1
Christopher Jones, Daren Desjardins, Eric Bothwell, Alexander Fontana: Method and apparatus for automatically correlating related incidents of policy violations. Symantec Corporation, Lowenstein Sandler PC, August 9, 2011: US07996374 (119 worldwide citation)

A method and apparatus for automatically correlating policy violation incidents. In one embodiment, the method includes receiving user input identifying one of policy violation incidents stored in a data repository, where each policy violation incident is associated with one or more attributes. The ...


2
Michel Zoppas, Jeremy Hermann, Conal O Raghallaigh, Eric Bothwell, Alexander Fontana: Method and apparatus for detecting policy violations in a data repository having an arbitrary data schema. Symantec Corporation, Lowenstein Sandler, August 9, 2011: US07996373 (83 worldwide citation)

A method and apparatus for scanning structured data from a data repository having an arbitrary data schema and for applying a policy to the data of the data repository are described. In one embodiment, the structured data is converted to unstructured text data to allow a schema-independent policy to ...


3
Kevin T Rowney, Michael R Wolfe, Chris Jones, Dirk Kessler, Hai Chen, Eric Bothwell: Method and apparatus to define the scope of a search for information from a tabular data source. Symantec Corporation, Blakely Sokoloff Taylor & Zafman, December 30, 2008: US07472114 (33 worldwide citation)

A method and apparatus for defining the scope of a search is described. In one embodiment, user input is received, and the scope is defined, based on the user input, for a search of free-form text for information from any random rows within a tabular structure of source data. In one embodiment, the ...


4
Michel Zoppas, Jeremy Hermann, Conal O Raghallaigh, Eric Bothwell, Alexander Fontana: Method and apparatus for detecting policy violations in a data repository having an arbitrary data schema. Symantec Corporation, Lowenstein Sandler PC, August 28, 2012: US08255370 (30 worldwide citation)

A method and apparatus for scanning structured data from a data repository having an arbitrary data schema and for applying a policy to the data of the data repository are described. In one embodiment, the structured data is converted to unstructured text data to allow a schema-independent policy to ...


5
Kevin T Rowney, Vitali Fridman, Eric Bothwell: Method and apparatus for handling messages containing pre-selected data. Symantec Corporation, Lowenstein Sandler PC, August 30, 2011: US08011003 (23 worldwide citation)

A method and apparatus for blocking messages containing pre-selected data is described. In one embodiment, the method includes determining that a message transmitted to a recipient via a network includes pre-selected data. The pre-selected data contains information from at least one random row withi ...


6
Chris Jones, Eric Bothwell, Kevin T Rowney: Method and apparatus for creating an information security policy based on a pre-configured template. Symantec Corporation, Lowenstein Sandler PC, July 17, 2012: US08225371 (21 worldwide citation)

A method and apparatus for creating a policy based on a pre-configured template is described. In one embodiment, source data having a tabular structure is identified. Further, one of multiple policy templates is used to automatically create a policy for detecting information from any one or more row ...


7
Kevin T Rowney, Michael R Wolfe, Chris Jones, Dirk Kessler, Hai Chen, Eric Bothwell: Method and apparatus to define the scope of a search for information from a tabular data source. Symantec Corporation, Lowenstein Sandler, August 9, 2011: US07996385 (10 worldwide citation)

A method and apparatus for defining the scope of a search is described. In one embodiment, user input is received, and the scope is defined, based on the user input, for a search of free-form text for information from any random rows within a tabular structure of source data. In one embodiment, the ...


8
Kevin T Rowney, Michael R Wolfe, Chris Jones, Dirk Kessler, Hai Chen, Eric Bothwell: Method and apparatus to define the scope of a search for information from a tabular data source. Symantec Corporation, Lowenstein Sandler, October 22, 2013: US08566305 (4 worldwide citation)

A method and apparatus for defining the scope of a search is described. In one embodiment, user input is received, and the scope is defined, based on the user input, for a search of free-form text for information from any random rows within a tabular structure of source data. In one embodiment, the ...


9
Christopher Jones, Daren Desjardins, Eric Bothwell, Alexander Fontana: Method and apparatus for automatically correlating related incidents of policy violations. Symantec Corporation, Lowenstein Sandler, January 12, 2016: US09235629 (1 worldwide citation)

A method and apparatus for automatically correlating policy violation incidents. In one embodiment, the method includes receiving user input identifying one of policy violation incidents stored in a data repository, where each policy violation incident is associated with one or more attributes. The ...


10
Chris Jones, Eric Bothwell, Kevin T Rowney: Method and apparatus for creating an information security policy based on a pre-configured template. Symantec Corporation, Lowenstein Sandler, August 19, 2014: US08813176 (1 worldwide citation)

A method and apparatus for creating a policy based on a pre-configured template is described. In one embodiment, source data having a tabular structure is identified. Further, one of multiple policy templates is used to automatically create a policy for detecting information from any one or more row ...