1
Bruce Montague, Sanjay Sawhney, Matthew Conover, Tzi cker Chiueh: Security driver for hypervisors and operating systems of virtualized datacenters. Symantec Corporation, Rory D Rankin, Meyertons Hood Kivlin Kowert & Goetzel P C, February 26, 2013: US08387046 (31 worldwide citation)

A system and method for efficient security protocols in a virtualized datacenter environment are contemplated. In one embodiment, a system is provided comprising a hypervisor coupled to one or more protected virtual machines (VMs) and a security VM. Within a private communication channel, a split ke ...


2
Sanjay Sawhney, Matthew Conover, Bruce Montague: Systems and methods for providing network access control in virtual environments. Symantec Corporation, ALG Intellectual Property, January 20, 2015: US08938782 (14 worldwide citation)

A computer-implemented method for providing network access control in virtual environments. The method may include: 1) injecting a transient security agent into a virtual machine that is running on a host machine; 2) receiving, from the transient security agent, an indication of whether the virtual ...


3
Komal Desai, Jonathan Purcell, Bruce Montague, Viswesvaran Janakiraman, Douglas Fallstrom, Rajeev Bharadhwaj: Techniques for allocating/reducing storage required for one or more virtual machines. Symantec Corporation, Wilmer Cutler Pickering Hale and Dorr, November 15, 2011: US08060703 (12 worldwide citation)

Techniques for allocating/reducing storage required for one or more virtual machines are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for allocating storage for one or more virtual machines. The method may comprise providing one or more virtual machin ...


4
Petros Efstathopoulos, Bruce Montague, Dharmesh Shah, Kevin Butler: Host validation mechanism for preserving integrity of portable storage data. Symantec Corporation, Brill Law Office, Jeffrey Brill, October 7, 2014: US08856918 (4 worldwide citation)

A host validation system runs on a portable storage device, and protects data stored thereon from unauthorized access by host computers. The system identifies a host to which the portable device is coupled, for example by using the host's TPM. This can further comprise identifying the host's current ...


5
Sanjay Sawhney, Matthew Conover, Bruce Montague: Systems and Methods for Providing Network Access Control in Virtual Environments. Symantec Corporation, September 15, 2011: US20110225624-A1

A computer-implemented method for providing network access control in virtual environments. The method may include: 1) injecting a transient security agent into a virtual machine that is running on a host machine; 2) receiving, from the transient security agent, an indication of whether the virtual ...