Interactive security orchestration
Abstract:
A method includes providing auxiliary code implementing a process for facilitating enforcement of one or more computer-usage rules, and augmenting third-party code with the auxiliary code such that execution of the third-party code carries out the process. Other embodiments are also described.
Public/Granted literature
Information query
Patent Agency Ranking
0/0