Matches 1 - 50 out of 233 1 2 3 4 5 >


Match Document Document Title
US20150020186 Various Methods and Apparatuses for a Central Management Station for Automatic Distribution of Configuration Information to Remote Devices  
A method, apparatus, and system are described for a central management system to configure remote devices. A device service manager server (DSM) may have an IP redirector module configured to...
US20060253900 Client assisted firewall configuration  
Embodiments describe techniques in connection with configuring a firewall and/or reducing network traffic. According to an embodiment is a method for configuring a firewall to reduce unwanted...
US20060005236 Computer gateway system  
A computer gateway system is disclosed. The system may include a multi-homing gateway with at least one interface connected to an IP compliant network. The gateway is to allow an IP address to be...
US20060288408 VIRTUAL PRIVATE NETWORK  
A virtual private network is disclosed including a first firewall interposed between a first private network and a public network, and a second firewall interposed between a second private network...
US20060021020 Method for directly connecting an inherently secure computer to a private network element  
A firewall device is disclosed that includes a proxy agent configured to examine a packet received from a source host machine destined for a private network element over an IP-compliant network....
US20140304800 METHODS AND APPARATUS FOR AGENT-BASED MALWARE MANAGEMENT  
Methods and apparatus for providing protection against malware are disclosed. An exemplary method includes executing an agent program on a remote computer connected to a network, the agent program...
US20120144476 SYSTEM AND METHOD FOR NETWORK VULNERABILITY DETECTION AND REPORTING  
A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target...
US20110231925 FIREWALL NETWORK APPLICATION APPARATUS  
A method and system for distributing flows between a multiple processors. The flows can be received from an external source such as a network, by a front-end processor that recognizes the flow and...
US20060288409 Method and apparatus for managing a firewall  
A method and apparatus are disclosed for managing a firewall. The disclosed firewall manager facilitates the generation of a security policy for a particular network environment, and automatically...
US20050235348 System for preventing unwanted access to information on a computer  
A firewall device for preventing unwanted access to information on a computer is disclosed. In disclosed embodiments, the firewall device is managing traffic between a computer and an IP-compliant...
US20050235347 Method for eliminating source-based routing by a device disposed between an IP-compliant network and private network elements  
Methods and apparatus for eliminating source-based routing are disclosed. Disclosed embodiments include a gateway device being disposed between an IP-compliant network and private network elements...
US20050240992 Method for controlling access to a web server operating on an IP-compliant network  
Methods and apparatus are dislosed for controlling access to a web server operating on an IP-compliant network. Disclosed embodiments include a network device disposed between the IP-compliant...
US20140013412 PROVIDING TELEPHONY SERVICES TO TERMINALS BEHIND A FIREWALL AND/OR A NETWORK ADDRESS TRANSLATOR  
A method and apparatus for allowing telephony or other types of media communications and services to be provided for a device (24) having a private network address that resides behind a firewall...
US20110258695 PUBLIC NETWORK ACCESS SERVER HAVING A USER-CONFIGURABLE FIREWALL  
A user-configurable firewall and method in which a user-changeable security setting for a client computer is maintained by an access server through which a user accesses the public network. The...
US20090254936 Set Top Box With Firewall  
A set top box with a firewall is disclosed. The set top box uses two separate ports to communicate with two respective communications networks. The first port communicates with the first network...
US20060190998 Determining firewall rules for reverse firewalls  
A reverse firewall for removing undesirable traffic from a computing network, such as a virtual private network (VPN), is disclosed. The reverse firewall uses firewall rules that may be determined...
US20050235346 Method for transparently forming a connection to an element of a private network over an IP-compliant network  
Methods and apparatus for transparently forming a connection to an element of a private network over an IP-compliant network are disclosed. In disclosed embodiments, network devices such as...
US20110161172 System and method for providing user control of the user's network usage data and personal profile information  
Systems and methods provided for tracking a user's usage of resources on the Internet under the user's control, and for controlling the distribution of the user's usage data. A personal data...
US20070101421 VIRTUAL PRIVATE NETWORK  
A virtual private network is disclosed. The network may include a first private network including a first firewall interposed between a first private network and a public network and a second...
US20090307746 METHOD, SYSTEM AND DEVICE FOR IMPLEMENTING SECURITY CONTROL  
A method, system and device for implementing security control are provided. The method for implementing security control includes: receiving, by the Policy and Charging Enforcement Function (PCEF)...
US20110023106 METHODS AND SYSTEMS FOR ACHIEVING HIGH ASSURANCE COMPUTING USING LOW ASSURANCE OPERATING SYSTEMS AND PROCESSES  
A computing system contains and uses a partitioning microkernel (PMK) or equivalent means for imposing memory partitioning and isolation prior to exposing data to a target operating system or...
US20050268332 Extensions to filter on IPv6 header  
A network implementing at least one firewall for providing protection for users on the network. The network includes at least one host system protected by the at least one firewall, the host...
US20100313261 Communication method for device in network system and system for managing network devices  
A communication method for a device in a network system and a system for managing network devices are disclosed. The communication method for a device in a network system includes connecting a...
US20050229245 Inter-device authentication system, inter-device authentication method, communication device, and computer program  
Providing a function of isolating a home network from an external network for a router or a gateway, which are interposed between the home network and the external network, so as to isolate or...
US20140096229 VIRTUAL HONEYPOT  
A virtual honeypot is configured within a security appliance by configuring one or more network addresses associated with the virtual honeypot. The security appliance receives network traffic...
US20070022474 PORTABLE FIREWALL  
A firewall device provides a novel architecture for conducting firewall and other network interface management operations over a wired Ethernet connection. The firewall device includes a first...
US20050268331 Extension to the firewall configuration protocols and features  
A network implementing at least one firewall for providing protection for users on the network. The network includes at least one host system protected by the at least one firewall, the host...
US20160337315 INTERNET PROTOCOL THREAT PREVENTION  
Blocking high-risk IP connections in real-time while allowing tailoring of an acceptable risk profile to match the security requirements of network resources. By acquiring IP threat information...
US20090307681 Wireless Network and Methods of Wireless Communication For Ophthalmic Surgical Consoles  
A wireless network of surgical consoles and other equipment is used to transfer data. A surgical console has a system processor running software that operates the surgical console and a wireless...
US20060041936 Method and apparatus for graphical presentation of firewall security policy  
A graphical representation of the firewall and a network coupled to the firewall is generated and displayed. A number of an inbound port of the network is displayed. An arrow adjacent to the port...
US20090007218 Switched-Based Network Security  
Traffic sent from a network endpoint is redirected and the network endpoint is tested for compliance with a security policy. If the network endpoint is in compliance with the security policy, an...
US20060015935 Method for providing user authentication/authorization and distributed firewall utilizing same  
The distributed firewall performs user authentication at a first level to establish a user security context for traffic from that user, and an authority context provides authorization for...
US20120144475 SCALABLE NAT TRAVERSAL  
A system and method for traversing a firewall for a voice-over-IP session or other communication session uses four main components: a relay agent, and NAT 30A gent, a SIP proxy and a application...
US20100011432 AUTOMATICALLY DISTRIBUTED NETWORK PROTECTION  
A network protection solution is provided by which security capabilities of a client machine are communicated to a network security gateway so that a variety of processes can be automatically and...
US20070143851 Method and systems for controlling access to computing resources based on known security vulnerabilities  
Methods and systems are provided for fine tuning access control by remote, endpoint systems to host systems. Multiple conditions/states of one or both of the endpoint and host systems are...
US20060282893 Network information security zone joint defense system  
A network information security zone joint defense system is provided, which monitors a network connection status through a network defense appliance. Once the network defense appliance detects a...
US20060265746 Method and system for managing computer security information  
A security management system includes a fusion engine which “fuses” or assembles information from multiple data sources and analyzes this information in order to detect relationships between raw...
US20130173776 Method and Apparatus for Wirelessly Managing a Classroom Environment  
This disclosure describes devices, methods, and techniques for managing a classroom environment. These devices, method, and/or techniques enable a classroom manager device to manage a wireless...
US20110270711 MANAGING APPLICATION INTERACTIONS WITH ENTERPRISE SYSTEMS  
Networked services may interface with enterprise systems of an organization to access data in the enterprise systems. A networked service may be able to retrieve, manipulate, and store data in the...
US20110029682 TELEPHONIC COMMUNICATIONS WITH INTELLIGENT PROTOCOL SWITCHING  
In various exemplary embodiments described herein, a system and associated method to intelligently and automatically select compatible communication protocols between one or more communications...
US20100325703 System and Method for Secured Communications by Embedded Platforms  
A method for ensuring secured communications for embedded platforms includes steps for receiving a device identifier at an authenticating server over a public network from an extended trust...
US20060185008 Method, apparatus and computer program product enabling negotiation of firewall features by endpoints  
Disclosed are examples of a method, system, devices and nodes to conduct communications between a device coupled to a communication network and a network security enforcement node, such as a...
US20060095960 Data center topology with transparent layer 4 and layer 7 services  
A data center topology routes traffic between internal sub-nets and between a sub-net and an outside network through a common chain of services. The data center topology employs transparent layer...
US20130298221 FIREWALLS FOR FILTERING COMMUNICATIONS IN A DYNAMIC COMPUTER NETWORK  
A method and apparatus for filtering data communications in a dynamic computer network is disclosed. The method includes receiving a data packet that includes a plurality of identity parameters....
US20130254870 Detecting and Thwarting Browser-Based Network Intrusion Attacks By a Virtual Machine Monitoring System, Apparatus, and Method  
Detecting and thwarting attacks for intellectual property misappropriation is provided by directing retrieval of resources using uniform resource identifiers to a browser operating within a...
US20090228963 CONTEXT-BASED NETWORK SECURITY  
Context-based network security is provided for streamlined access control over a computer network and components on the computer network. More particularly, methods, instructions on...
US20070022479 Network interface and firewall device  
A network processing device provides a novel architecture for conducting firewall and other network interface management operations. In another aspect of the invention, a Unified Policy Management...
US20060212933 Surveillance implementation in a voice over packet network  
A network infrastructure device in a voice over packet (VOP) network includes a transceiver and a processor. The transceiver can transmit and receive communications over a VOP network. The...
US20100223140 COMMUNICATIONS SYSTEM PROVIDING PERSONALIZED MOBILE WIRELESS COMMUNICATIONS DEVICE NOTIFICATIONS AND RELATED METHODS  
A communications system may include at least one mobile wireless communications device associated with a respective user and storing personalizing information for the user, a network server within...
US20140259143 COMMUNICATION SYSTEM FOR A MOTOR VEHICLE  
A communication system for a motor vehicle comprises a telemetry terminal with a plurality of interfaces, a motor vehicle control device terminal, a bus by means of which the telemetry terminal...

Matches 1 - 50 out of 233 1 2 3 4 5 >