×

ENDPOINT SECURITY IMPLEMENTATION

  • US 20140380491A1
  • Filed: 06/24/2013
  • Published: 12/25/2014
  • Est. Priority Date: 06/24/2013
  • Status: Abandoned Application
First Claim
Patent Images

1. A method comprising:

  • a computer detecting an element from a data flow for at least one endpoint device;

    the computer using the detected element and a protection engine to assess security requirements for the flow of data for the at least one endpoint device; and

    the computer causing the protection engine to issue additional security controls for the at least one endpoint device.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×