Fortinet, Inc.
SYSTEMS AND METHODS FOR PORTABLE COMPUTING DEVICE PROTECTION
Last updated:
Abstract:
Various approaches for providing intermediary threat detection. In some cases, the intermediary threat detection is performed by a communication control port that operatively couples with a portable computing device to protect the portable computing device from network based vulnerabilities and exploits.
Status:
Application
Type:
Utility
Filling date:
2 Mar 2021
Issue date:
8 Sep 2022