Replace malicious driver at boot time
Responding to detected application vulnerability exploits
Reverse firewall packet transmission control system
Risk detection
Risk scoring system for the prevention of malware
Rogue access point detection in wireless networks
RPC port mapper integrity checker to improve security of a...