Protection against flooding of a server
Protection of computer resources
Protection of sensitive data from malicious e-mail
Protocol identification by heuristic content analysis
Protocol-generic eavesdropping network device
Protocol-parsing state machine and method of using same
Push alert system, method, and computer program product
Rapid analysis of data stream for malware presence
Rapid application security threat analysis
Rapidly propagating threat detection
Rate limiting data traffic in a network
Real time active network compartmentalization
Real time malicious software detection
Real time monitoring and analysis of events from multiple...
Real time monitoring and analysis of events from multiple...
Real time monitoring and analysis of events from multiple...
Real-time network attack pattern detection system for...
Real-time recovery of compromised information
Recovering from device failure
Reducing false positive computer virus detections