-
公开(公告)号:US20180109544A1
公开(公告)日:2018-04-19
申请号:US15809297
申请日:2017-11-10
发明人: Joshua Charles Neil , Michael Edward Fisk , Alexander William Brugh , Curtis Lee Hash, Jr. , Curtis Byron Storlie , Benjamin Uphoff , Alexander Kent
CPC分类号: H04L63/1425 , G06F21/577 , G06N5/02 , G06N7/005 , H04L1/002 , H04L63/1408 , H04L63/1416 , H04L63/1433 , H04L2463/144
摘要: A system, apparatus, computer-readable medium, and computer-implemented method are provided for detecting anomalous behavior in a network. Historical parameters of the network are determined in order to determine normal activity levels. A plurality of paths in the network are enumerated as part of a graph representing the network, where each computing system in the network may be a node in the graph and the sequence of connections between two computing systems may be a directed edge in the graph. A statistical model is applied to the plurality of paths in the graph on a sliding window basis to detect anomalous behavior. Data collected by a Unified Host Collection Agent (“UHCA”) may also be used to detect anomalous behavior.
-
公开(公告)号:US09946879B1
公开(公告)日:2018-04-17
申请号:US14837385
申请日:2015-08-27
发明人: Nima Sharifi Mehr
CPC分类号: G06F21/577 , G06F8/60 , G06F17/30725 , G06F21/56 , G06F2221/033 , G06F2221/2145
摘要: Disclosed are various embodiments for establishing risk profiles for software packages that have an insufficient security history. A security history for a software package is received. It is determined that the security history does not meet a sufficiency threshold. One or more other software packages are identified that are similar to the software package and have a corresponding security history that meets the sufficiency threshold. A risk profile of the software package is generated based at least in part on the corresponding security history of the other software package(s).
-
63.
公开(公告)号:US09942261B2
公开(公告)日:2018-04-10
申请号:US15464746
申请日:2017-03-21
CPC分类号: H04L63/1433 , G06F21/552 , G06F21/577 , H04L63/1408
摘要: An identity and access management (IAM) system is associated with a set of data sources from which data is collected. A set of vulnerabilities that the IAM system should attempt to detect is identified. For each vulnerability to be detected, a prioritized list of strategies used to detect that vulnerability is generated. Preferably, each strategy specifies the type(s) of data required to detect that vulnerability. An algorithm to determine a best strategy to be used for detecting each vulnerability, preferably based on the data available from the data sources, is then identified. The IAM system then collects data in an optimized manner. In particular, during the collection process, the IAM system preferably collects only what is necessary based on the configuration, even if the data source is capable of providing additional data. The collected data is then processed to detect security vulnerabilities associated with the IAM accounts.
-
公开(公告)号:US09942218B2
公开(公告)日:2018-04-10
申请号:US14962689
申请日:2015-12-08
CPC分类号: H04L63/0823 , G06F17/212 , G06F17/248 , G06F21/577 , H04L9/3268 , H04L63/20
摘要: A compliance application automatically produces certification controls by translating framework controls. The framework controls are common certification controls used in production of the certification. The application retrieves framework controls including metadata from a compliance framework data store. Metadata of the framework controls map the framework controls to the certification. In addition, the application retrieves certification parity data associated with the metadata. Certification controls are produced based on the framework controls and the certification parity data. A view of the certification including the certification controls is provided to a customer requesting the certification.
-
公开(公告)号:US09940465B2
公开(公告)日:2018-04-10
申请号:US15262631
申请日:2016-09-12
CPC分类号: G06F21/577 , G06F17/211 , G06F17/2211 , G06F17/27 , G06F17/272 , G06F17/2765 , G06F21/552 , G06F21/554 , G06F21/563 , H04L63/1408 , H04L63/1433 , H04L63/168
摘要: A hybrid string constructor includes a database configured to store a set of known concretizations. A processor is configured to compare the one or more string components to the set of known concretizations to determine string components from input string information that may be represented concretely, to abstract all string components that could not be represented concretely, and to create a hybrid string representation that includes at least one concrete string component and at least one abstracted string component. The set of known concretizations includes string configurations that cannot be interfered with by an attacker.
-
公开(公告)号:US20180096154A1
公开(公告)日:2018-04-05
申请号:US15715020
申请日:2017-09-25
IPC分类号: G06F21/57
CPC分类号: G06F21/577 , G06F21/572 , G06F21/575 , G06F2221/034
摘要: An example computing system in accordance with an aspect of the present disclosure includes a first controller and a second controller. The first controller is to verify integrity of a first root of trust (ROT), and generate an integrity signal indicating the results. The second controller is to verify integrity of a second ROT, write the firmware image to the first controller, and verify integrity of the written firmware image.
-
公开(公告)号:US09934384B2
公开(公告)日:2018-04-03
申请号:US14581358
申请日:2014-12-23
CPC分类号: G06F21/577 , G06F8/61 , G06F2221/033 , G06F2221/2101 , G06F2221/2117 , G06F2221/2141 , H04L63/0876 , H04L63/1433 , H04W4/02
摘要: Disclosed are various embodiments for assessing risk associated with a software application on a user computing device in an enterprise networked environment. An application rating is generated for the software application based at least in part on application characteristics. A risk analysis for the installation of the application is generated based at least in part on the application rating, the user computing device, and user information.
-
公开(公告)号:US20180089437A1
公开(公告)日:2018-03-29
申请号:US15274364
申请日:2016-09-23
CPC分类号: G06F21/577 , G06F2221/034 , H04L63/1433
摘要: Techniques that facilitate automated security testing of one or more mobile applications and/or one or more backend servers for the one or more mobile applications are provided. In one example, a system includes an analysis component and a security component. The analysis component can analyze computer instructions of a mobile application. The analysis component can also determine an identifier pattern comprising an application programming interface for one or more server endpoints associated with the mobile application. The security component can perform a security test for a server device based on the identifier pattern for the one or more server endpoints.
-
公开(公告)号:US20180083999A1
公开(公告)日:2018-03-22
申请号:US15271655
申请日:2016-09-21
发明人: Mathew S. Cherian
IPC分类号: H04L29/06
CPC分类号: H04L63/1433 , G06F21/00 , G06F21/577 , H04L63/20
摘要: A method and system for creating a security rating for a sub-entity of an entity. The security rating of the sub-entity is calculated based on an entity map provided by a representative of the entity. The sub-entity map details which assets of an entity belong to one or more of its sub-entities. It is advantageous to know the security rating of a sub-entity of an entity when an at-risk company is making a decision on whether or not to conduct business with a sub-entity whose security rating may different than that of the entity to which it belongs.
-
70.
公开(公告)号:US20180083843A1
公开(公告)日:2018-03-22
申请号:US15707905
申请日:2017-09-18
申请人: Anand Sambandam
发明人: Anand Sambandam
CPC分类号: H04L41/5009 , G06F21/577 , H04L41/06 , H04L41/5032 , H04W8/18
摘要: Disclosed is a method for facilitating management of at least one service agreement associated with a user and at least one service provider. The method may include receiving, using a communication device, a service agreement from a service provider system. Further, the method may include performing, using a processing device, one or more of analyzing the service agreement, identifying at least one collectable data associated with the user account and identifying at least one action associated with the at least one collectable data. Further, the method may include storing, using a storage device, each of the at least one collectable data and the at least one action in association with the service agreement. Further, the method may include transmitting, using the communication device, each of the at least one collectable data and the at least one action to a user device associated with the user account.
-
-
-
-
-
-
-
-
-