Real Time Touch

new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)

Real Time Touch

Quest Software Inc patents

Recent patent applications related to Quest Software Inc. Quest Software Inc is listed as an Agent/Assignee. Note: Quest Software Inc may have other listings under different names/spellings. We're not affiliated with Quest Software Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "Q" | Quest Software Inc-related inventors

Virtualizing a secure active directory environment

A recovery solution can employ virtualization software to create a virtualized Active Directory forest from a source Active Directory forest. A recovery agent can be installed on the domain controllers prior to creating copies of the domain controllers in the virtualized forest. Additionally, the recovery agent can be added to... Quest Software Inc

Providing a secure communication channel during active directory disaster recovery

A secure communication channel can be established between a recovery console and a recovery agent during an Active Directory disaster recovery. This secure channel can be established without employing the Kerberos or NTLM authentication protocols. Therefore, the recovery console and recovery agent will be able to establish a secure channel... Quest Software Inc

Fixed size extents for variable size deduplication segments

Mechanisms are provided for maintaining variable size deduplication segments using fixed size extents. Variable size segments are identified and maintained in a datastore suitcase. Duplicate segments need not be maintained redundantly but can be managed by updating reference counts associated with the segments in the datastore suitcase. Segments are maintained... Quest Software Inc

De-duplicating multi-device plugin

Systems, methods, and devices are disclosed herein for implementing deduplicating multi-device plugin. Methods may include receiving a data storage request identifying a data block for storage in a virtual device, where the virtual device is created by a multiple device driver capable of generating a plurality of virtual devices based... Quest Software Inc

System and dynamic re-serialization of vtl devices and cartridges

Certain embodiments of the present disclosure provide systems and associated methods for dynamically re-serializing virtual tape library cartridges. The system comprises a first server node including a first virtual tape library residing on a deduplication file system, in which a backup data file corresponding to a first cartridge is stored... Quest Software Inc

Distributed data collection in an enterprise network

In some implementations a starter task to gather data associated with at least a portion of a communications system may be received. A plurality of targets associated with the starter task may be determined. A portion of the plurality of targets may be grouped, based on grouping criteria, to create... Quest Software Inc

Pre-applying a reduced version of a search query to limit the search scope

A reduced version of a search query can be pre-applied to limit the search scope. A query processor can maintain one or more metadata structures for a structured data store where each metadata structure is based on a single field of documents that are stored in the structured data store.... Quest Software Inc

Altering search sequence to cause multiple searches to load and evaluate segments together

The sequence of one or more searches can be altered to cause multiple searches to load and evaluate segments together. When a first search query is executed, a query processor can commence loading segments of an indexed store to thereby evaluate the first search query against the segments. Then, if... Quest Software Inc

Predicting index fragmentation caused by database statements

Systems and techniques for determining a total predicted index fragmentation associated with executing a structured query language statement are described. An execution plan associated with the structured query language statement may be determined. A plurality of tables estimated to be affected by execution of the structured query language statement may... Quest Software Inc

Dispatcher for adaptive data collection

This disclosure describes systems, methods, and computer-readable media for optimizing data collection in a distributed environment by leveraging real-time and historical data collection performance statistics and server performance data. In some configurations, a computing device can be initially configured for data collection. In such configurations, the initial configuration can include... Quest Software Inc

Determining a threat severity associated with an event

Systems and techniques for assessing a risk associated with a data loss prevention (DLP) policy violation are described. Characteristics of data associated with the DLP policy violation and user information associated with a participant associated with the DLP policy violation may be determined. An expertise and a position of the... Quest Software Inc

Performance tracking of an application during a single user session

Systems and techniques to monitor performance of a single user session of an application installed in a client device are described. The application may transmit a request for data to a first server, and receive a response from the first server, the response including the requested data. The application may... Quest Software Inc

Electronic mail (email) message lifecycle management

Systems and techniques to automatically delete emails from an inbox associated with an employee in an enterprise are described. A message lifecycle engine that interfaces with a corporate email system may select an inbox of an email client application. The message lifecycle engine may delete an email in the inbox... Quest Software Inc

Automatically generated employee profiles

Systems and techniques for determining an expertise of an employee in an enterprise are described. A crawler may examine one or more external data sources that are external to an enterprise network associated with the enterprise to identify one or more documents associated with the employee. The external data sources... Quest Software Inc

Real-time network updates for malicious content

A global response network collects, analyzes, and distributes “cross-vector” threat-related information between security systems to allow for an intelligent, collaborative, and comprehensive real-time response.... Quest Software Inc

Symbiotic data insights from harmonized queries

Aspects of the present disclosure relate to systems and methods for multi-data source query implementation and aggregation. In embodiments, the query aggregation system comprises a data abstraction engine, a query controller or scheduler and an aggregator. In embodiments, the data abstraction engine normalizes data schemas from multiple data sources based... Quest Software Inc

Systems and methods for using a structured query dialect to access document databases and merging with other sources

Disclosed are systems and methods that allow a database engine to access a non-relational document database and dynamically apply a schema that maps documents comprising semi-structured data into a relational data structure. In embodiments, mapping may be accomplished by parsing and analyzing a set of sample documents to empirically generate... Quest Software Inc

Preserving data protection and enabling secure content awareness in query services

Embodiments of the present disclosure include systems and methods for providing query service of secured contents. A data collection service collects data and security context associated with the data from a data source and stores the data with the security attributes in a datastore, where the security attributes are derived... Quest Software Inc

Net- based email filtering

A local gateway device receives email across the internet from a sender of the email and forwards it across the internet to an email filtering system. The email filtering system analyzes the email to determine whether it is spam, phishing or contains a virus and sends it back to the... Quest Software Inc

Efficient use of resources in message classification

A system and method are disclosed for routing a message through a plurality of test methods. The method includes: receiving a message; applying a first test method to the message; updating a state of the message based on the first test method; and determining a second test method to be... Quest Software Inc

Social media login and interaction management

A hardware or software firewall may be installed within a private network. The firewall may intercept a first set of login credentials entered into a login interface of a social media platform. The firewall then checks that the first set of login credentials are correct against a first set of... Quest Software Inc

Wireless extender secure discovery and provisioning

According to embodiments of the invention, a first wireless access point discovers a second wireless access point, the first wireless access point tunes its radio and privacy settings, without user input, based upon parameters automatically exchanged in response to the discovery of the second wireless access point, and a secure... Quest Software Inc

Two stage memory allocation using a cache

The presently claimed invention manages memory in a multi-processor system. The presently claimed invention may use a combination of global and local locks when allocating memory and de-allocating memory in a multi-processor system. A method consistent with the presently claimed invention may first receive an allocation of a first memory... Quest Software Inc

On-the-fly pattern recognition with configurable bounds

Some embodiments of on-the-fly pattern recognition with configurable bounds have been presented. In one embodiment, a pattern matching engine is configured based on user input, which may include values of one or more user configurable bounds on searching. Then the configured pattern matching engine is used to search for a... Quest Software Inc

Non rfc-compliant protocol classification based on real use

A firewall system determines whether a protocol used by an incoming data packet is a standard protocol compliant with Request For Comment (RFC) standards. In the event the protocol is RFC compliant, the firewall transmits the packet to the recipient according to firewall policies regarding the standard protocol. If the... Quest Software Inc

Detecting shared or compromised credentials through analysis of simultaneous actions

A privileged account management system can detect when credentials used to access one or more servers have been shared or otherwise compromised. This detection can occur through analysis of simultaneous actions that are performed via multiple sessions associated with the same administrator. When two or more sessions associated with the... Quest Software Inc

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009


This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. is not affiliated or associated with Quest Software Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Quest Software Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by