Fortinet Patent Applications

SYSTEMS AND METHODS FOR USING A NETWORK ACCESS DEVICE TO SECURE A NETWORK PRIOR TO REQUESTING ACCESS TO THE NETWORK BY THE NETWORK ACCESS DEVICE

Granted: April 18, 2024
Application Number: 20240129308
Various approaches for securing networks against access from off network devices. In some cases, embodiments discussed relate to systems and methods for identifying potential threats included in a remote network by a network access device prior to requesting access to a known secure network via the remote network.

SYSTEMS AND METHODS FOR AUTOMATED SD-WAN PERFORMANCE RULE FORMATION

Granted: April 18, 2024
Application Number: 20240129206
Systems, devices, and methods are discussed for defining and monitoring network communication performance in an SD-WAN environment.

REMOTE MONITORING OF A SECURITY OPERATIONS CENTER (SOC)

Granted: April 4, 2024
Application Number: 20240114060
Systems and methods for remote monitoring of a Security Operations Center (SOC) via a mobile application are provided. According to one embodiment, a management service retrieves information regarding multiple network elements that are associated with an enterprise network and extracts parameters of the monitored network elements from the retrieved information. The management service prioritizes the monitored network elements by determining a severity level associated with…

SYSTEMS AND METHODS FOR IDENTIFYING SECURITY REQUIREMENTS IN A ZTNA SYSTEM

Granted: April 4, 2024
Application Number: 20240114036
Various embodiments provide systems and methods for providing security in a ZTNA system.

SYSTEMS AND METHODS FOR SD-WAN SETUP AUTOMATION

Granted: April 4, 2024
Application Number: 20240113939
Various embodiments provide systems and methods for automating an SD-WAN setup process.

INTENT-BASED ORCHESTRATION OF INDEPENDENT AUTOMATIONS

Granted: March 28, 2024
Application Number: 20240103911
Systems and methods for intent-based orchestration of independent automations are provided. Examples described herein alleviate the complexities and technical challenges associated with deploying, provisioning, configuring, and managing configurable endpoints, including network devices, network security systems, cloud-based security services (e.g., provided by or representing a Secure Access Service Edge (SASE) platform), and other infrastructure, on behalf of numerous customers (or…

DETECTING MALICIOUS BEHAVIOR IN A NETWORK USING SECURITY ANALYTICS BY ANALYZING PROCESS INTERACTION RATIOS

Granted: February 29, 2024
Application Number: 20240070267
Systems and methods for detecting malicious behavior in a network by analyzing process interaction ratios (PIRs) are provided. According to one embodiment, information regarding historical process activity is maintained. The historical process activity includes information regarding various processes hosted by computing devices of a private network. Information regarding process activity within the private network is received for a current observation period. For each process, for each…

SYSTEMS AND METHODS FOR FINE GRAINED FORWARD TESTING FOR A ZTNA ENVIRONMENT

Granted: February 8, 2024
Application Number: 20240048564
Systems, devices, and methods are discussed for forward testing rule sets at a granularity that is less than all activity on the network. In some cases, the granularity is that of an individual application.

SYSTEMS AND METHODS FOR FINE GRAINED FORWARD TESTING FOR A ZTNA ENVIRONMENT

Granted: February 8, 2024
Application Number: 20240048564
Systems, devices, and methods are discussed for forward testing rule sets at a granularity that is less than all activity on the network. In some cases, the granularity is that of an individual application.

SYSTEMS AND METHODS FOR SECURITY ENHANCED DOMAIN CATEGORIZATION

Granted: January 11, 2024
Application Number: 20240015181
Systems, devices, and methods are discussed for mitigating security threats due to web-domain characteristic changes.

SYSTEMS AND METHODS FOR PREVENTING DATA LEAKS OVER RTP OR SIP

Granted: January 11, 2024
Application Number: 20240015139
Systems, devices, and methods are discussed for avoiding data thefts in real-time transactions.

SYSTEMS AND METHODS FOR SECURITY ENHANCED DOMAIN CATEGORIZATION

Granted: January 11, 2024
Application Number: 20240015181
Systems, devices, and methods are discussed for mitigating security threats due to web-domain characteristic changes.

SYSTEMS AND METHODS FOR PREVENTING DATA LEAKS OVER RTP OR SIP

Granted: January 11, 2024
Application Number: 20240015139
Systems, devices, and methods are discussed for avoiding data thefts in real-time transactions.

SYSTEMS AND METHODS FOR CLOUD BASED ROOT SERVICE APPLICATION ACROSS MULTIPLE COOPERATIVE SECURITY FABRICS

Granted: January 4, 2024
Application Number: 20240007438
Systems, devices, and methods are discussed for treating a number of network security devices in a cooperative security fabric using a cloud based root.

SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO AN UNADVERTISED CLOUD-BASED RESOURCE

Granted: October 12, 2023
Application Number: 20230328107
Systems, devices, and methods are discussed for context protected access to an unadvertised cloud-based resource.

SYSTEMS AND METHODS FOR CONTEXT BASED ACCESS CONTROL IN A BRIDGE SERVER

Granted: October 12, 2023
Application Number: 20230328106
Systems, devices, and methods are discussed for context protected access to an air-gapped network resource via a bridge server.

SYSTEMS AND METHODS FOR SECURITY POLICY ORGANIZATION USING A DUAL BITMAP

Granted: September 7, 2023
Application Number: 20230283638
Systems, devices, and methods are discussed for classifying a number of security policies in relation to criteria for applying those security policies to yield a dual bitmap scheme representing a correlation between security policies and one or more criteria.

SYSTEMS AND METHODS FOR SECURITY POLICY APPLICATION BASED UPON A DUAL BITMAP SCHEME

Granted: September 7, 2023
Application Number: 20230283590
Systems, devices, and methods are discussed for identifying security policies applicable to a received information packet based upon a dual bitmap scheme accounting for bit position mergers and/or policies common to multiple bit positions.

SYSTEMS AND METHODS FOR AUTOMATED SD-WAN PERFORMANCE RULE FORMATION

Granted: September 7, 2023
Application Number: 20230283533
Systems, devices, and methods are discussed for defining and monitoring network communication performance in an SD-WAN environment.

MANAGEMENT OF INTERNET OF THINGS (IOT) BY SECURITY FABRIC

Granted: August 24, 2023
Application Number: 20230269224
The present invention relates to a method for managing IoT devices by a security fabric. A method is provided for managing IoT devices comprises collecting, by analyzing tier, data of Internet of Things (IoT) devices from a plurality of data sources, abstracting, by analyzing tier, profiled element baselines (PEBs) of IoT devices from the data, wherein each PEB includes characteristics of IoT devices; retrieving, by executing tier, the PEBs from the analyzing tier, wherein the executing…