SYSTEMS AND METHODS FOR CONTEXT BASED ACCESS CONTROL IN A BRIDGE SERVER
Granted: October 12, 2023
Application Number:
20230328106
Systems, devices, and methods are discussed for context protected access to an air-gapped network resource via a bridge server.
SYSTEMS AND METHODS FOR SECURITY POLICY ORGANIZATION USING A DUAL BITMAP
Granted: September 7, 2023
Application Number:
20230283638
Systems, devices, and methods are discussed for classifying a number of security policies in relation to criteria for applying those security policies to yield a dual bitmap scheme representing a correlation between security policies and one or more criteria.
SYSTEMS AND METHODS FOR SECURITY POLICY APPLICATION BASED UPON A DUAL BITMAP SCHEME
Granted: September 7, 2023
Application Number:
20230283590
Systems, devices, and methods are discussed for identifying security policies applicable to a received information packet based upon a dual bitmap scheme accounting for bit position mergers and/or policies common to multiple bit positions.
SYSTEMS AND METHODS FOR AUTOMATED SD-WAN PERFORMANCE RULE FORMATION
Granted: September 7, 2023
Application Number:
20230283533
Systems, devices, and methods are discussed for defining and monitoring network communication performance in an SD-WAN environment.
MANAGEMENT OF INTERNET OF THINGS (IOT) BY SECURITY FABRIC
Granted: August 24, 2023
Application Number:
20230269224
The present invention relates to a method for managing IoT devices by a security fabric. A method is provided for managing IoT devices comprises collecting, by analyzing tier, data of Internet of Things (IoT) devices from a plurality of data sources, abstracting, by analyzing tier, profiled element baselines (PEBs) of IoT devices from the data, wherein each PEB includes characteristics of IoT devices; retrieving, by executing tier, the PEBs from the analyzing tier, wherein the executing…
SYSTEMS AND METHODS FOR ENHANCED KEY SECURITY IN AN SD-WAN NETWORK ENVIRONMENT
Granted: August 17, 2023
Application Number:
20230261859
Systems, devices, and methods are discussed for leveraging SD-WAN's property of redundant independent paths to enable out of band key exchange using the collection of available paths, dynamically managing link failures to keep the separation whenever possible, and/or signaling availability of quantum-safe data transfer to SD-WAN to enable quantum-safety to be used in SD-WAN policy decisions.
SYSTEMS AND METHODS FOR CONTAINER SERVER PROTECTION
Granted: August 3, 2023
Application Number:
20230247055
Systems, devices, and methods are discussed for enhancing security in a container server environment.
DYNAMIC LEAF DETERMINATION FOR TREE CREATIONS FOR HIGH-SPEED NETWORK POLICY SEARCH DURING DATA PACKET SCANNING
Granted: July 27, 2023
Application Number:
20230239213
During high-speed network policy searching for data packets, an upper limit and a lower limit for a policy count are predefined for a ratio of the policy count to the sum of the policy count and the range count. A policy tree builder generates a policy tree image from a set of recursive operations on the raw policy set including an on-the-fly determination of whether a specific node is a leaf based on a leaf policy count limit, wherein for a selected dimension, the specific node is…
MACHINE LEARNING FOR VISUAL SIMILARITY-BASED PHISHING DETECTION
Granted: July 20, 2023
Application Number:
20230231879
In one embodiment, a similarity index is calculated from characteristics of a suspected phishing web page to a database of known phishing web pages. The characteristics derive from both HTML tags of the suspected phishing web page and a screenshot of the suspected phishing web page. With machine learning using the similarity index as an input, a probability is estimated that the suspected web page comprises a known phishing web page from the database of known phishing web pages. A known…
LEVERAGING USER-BEHAVIOR ANALYTICS FOR IMPROVED SECURITY EVENT CLASSIFICATION
Granted: June 8, 2023
Application Number:
20230179617
Systems and methods for improving security event classification by leveraging user-behavior analytics are provided. According to an embodiment, a UEBA-based security event classification service of a cloud-based security platform maintains information regarding historical user behavior of various users of an enterprise network. An endpoint protection platform running on an endpoint device that is part of the enterprise network performs an initial classification of the event, based on…
SYSTEMS AND METHODS FOR BIOMETRIC AIDED NETWORK ACCESS CONTROL
Granted: June 8, 2023
Application Number:
20230179595
Various embodiments discussed generally relate to network security, and more particularly to systems and methods for using biometric data to enhance security in network access authorization.
SYSTEMS AND METHODS FOR PROACTIVELY UPGRADING LOW QUALITY ACCESS CREDENTIALS
Granted: June 8, 2023
Application Number:
20230179586
Systems, devices, and methods are discussed for proactively addressing low quality access credentials in a network environment.
Systems and Methods for Application Integrated Malicious Behavior Mitigation
Granted: June 8, 2023
Application Number:
20230177147
Various embodiments discussed generally relate to securing applications that work across networks, and more particularly to systems and methods for mitigating malicious behavior integrated within an application that directly calls a separate cloud based malicious behavior mitigation system.
ADJUSTING BEHAVIOR OF AN ENDPOINT SECURITY AGENT BASED ON NETWORK LOCATION
Granted: May 18, 2023
Application Number:
20230156014
Systems and methods for adjusting the behavior of an endpoint security agent based on a network location are provided. According to an embodiment, an agent of an endpoint device identifies whether a security service of a cloud-based security service is not reachable or is unresponsive. The security service is associated with a particular security function implemented by the agent. When the security service is not reachable or is unresponsive, the agent further determines whether the…
MACHINE-LEARNING BASED APPROACH FOR DYNAMICALLY GENERATING INCIDENT-SPECIFIC PLAYBOOKS FOR A SECURITY ORCHESTRATION, AUTOMATION AND RESPONSE (SOAR) PLATFORM
Granted: May 11, 2023
Application Number:
20230146804
Systems and methods for a machine-learning based approach for dynamically generating incident-specific playbooks for a security orchestration and automated response (SOAR) platform are provided. The SOAR platform captures information regarding execution of a sequence of actions performed by analysts responsive to a first incident of a first type. The captured information is fed into a machine-learning model. When a second incident, observed by the SOAR platform, is similar in nature to…
SYSTEMS AND METHODS FOR GRAPHICAL RUNTIME VALIDATED REPORT GENERATION
Granted: May 11, 2023
Application Number:
20230146247
Systems, devices, and methods are discussed that provide for developing custom reports.
MACHINE-LEARNING BASED APPROACH FOR DYNAMICALLY GENERATING INCIDENT-SPECIFIC PLAYBOOKS FOR A SECURITY ORCHESTRATION, AUTOMATION AND RESPONSE (SOAR) PLATFORM
Granted: May 11, 2023
Application Number:
20230146804
Systems and methods for a machine-learning based approach for dynamically generating incident-specific playbooks for a security orchestration and automated response (SOAR) platform are provided. The SOAR platform captures information regarding execution of a sequence of actions performed by analysts responsive to a first incident of a first type. The captured information is fed into a machine-learning model. When a second incident, observed by the SOAR platform, is similar in nature to…
SYSTEMS AND METHODS FOR GRAPHICAL RUNTIME VALIDATED REPORT GENERATION
Granted: May 11, 2023
Application Number:
20230146247
Systems, devices, and methods are discussed that provide for developing custom reports.
SYSTEMS AND METHODS FOR DEOBFUSCATION OF EXECUTABLE CODE
Granted: May 4, 2023
Application Number:
20230133651
Systems, devices, and methods are discussed that provide for discovering protected data from a code. Such detection provides an ability to discover potentially malicious code and/or datasets obfuscated within a code prior to full execution of the code.
SYSTEMS AND METHODS FOR UNPACKING PROTECTED DATA FROM OBFUSCATED CODE
Granted: May 4, 2023
Application Number:
20230140432
Systems, devices, and methods are discussed that provide for discovering protected data from a code. Such detection provides an ability to discover potentially malicious code and/or datasets obfuscated within a code prior to full execution of the code.