-
公开(公告)号:US20230018068A1
公开(公告)日:2023-01-19
申请号:US17829361
申请日:2022-06-01
Applicant: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BRADY SCHULMAN , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , DANESH IRANI
Inventor: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BRADY SCHULMAN , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , DANESH IRANI
IPC: H04L9/40
Abstract: In one aspect, a computerized system for locating anomalous query activity with a cloud-based database, comprising: with an atypical query engine: analyzing and understanding data within a cloud-based database, processing all accesses to the data within cloud-based database and SAAS environment, generating a list of user that accesses a table from a location in the cloud-based database using, and capture a set of specified key statistics about the cloud-based database query; and role suggestion engine: generating a user behavior fingerprint comprising a history of the user's behavior within the cloud-based database, identifying that a user is an outlier with respect to behavior with respect to the set of specified key statistics, and suggesting a new role within an enterprise managing the cloud-based database for the user, wherein the fingerprint of the outlier user is used to generate the suggestion for the new role.
-
公开(公告)号:US20220272111A1
公开(公告)日:2022-08-25
申请号:US17527466
申请日:2021-11-16
Applicant: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BHARATHWAJ SANKARA VISWANATHAN , BRADY SCHULMAN , MATTHEW FINN , PAUL JOHN LESIAK , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , MANISH ARIGALA
Inventor: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BHARATHWAJ SANKARA VISWANATHAN , BRADY SCHULMAN , MATTHEW FINN , PAUL JOHN LESIAK , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , MANISH ARIGALA
IPC: H04L9/40
Abstract: In one aspect, a method for implementing a cloud-platform push for one or more known data breaches includes the step of, for each data breach of the one or more known data breaches, providing a functionality that maps one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes generating a security rule for each mapped kill chain or TTP based on the functionality that maps the one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes pushing the security rule to an enterprise so that the enterprise is aware of a vulnerability in the data breach. A step includes generating a customized posture for a Virtual private cloud (VPC) in the enterprise's cloud-based network. A step includes determining that the data breach can occur within the enterprise's cloud-based network.
-
公开(公告)号:US12294589B2
公开(公告)日:2025-05-06
申请号:US17527466
申请日:2021-11-16
Applicant: Supreeth Hosur Nagesh Rao , Navindra Yadav , Ravi Sankuratri , Alok Lalit Wadhwa , Aria Rahadian , Bharathwaj Sankara Viswanathan , Brady Schulman , Matthew Finn , Paul John Lesiak , Ravi Shanker Prasad , Vasil Dochkov Yordanov , Yiwei Wang , Zhiwen Zhang , Udayan Joshi , Soumyadeep Choudhury , Muhammada Furqan , Manish Arigala
Inventor: Supreeth Hosur Nagesh Rao , Navindra Yadav , Ravi Sankuratri , Alok Lalit Wadhwa , Aria Rahadian , Bharathwaj Sankara Viswanathan , Brady Schulman , Matthew Finn , Paul John Lesiak , Ravi Shanker Prasad , Vasil Dochkov Yordanov , Yiwei Wang , Zhiwen Zhang , Udayan Joshi , Soumyadeep Choudhury , Muhammada Furqan , Manish Arigala
Abstract: In one aspect, a method for implementing a cloud-platform push for one or more known data breaches includes the step of, for each data breach of the one or more known data breaches, providing a functionality that maps one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes generating a security rule for each mapped kill chain or TTP based on the functionality that maps the one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes pushing the security rule to an enterprise so that the enterprise is aware of a vulnerability in the data breach. A step includes generating a customized posture for a Virtual private cloud (VPC) in the enterprise's cloud-based network. A step includes determining that the data breach can occur within the enterprise's cloud-based network.
-
公开(公告)号:US12289331B2
公开(公告)日:2025-04-29
申请号:US17829361
申请日:2022-06-01
Applicant: Supreeth Hosur Nagesh Rao , Navindra Yadav , Ravi Sankuratri , Alok Lalit Wadhwa , Aria Rahadian , Brady Schulman , Ravi Shanker Prasad , Vasil Dochkov Yordanov , Yiwei Wang , Zhiwen Zhang , Udayan Joshi , Soumyadeep Choudhury , Muhammada Furqan , Danesh Irani
Inventor: Supreeth Hosur Nagesh Rao , Navindra Yadav , Ravi Sankuratri , Alok Lalit Wadhwa , Aria Rahadian , Brady Schulman , Ravi Shanker Prasad , Vasil Dochkov Yordanov , Yiwei Wang , Zhiwen Zhang , Udayan Joshi , Soumyadeep Choudhury , Muhammada Furqan , Danesh Irani
IPC: H04L9/40
Abstract: In one aspect, a computerized system for locating anomalous query activity with a cloud-based database, comprising: with an atypical query engine: analyzing and understanding data within a cloud-based database, processing all accesses to the data within cloud-based database and SAAS environment, generating a list of user that accesses a table from a location in the cloud-based database using, and capture a set of specified key statistics about the cloud-based database query; and role suggestion engine: generating a user behavior fingerprint comprising a history of the user's behavior within the cloud-based database, identifying that a user is an outlier with respect to behavior with respect to the set of specified key statistics, and suggesting a new role within an enterprise managing the cloud-based database for the user, wherein the fingerprint of the outlier user is used to generate the suggestion for the new role.
-
公开(公告)号:US20220407883A1
公开(公告)日:2022-12-22
申请号:US17711031
申请日:2022-04-01
Applicant: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BRADY SCHULMAN , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , DANESH IRANI
Inventor: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BRADY SCHULMAN , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , DANESH IRANI
IPC: H04L9/40
Abstract: In one aspect, a computerized method for locating one or more shadow vulnerable datastores for cloud-platform datastores includes the step of identifying a cloned data store of an original datastore in a cloud database instance. It includes the step of determining that the cloned datastore comprises a shadow vulnerable datastore. It includes the step of defining a security posture of the cloned datastore. It includes the step of publishing a digitized data clone security differential report comprising the security posture and one or more remediations to fix security posture issues.
-
-
-
-