Articles by Brian
Activity
-
It's a wrap for #C2CUserSummit in Washington DC. It was especially meaningful to see strong representation from Singapore, with HTX (Home Team…
It's a wrap for #C2CUserSummit in Washington DC. It was especially meaningful to see strong representation from Singapore, with HTX (Home Team…
Liked by Brian Robison
-
It’s an amazing feeling to be opening an office in Austin, a city that’s been home for the last 18 years. It’s going to make a great base for…
It’s an amazing feeling to be opening an office in Austin, a city that’s been home for the last 18 years. It’s going to make a great base for…
Liked by Brian Robison
-
RSAC brought out our allies, thank you for always being in our corner. ❤️ 👊
RSAC brought out our allies, thank you for always being in our corner. ❤️ 👊
Liked by Brian Robison
Experience
Patents
-
System and method for cloud based scanning for computer vulnerabilities in a network environment
Issued US 8,595,822
A method in one embodiment includes establishing a first secure tunnel between a scanner and a configuration manager, and a second secure tunnel between the scanner and a scan controller, where the scanner is located in a public network and the configuration manager and the scan controller are located in a private network, communicating scanner configuration information between the scanner and the configuration manager over the first secure tunnel, and communicating scan information between the…
A method in one embodiment includes establishing a first secure tunnel between a scanner and a configuration manager, and a second secure tunnel between the scanner and a scan controller, where the scanner is located in a public network and the configuration manager and the scan controller are located in a private network, communicating scanner configuration information between the scanner and the configuration manager over the first secure tunnel, and communicating scan information between the scanner and the scan controller over the second secure tunnel. The secure tunnels may be established from within the private network, by forwarding a first origination port and a second origination port to a first destination port and a second destination port, respectively. The first and second origination ports may be located in the public network, and the first and second destination ports may be located in the private network.
Other inventorsSee patent -
Automatic sanitization of data on a mobile device in a network environment
Filed US US 20140181998 A1
A method is provided in one example embodiment and includes establishing a network connection to a central security system in a central network, receiving a message from the central security system, activating a grace window based on the message, and determining whether the grace window has expired. The method further includes deleting, when the grace window expires, one or more objects from the mobile device based on a sanitization policy. In specific embodiments, the network connection is…
A method is provided in one example embodiment and includes establishing a network connection to a central security system in a central network, receiving a message from the central security system, activating a grace window based on the message, and determining whether the grace window has expired. The method further includes deleting, when the grace window expires, one or more objects from the mobile device based on a sanitization policy. In specific embodiments, the network connection is terminated before the grace window expires, and the grace window expires unless the mobile device establishes another network connection with the central security system. In further embodiments, the method includes receiving the sanitization policy from the central security system. The sanitization policy identifies the one or more objects to be deleted from the mobile device when the grace window expires.
Other inventorsSee patent
Recommendations received
10 people have recommended Brian
Join now to viewMore activity by Brian
-
For years, cybersecurity has treated Linux like the quiet giant... stable, invisible, and less targeted than Windows. But the threat landscape has…
For years, cybersecurity has treated Linux like the quiet giant... stable, invisible, and less targeted than Windows. But the threat landscape has…
Liked by Brian Robison
-
With my 23rd RSA Conference done and dusted, the thing I look forward to most each year now is spending the last night with the old gang from RSA…
With my 23rd RSA Conference done and dusted, the thing I look forward to most each year now is spending the last night with the old gang from RSA…
Liked by Brian Robison
-
What a week at the RSA Conference in San Francisco this week! If you didn't get your Halcyon socks or guitar picks, let me know. Now it's time to…
What a week at the RSA Conference in San Francisco this week! If you didn't get your Halcyon socks or guitar picks, let me know. Now it's time to…
Liked by Brian Robison
-
What a week, and I am so glad it's done.
What a week, and I am so glad it's done.
Liked by Brian Robison
-
NetRise had an incredible week at RSAC in San Francisco. It's always a whirlwind between media, customer meetings, prospect meetings and investors…
NetRise had an incredible week at RSAC in San Francisco. It's always a whirlwind between media, customer meetings, prospect meetings and investors…
Liked by Brian Robison
-
A pleasure to meet the Halcyon leadership team at RSAC at a super cool cafe designed to drive meetings with partners and customers. Our discussions…
A pleasure to meet the Halcyon leadership team at RSAC at a super cool cafe designed to drive meetings with partners and customers. Our discussions…
Liked by Brian Robison
-
What. A. Week. Grateful for another #RSAC in the books with team Halcyon!
What. A. Week. Grateful for another #RSAC in the books with team Halcyon!
Liked by Brian Robison
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content