AUTOMATIC DETECTION OF MALWARE FAMILIES AND VARIANTS WITHOUT THE PRESENCE OF MALWARE FILES BASED ON STRUCTURE PRESENTATION
Granted: June 13, 2024
Application Number:
20240193270
A string sample is received from a file in real-time and the string sample is converted to a Tetra code and used to search a database of Tetra code samples, organized by family and then by variant. It is determined whether the real-time Tetra code fits any family mask, and if not a new family mask is created. It is also determined whether real-time Tetra code fits any variant mask within the family mask, and if not, a new variant mask is created. The real-time Tetra code is stored in the…
SYSTEMS AND METHODS FOR NETWORK FLOW REORDERING
Granted: June 6, 2024
Application Number:
20240187343
Various embodiments provide systems and methods for reordering processed network traffic.
PER SESSION LINK LOAD BALANCING OF IPSEC TUNNELS OVER MULTIPLE UPLINKS TO SAME IPSEC GATEWAY
Granted: May 30, 2024
Application Number:
20240179565
A first data packet can be forwarded to a virtual SDWAN interface which has multiple IPSec tunnels as members, each of which is disposed over a different uplink, wherein the multiple IPSec tunnels each connect to the remote SDWAN controller. Load balancing of the particular session is performed relative to other sessions by selecting one of the multiple uplinks for transmission to the remote SDWAN controller. Phase 2 of IPSec is set up for the particular session by updating an IPSec…
CLOUD-BASED VIRTUAL EXTENSABLE LOCAL AREA NETWORK (VXLAN) TUNNEL SWITCHING ACROSS ACCESS POINTS
Granted: May 30, 2024
Application Number:
20240179028
VXLAN tunnels are configured between a VXLAN tunnel server and each of the plurality of access points using a VXLAN profile. Tunnel groups are formed between the access point and the plurality of access points. Each tunnel group defines interconnections between VXLAN tunnels such that each tunnel in a group is able to exchange packets securely. A data packet is switched between a first VXLAN tunnel coupled to the first access point on the first LAN and a second VXLAN tunnel coupled to…
SYSTEMS AND METHODS FOR ENHANCED ZTNA SECURITY
Granted: May 9, 2024
Application Number:
20240154938
Various embodiments provide systems and methods for enhancing the security of a ZTNA connection.
SYSTEMS AND METHODS FOR USING A NETWORK ACCESS DEVICE TO SECURE A NETWORK PRIOR TO REQUESTING ACCESS TO THE NETWORK BY THE NETWORK ACCESS DEVICE
Granted: April 18, 2024
Application Number:
20240129308
Various approaches for securing networks against access from off network devices. In some cases, embodiments discussed relate to systems and methods for identifying potential threats included in a remote network by a network access device prior to requesting access to a known secure network via the remote network.
SYSTEMS AND METHODS FOR AUTOMATED SD-WAN PERFORMANCE RULE FORMATION
Granted: April 18, 2024
Application Number:
20240129206
Systems, devices, and methods are discussed for defining and monitoring network communication performance in an SD-WAN environment.
SYSTEMS AND METHODS FOR SD-WAN SETUP AUTOMATION
Granted: April 4, 2024
Application Number:
20240113939
Various embodiments provide systems and methods for automating an SD-WAN setup process.
REMOTE MONITORING OF A SECURITY OPERATIONS CENTER (SOC)
Granted: April 4, 2024
Application Number:
20240114060
Systems and methods for remote monitoring of a Security Operations Center (SOC) via a mobile application are provided. According to one embodiment, a management service retrieves information regarding multiple network elements that are associated with an enterprise network and extracts parameters of the monitored network elements from the retrieved information. The management service prioritizes the monitored network elements by determining a severity level associated with…
SYSTEMS AND METHODS FOR IDENTIFYING SECURITY REQUIREMENTS IN A ZTNA SYSTEM
Granted: April 4, 2024
Application Number:
20240114036
Various embodiments provide systems and methods for providing security in a ZTNA system.
INTENT-BASED ORCHESTRATION OF INDEPENDENT AUTOMATIONS
Granted: March 28, 2024
Application Number:
20240103911
Systems and methods for intent-based orchestration of independent automations are provided. Examples described herein alleviate the complexities and technical challenges associated with deploying, provisioning, configuring, and managing configurable endpoints, including network devices, network security systems, cloud-based security services (e.g., provided by or representing a Secure Access Service Edge (SASE) platform), and other infrastructure, on behalf of numerous customers (or…
DETECTING MALICIOUS BEHAVIOR IN A NETWORK USING SECURITY ANALYTICS BY ANALYZING PROCESS INTERACTION RATIOS
Granted: February 29, 2024
Application Number:
20240070267
Systems and methods for detecting malicious behavior in a network by analyzing process interaction ratios (PIRs) are provided. According to one embodiment, information regarding historical process activity is maintained. The historical process activity includes information regarding various processes hosted by computing devices of a private network. Information regarding process activity within the private network is received for a current observation period. For each process, for each…
SYSTEMS AND METHODS FOR FINE GRAINED FORWARD TESTING FOR A ZTNA ENVIRONMENT
Granted: February 8, 2024
Application Number:
20240048564
Systems, devices, and methods are discussed for forward testing rule sets at a granularity that is less than all activity on the network. In some cases, the granularity is that of an individual application.
SYSTEMS AND METHODS FOR FINE GRAINED FORWARD TESTING FOR A ZTNA ENVIRONMENT
Granted: February 8, 2024
Application Number:
20240048564
Systems, devices, and methods are discussed for forward testing rule sets at a granularity that is less than all activity on the network. In some cases, the granularity is that of an individual application.
SYSTEMS AND METHODS FOR SECURITY ENHANCED DOMAIN CATEGORIZATION
Granted: January 11, 2024
Application Number:
20240015181
Systems, devices, and methods are discussed for mitigating security threats due to web-domain characteristic changes.
SYSTEMS AND METHODS FOR PREVENTING DATA LEAKS OVER RTP OR SIP
Granted: January 11, 2024
Application Number:
20240015139
Systems, devices, and methods are discussed for avoiding data thefts in real-time transactions.
SYSTEMS AND METHODS FOR SECURITY ENHANCED DOMAIN CATEGORIZATION
Granted: January 11, 2024
Application Number:
20240015181
Systems, devices, and methods are discussed for mitigating security threats due to web-domain characteristic changes.
SYSTEMS AND METHODS FOR PREVENTING DATA LEAKS OVER RTP OR SIP
Granted: January 11, 2024
Application Number:
20240015139
Systems, devices, and methods are discussed for avoiding data thefts in real-time transactions.
SYSTEMS AND METHODS FOR CLOUD BASED ROOT SERVICE APPLICATION ACROSS MULTIPLE COOPERATIVE SECURITY FABRICS
Granted: January 4, 2024
Application Number:
20240007438
Systems, devices, and methods are discussed for treating a number of network security devices in a cooperative security fabric using a cloud based root.
SYSTEMS AND METHODS FOR CONTEXT BASED ACCESS CONTROL IN A BRIDGE SERVER
Granted: October 12, 2023
Application Number:
20230328106
Systems, devices, and methods are discussed for context protected access to an air-gapped network resource via a bridge server.