CA2587867C - Dispositif de securite de reseau - Google Patents

Dispositif de securite de reseau Download PDF

Info

Publication number
CA2587867C
CA2587867C CA2587867A CA2587867A CA2587867C CA 2587867 C CA2587867 C CA 2587867C CA 2587867 A CA2587867 A CA 2587867A CA 2587867 A CA2587867 A CA 2587867A CA 2587867 C CA2587867 C CA 2587867C
Authority
CA
Canada
Prior art keywords
data object
network
security device
network security
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CA2587867A
Other languages
English (en)
Other versions
CA2587867A1 (fr
Inventor
John Todd
Sai Sivanesan
David Cann
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Electro Guard Corp
Original Assignee
Electro Guard Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Electro Guard Corp filed Critical Electro Guard Corp
Publication of CA2587867A1 publication Critical patent/CA2587867A1/fr
Application granted granted Critical
Publication of CA2587867C publication Critical patent/CA2587867C/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
CA2587867A 2006-05-08 2007-05-07 Dispositif de securite de reseau Active CA2587867C (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US79833906P 2006-05-08 2006-05-08
US60/798,339 2006-05-08
US82915706P 2006-10-12 2006-10-12
US60/829,157 2006-10-12

Publications (2)

Publication Number Publication Date
CA2587867A1 CA2587867A1 (fr) 2007-11-08
CA2587867C true CA2587867C (fr) 2015-06-23

Family

ID=38663503

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2587867A Active CA2587867C (fr) 2006-05-08 2007-05-07 Dispositif de securite de reseau

Country Status (1)

Country Link
CA (1) CA2587867C (fr)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111695148B (zh) * 2020-05-15 2023-07-04 浙江信网真科技股份有限公司 一种网络节点自学习的安全过滤方法及装置
CN113014590B (zh) * 2021-03-08 2022-07-15 中电积至(海南)信息技术有限公司 一种加密流媒体网络流量的解密方法和装置
US11916950B1 (en) 2021-04-12 2024-02-27 Vmware, Inc. Coordinating a distributed vulnerability network scan
CN113127929B (zh) * 2021-04-30 2024-03-01 天翼安全科技有限公司 数据脱敏方法、脱敏规则处理方法、装置、设备及存储介质
US11528317B1 (en) * 2021-05-05 2022-12-13 Vmware, Inc. Proxy-enabled communication across network boundaries by self-replicating applications

Also Published As

Publication number Publication date
CA2587867A1 (fr) 2007-11-08

Similar Documents

Publication Publication Date Title
US7890612B2 (en) Method and apparatus for regulating data flow between a communications device and a network
US9197628B1 (en) Data leak protection in upper layer protocols
US9648029B2 (en) System and method of active remediation and passive protection against cyber attacks
KR101554809B1 (ko) 프로토콜 핑거프린팅 및 평판 상관을 위한 시스템 및 방법
Biju et al. Cyber attacks and its different types
US20030037258A1 (en) Information security system and method`
Giani et al. Data exfiltration and covert channels
CA2587867C (fr) Dispositif de securite de reseau
Carter et al. Intrusion prevention fundamentals
SOX This White Paper
Venkatesh et al. Identification and isolation of crypto ransomware using honeypot
Shaikh et al. Exploring recent challenges in cyber security and their solutions
Berchi et al. Security Issues in Cloud-based IoT Systems
Shukla et al. Security Analysis of the Cyber Crime
Muttoo et al. Analysing security checkpoints for an integrated utility-based information system
Banday et al. A study of Indian approach towards cyber security
Vakil et al. Cyber Attacks: Detection and Prevention
Khanday et al. Intrusion Detection Systems for Trending Cyberattacks
Kolawole et al. Practical Approaches to Securing an IT Environment
Pathak The Review of Terms and Concepts used to Understand Cybercrime to Safeguard Ourselves from Cybercriminals.
Geogen et al. Mobile malware
Kumar The cram of Network Security with Its stabbing Attacks and likely Security Mechanisms
Bhosle et al. Technical Review on Network Security
Harrison et al. A protocol layer survey of network security
Ali et al. Cyber Security: Challenges, Threats and Protective Measures of an Organization

Legal Events

Date Code Title Description
EEER Examination request