Patents
We take great pride in our highly innovative and creative team members who are focused on innovations in every aspect of Zero Trust Security:
- How do you discover what assets need to be secured
- How do you develop Zero Trust policies for Cloud, Edge, 5G environments
- How do you understand the vulnerabilities in an ephemeral and transient workload context
- How do you deploy Zero Trust policies
- How do you ensure continuous compliance
This has resulted in the following patents (some of them are provisional), others have been issued:
- Policy specification and management for containerized workloads
- System and method for specifying and managing pre-defined policies for containerized workloads
- In-kernel event auditor
- Automated data access policy generation in heterogenous database environments
- Sensitive Data Flow Tracking in Container-based Environments using Unified Forensic Streams
- Sensitive Data Flow Tracking in Container-based Environments using Trusted Brokered Transactions-based Provenance Graphs
- Identity Solution for Containerized Workloads
