Swedish Medical GroupSwedish Colon & Rectal Surgery 751 NE Blakely Dr FL 3, Issaquah, WA 98029 4253137075 (phone), 4253137175 (fax)
Languages:
English
Description:
Dr. Long works in Issaquah, WA and specializes in Colon & Rectal Surgery. Dr. Long is affiliated with Swedish Edmonds Hospital, Swedish Medical Center - First Hill, Swedish Medical Center Ballard and Swedish Medical Center Cherry Hill.
CellNetix Pathology and LaboratoriesCellNetix Pathology 413 Lilly Rd NE, Olympia, WA 98506 3604918420 (phone), 3604937189 (fax)
Languages:
English
Description:
Dr. Long works in Olympia, WA and specializes in Anatomic Pathology & Clinical Pathology. Dr. Long is affiliated with Capital Medical Center, Mason General Hospital and Providence St Peter Hospital.
A. Bryan SARTIN - Dallas TX, US Gina M. Ganley - Millstone Twp NJ, US Kevin Long - Marysville PA, US Jo Ann Joels - Tulsa OK, US
Assignee:
VERIZON PATENT AND LICENSING INC. - Basking Ridge NJ
International Classification:
G06F 11/00 G06F 21/00 G06F 15/16
US Classification:
726 23
Abstract:
A computing device may receive netflow data that includes information corresponding to network-side activity associated with a target device. The computing device may evaluate the netflow data based on a netflow signature to identify potentially malicious activity. The netflow signature may include information corresponding to two or more network events occurring in a particular order. The computing device may report, to another computing device, that potentially malicious activity, corresponding to the network data, has been detected based on the evaluation of the netflow data.
A. Bryan SARTIN - Dallas TX, US Gina M. GANLEY - Millstone Twp NJ, US Kevin LONG - Marysville PA, US Jo Ann JOELS - Tulsa OK, US
Assignee:
VERIZON PATENT AND LICENSING INC. - Basking Ridge NJ
International Classification:
G06F 11/00 G06F 21/00
US Classification:
726 25
Abstract:
A computing device may receive external activity data corresponding to a target system. The external activity data may include information corresponding to network-side information relating to the target system. The computing device may identify suspicious external activity, corresponding to the external activity data, based on an activity watchlist. The activity watchlist may include information corresponding to external activity systems associated with known sources of malicious activity. The computing device may generate a system security report based on the suspicious external activity identified.
Name / Title
Company / Classification
Phones & Addresses
Mr. Kevin Long
Kent Sign Co. Ltd. Signs
434 Balmoral Street, Thunder Bay, ON P7C 5G8 8076221842, 8076230466
Mar 2011 to 2000 Service Assurance ManagerAdecco North America
Mar 2011 to Aug 2014 Acosta Sales and MarketingDisney Corporate Orlando, FL Aug 2010 to Mar 2011 IT Process Analyst for Disney's ITIL Service Management teamLender Processing Services/Fidelity Information Services Jacksonville, FL 1997 to 2010 Command Center Manager
Education:
University of Villanova 2011 Project Management for IS/IT ProfessionalsService Center 2003 to 2007Nassau Community College Hempstead, NY 1980 to 1982Lindenhurst High School Lindenhurst, NY 1976 to 1980