Endpoint security architecture with programmable logic engine

    公开(公告)号:US11831658B2

    公开(公告)日:2023-11-28

    申请号:US16245770

    申请日:2019-01-11

    Applicant: Nuix Limited

    CPC classification number: H04L63/1416 H04L41/046 H04L63/0263 H04L63/20

    Abstract: The present invention provides an integrated, context-aware, security system that provides an adaptive endpoint security agent architecture model for a continuously monitoring and recording activity across an enterprise, specifically monitoring activity on endpoints, and subsequently detecting and blocking any malicious processes that may otherwise invade the enterprise and cause issues. The endpoint security agent architecture exposes a well-defined, public interface to the event data generated by the endpoint security agent in the form of a custom programming language by which a user can define the logic that the endpoint security agent executes in response to event data to perform detection of and response to suspicious activity.

    METHOD AND SYSTEM FOR IMPLEMENTING HIGH AVAILABILITY (HA) WEB APPLICATION FIREWALL (WAF) FUNCTIONALITY

    公开(公告)号:US20230370353A1

    公开(公告)日:2023-11-16

    申请号:US18227536

    申请日:2023-07-28

    Inventor: Ronald A. Lewis

    Abstract: Novel tools and techniques are provided for implementing firewall functionalities, and, more particularly, to methods, systems, and apparatuses for implementing high availability (“HA”) web application firewall (“WAF”) functionalities. In various embodiments, a first computing system might monitor network communications between a client and a server providing access to software applications, and might determine whether latency has been introduced as a result of at least one first WAF container having been launched and whether any introduced latency exceeds a predetermined threshold, each first WAF container being tuned to a corresponding software application and protecting the software application from network attacks. Based on a determination that latency has been introduced and based on a determination that the introduced latency exceeds the predetermined threshold, one or more second WAF containers may be launched, each being tuned to the corresponding software application. Subsequently, any unused or underutilized WAF containers may be decommissioned or deleted.

    POLICY CONSTRAINT FRAMEWORK FOR AN SDDC
    58.
    发明公开

    公开(公告)号:US20230367650A1

    公开(公告)日:2023-11-16

    申请号:US18227306

    申请日:2023-07-28

    Applicant: VMware, Inc.

    Abstract: Some embodiments of the invention provide a method for processing requests for performing operations on resources in a software defined datacenter (SDDC). The resources are software-defined (SD) resources in some embodiments. The method initially receives a request to perform an operation with respect to a first resource in the SDDC. The method identifies a policy that matches (i.e., is applicable to) the received request for the first resource by comparing a set of attributes of the request with sets of attributes of a set of policies that place constraints on operations specified for resources. In some embodiments, several sets of attributes for several policies can be expressed for resources at different hierarchal resource levels of the SDDC. The method rejects the received request when the identified policy specifies that the requested operation violates a constraint on operations specified for the first resource.

    Efficient matching of feature-rich security policy with dynamic content using user group matching

    公开(公告)号:US11818099B2

    公开(公告)日:2023-11-14

    申请号:US17479336

    申请日:2021-09-20

    Applicant: Forcepoint LLC

    Inventor: Kari Nurmela

    CPC classification number: H04L63/0245 H04L63/0263

    Abstract: A method for filtering data packets at a firewall system is disclosed that includes receiving a data packet having a plurality of fields at a processor, and determining whether a precondition exists, where an action is associated the precondition. The action associated with the precondition is performed if it is determined that the precondition exists. The data packet is processed using a plurality of rules if it is determined that the precondition does not exist for the one or more of the plurality of fields. A user associated with the data packet is identified, and it is determined whether one or more rules are stored in a cache for one or more of a plurality of groups associated with the user. The data packet is processed using the one or more rules stored in the cache if present.

    DYNAMIC SECURITY POLICY ENFORCEMENT METHOD FOR CONTAINER SYSTEM, RECORDING MEDIUM AND SYSTEM FOR PERFORMING THE SAME

    公开(公告)号:US20230362198A1

    公开(公告)日:2023-11-09

    申请号:US18135593

    申请日:2023-04-17

    CPC classification number: H04L63/20 H04L63/0263 H04L63/1416

    Abstract: Provided is a dynamic security policy enforcement system for a container system. The dynamic security policy enforcement system comprises a policy management unit for generating and managing a security policy for a container based on a structured format including a set of rules of a predetermined condition; a policy enforcement unit for checking the set of rules when the container requests a system call, changing the security policy of the structured format into a code in a preset format, and transferring the policy changed into the code to a kernel space; and a policy operation decision unit for enforcing the policy received from the policy enforcement unit in the kernel space based on a policy enforcement program that hooks the system call and generating a return value for performing a predetermined operation. Due to this, a policy can be applied to containers in all states including an initialization state and a running state at any time, and there is no need to restart the system or container to apply the policy.

Patent Agency Ranking