VOIP CALLS THROUGH MULTIPLE SECURITY ZONES  
Call setup signaling is performed across at least a first security zone, a second security zone, and a third security zone to set up a call. At least one gate is then established between the first...
US20110314536 System and Method for Testing Functionality of a Firewall  
Described are computer-based methods and apparatuses, including computer program products, for testing functionality of a firewall. The testing the functionality of the firewall can include a...
US20140331309 Secure Network Cloud Architecture  
Apparatuses, computer readable media, methods, and systems are described for requesting creation of virtual machine (VM) in a cloud environment comprising a virtual private cloud. Through various...
US20120266231 Secure Network Cloud Architecture  
Apparatuses, computer readable media, methods, and systems are described for requesting creation of virtual machine (VM) in a cloud environment comprising a virtual private cloud. Through various...
US20100325718 Automatic Firewall Configuration  
One embodiment of a gateway router is equipped to recognize a trustworthy local server automatically, and to accept certain incoming connections to a local server that the router has recognized as...
US20140223537 Securing Communication over a Network Using Client System Authorization and Dynamically Assigned Proxy Servers  
A method for securing communication over a network is disclosed. A trust broker system receives a request to connect to applications and resources from a client system. The trust broker system...
US20150047011 METHOD FOR SWITCHING GATEWAYS, AND APPARATUS THEREFOR  
The present invention relates to a converged personal network service (CPNS). More particularly, the present invention relates to a method for switching a personal network (PN) gateway in a PN...
US20140366118 CLOUD BASED LOGGING SERVICE  
Methods and systems are provided for providing access to a cloud-based logging service to a user without requiring user registration. Methods and systems are also provided for providing...
US20130174242 Remote Access Manager for Virtual Computing Services  
A remote access manager in a virtual computing services environment negotiates a time limited NAT routing rule to establish a connection between a remote device and virtual desktop resource...
US20150135302 CLOUD SERVICE SECURITY BROKER AND PROXY  
This application relates generally to a system operating on network traffic between a network-based software as a service (SaaS) provider and a client. The system can be configured as a managed...
US20130298220 SYSTEM AND METHOD FOR MANAGING FILTERING INFORMATION OF ATTACK TRAFFIC  
The present disclosure relates to a system and a method for managing filtering information of attack traffic, and more particularly, to a system and a method for managing filtering information of...
US20130007871 MIGRATING CONFIGURATION INFORMATION BASED ON USER IDENTITY INFORMATION  
Techniques are provided for the configuration of a home-networking system. Home-networking configuration information may be stored on a host system in a manner accessible to the home-networking...
US20100299741 METHOD AND SYSTEM FOR MANAGEMENT OF SECURITY RULE SET  
There are provided a method of automated managing an ordered set of security rules implemented at one or more security gateways and a system thereof. The method comprises a) obtaining data...
US20150020182 Method, Equipment and System for Pushing Network Content  
A method, an equipment, and a system for pushing network content are provided that relate to the field of communications technologies. The method for pushing network content includes: setting, by...
US20140230042 METHOD AND APPARATUS FOR PROVIDING SECURE INTERNAL DIRECTORY SERVICE FOR HOSTED SERVICES  
A system and method for providing secure access to an organization's internal directory service from external hosted services. The system includes a remote directory service configured to accept...
US20150058921 APPLICATION ACCELERATION AS A SERVICE SYSTEM AND METHOD  
Disclosed are systems and methods to provide application acceleration as a service. In one embodiment, a system includes a head office to serve an enterprise application comprised of a...
US20120005742 METHOD AND SYSTEM FOR HANDLING SECURITY IN AN IP MULTIMEDIA GATEWAY  
An IP multimedia gateway (IMG) may be operable to identify a client device which may not currently possess a security capability that is compatible with a security capability of a service manager...
US20140289830 METHOD AND SYSTEM OF A SECURE ACCESS GATEWAY  
In one exemplary embodiment, a computer-implemented method of a secure-access gateway to a destination device in a protected computer network include the step of receiving a request from a remote...
US20120240200 LOCATION-TARGETED ONLINE SERVICES  
Described are various implementations of location-targeted online services. When a user accesses the Internet from a supported location, he'll be able to use premium or exclusive online services...
US20110231892 Systems and Methods for Restricting Online Access  
Systems and methods for restricting online access include a user interface module to establish a user interface between a network user with administrative authority and an Internet service or a...
US20100333187 SUBSCRIBER BASED POLICY FOR SERVICE NETWORK GATEWAYS  
A subscriber network can provide services. External applications can use the services on the subscriber network. A service access gateway can control application access to services of the...
US20110321152 TRUSTED INTERMEDIARY FOR NETWORK LAYER CLAIMS-ENABLED ACCESS CONTROL  
Embodiments of the invention provide a trusted intermediary for use in a system in which access control decisions may be based at least in part on information provided in claims. The intermediary...
US20150082415 METHOD AND SYSTEM FOR PROVIDING SECURE TRANSACTIONS VIA A BROADBAND GATEWAY  
A broadband gateway may be used to authorize transactions associated with one or more accounts, which may be associated with a user of the broadband gateway. The transaction may be handled by the...
US20140283000 Proxy that Switches from Light-Weight Monitor Mode to Full Proxy  
The packets of a communication session between a first device and a second device are monitored at proxy device. A determination is made that full proxy services should be applied to the...
US20140150082 Net-Based Email Filtering  
A local gateway device receives email across the internet from a sender of the email and forwards it across the internet to an email filtering system. The email filtering system analyzes the email...
US20110307950 Net-Based Email Filtering  
A local gateway device receives email across the internet from a sender of the email and forwards it across the internet to an email filtering system. The email filtering system analyzes the email...
US20110047610 Modular Framework for Virtualization of Identity and Authentication Processing for Multi-Factor Authentication  
Identity access appliance works in conjunction with the edge network devices and provides the necessary protocol authentication, user authentication statement, authorization summary and its...
US20140033294 Content review with proxy comment management  
Techniques for content review with proxy comment management are presented. Comments associated with content review are managed separately from the content itself. Some comments are associated with...
US20130074174 FIREWALL ACCESS CONTROL WITH BORDER GATEWAY PROTOCOL ATTRIBUTES  
Packets are routed from at least one internet protocol (IP) address in accordance with border gateway protocol (BGP); while carrying out the routing in accordance with the border gateway protocol...
US20110004926 Automatically Handling Proxy Server and Web Server Authentication  
A mechanism is provided for automatically handling server authentication. Responsive to receiving a response to a synthetic transaction from a server, a determination is made as to whether the...
US20110088088 Method of frame blocking for wireless device  
A frame blocking method for wireless device comprises the steps of: receiving a frame; determining if a size of the frame complies with a predetermined size? If “YES” then proceed; determining if...
US20110023107 Lifecycle Management Of Privilege Sharing Using An Identity Management System  
A method, system and computer-usable medium are disclosed for managing the lifecycle of a shared privileged account. A proxy service is implemented with an Identity Management (IdM) system that...
US20140143851 FORMING A SECURITY NETWORK INCLUDING INTEGRATED SECURITY SYSTEM COMPONENTS AND NETWORK DEVICES  
An integrated security system is described that integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode security network...
US20130276072 Method for Enabling Exchange of User Profiles Between a Visited Network and a Home Network  
The invention relates to a method (40) in a visited gateway server (21) in a communication system (1) comprising a home network (10) and a visited network (20) for enabling exchange of user...
US20140143843 SECURITY BYPASS ENVIRONMENT FOR CIRCUMVENTING A SECURITY APPLICATION IN A COMPUTING ENVIRONMENT  
Exemplary embodiments of the present disclosure are directed to performing an operation in a computing environment that is prohibited by a security application governing the computing environment....
US20150089577 SYSTEM AND METHOD FOR UPDATING DOWNLOADED APPLICATIONS USING MANAGED CONTAINER  
A managed container may be configured to manage enterprise applications, manage enterprise information stored on a device, manage a protected storage area used by the managed container to store...
US20150106909 CONFIGURING AND MANAGING REMOTE SECURITY DEVICES  
Techniques for configuring and managing remote security devices are disclosed. In some embodiments, configuring and managing remote security devices includes receiving a registration request for a...
US20110154474 METHOD, DEVICE, AND COMPUTER PROGRAM PRODUCT FOR DIFFERENTIATED TREATMENT OF EMAILS BASED ON NETWORK CLASSIFICATION  
Method, device, and computer program product are provided for differentiated treatment of incoming and outgoing emails based on a network server. A server receives a query from a gateway, and the...
US20130312080 System and Method for Providing a Secure Network on Another Secure Network  
The present invention provides a system and method for providing a closed or secure network on another closed or secure network. The system enables linking at least one acquirer network operating...
US20110119750 METHOD FOR IMPROVING NETWORK APPLICATION SECURITY AND THE SYSTEM THEREOF  
A method for improving network application security and the system thereof are disclosed in the invention, relating to the field of information security. The method includes: a proxy server in a...
US20090165114 Takeover Processes in Security Network Integrated with Premise Security System  
An integrated security system is described comprising a gateway located at a first location. The gateway includes a takeover component that establishes a coupling with a first controller of a...
US20120137357 SYSTEM AND METHOD FOR TESTING NETWORK FIREWALL FOR DENIAL-OF-SERVICE (DOS) DETECTION AND PREVENTION IN SIGNALING CHANNEL  
A device may measure a first performance, associated with legitimate traffic without attack traffic, of a Session Initiation Protocol (SIP)-based protection device implementing authentication;...
US20080077980 PAGELETS  
Web application code can be interpreted to indicate a pagelet web application. A combined display including a section of the pagelet web application in a page of the first application can then be...