-
公开(公告)号:US20180191760A1
公开(公告)日:2018-07-05
申请号:US15820052
申请日:2017-11-21
CPC分类号: H04L63/1425 , H04L63/1433 , H04L67/18 , H04L67/22
摘要: A system and method for filtering detected anomalies in cloud service usage activities associated with an enterprise uses a trusted location analysis to filter detected anomalies. The locations from which the cloud usage activities are made are analyzed and designated as trusted or non-trusted. The trusted location determination is used to filter the detected anomalies that are associated with trusted locations and therefore may be of low risk. In this manner, actions can be taken only on detected anomalies that are associated with non-trusted locations and therefore may be high risk. The system and method of the present invention enable security incidents, anomalies and threats from cloud activity to be detected, filtered and annotated based on the location heuristics. The trusted location analysis identifies trusted locations automatically using cloud activity usage data and does not rely on potentially unreliable location data from user input.
-
公开(公告)号:US09853992B1
公开(公告)日:2017-12-26
申请号:US15144335
申请日:2016-05-02
CPC分类号: H04L63/1425 , H04L63/1433 , H04L67/18 , H04L67/22
摘要: A system and method for filtering detected anomalies in cloud service usage activities associated with an enterprise uses a trusted location analysis to filter detected anomalies. The locations from which the cloud usage activities are made are analyzed and designated as trusted or non-trusted. The trusted location determination is used to filter the detected anomalies that are associated with trusted locations and therefore may be of low risk. In this manner, actions can be taken only on detected anomalies that are associated with non-trusted locations and therefore may be high risk. The system and method of the present invention enable security incidents, anomalies and threats from cloud activity to be detected, filtered and annotated based on the location heuristics. The trusted location analysis identifies trusted locations automatically using cloud activity usage data and does not rely on potentially unreliable location data from user input.
-
公开(公告)号:US09674211B2
公开(公告)日:2017-06-06
申请号:US14618322
申请日:2015-02-10
发明人: Dejan Curcic , Rajiv Gupta , Kaushik Narayan , Prasad Raghavendra Somasamudram , Sekhar Sarukkai
CPC分类号: H04L63/1433 , H04L41/5022 , H04L41/5058 , H04L41/5096 , H04L63/20
摘要: A method of assessing a risk level of an enterprise using cloud-based services from one or more cloud service providers includes assessing provider risk scores associated with the one or more cloud service providers and in view of darknet intelligence data; assessing cloud service usage behavior and pattern of the enterprise; and generating a risk score for the enterprise based on the provider risk scores and on the cloud service usage behavior and pattern of the enterprise. The risk score is indicative of the risk of the enterprise relating to the use of the cloud-based services from the one or more cloud service providers.
-
公开(公告)号:US10999325B1
公开(公告)日:2021-05-04
申请号:US15789658
申请日:2017-10-20
发明人: Sandeep Chandana , Sekhar Sarukkai
IPC分类号: H04L29/06
摘要: A service action category based cloud security system and method implement cloud security by categorizing service actions of cloud service providers into a set of service action categories. The service action categorization is performed agnostic to the applications or functions provided by the cloud service providers and also agnostic to the cloud service providers. With the service actions of cloud service providers thus categorized, cloud security monitoring and threat detection can be performed based on service action categories. Thus, cloud security can be implemented without requiring knowledge of the applications supported by the cloud service providers and without knowing all of the individual service actions supported by the cloud service providers.
-
公开(公告)号:US09722895B1
公开(公告)日:2017-08-01
申请号:US14683898
申请日:2015-04-10
CPC分类号: H04L43/045 , H04L41/14 , H04L43/0876 , H04L63/102 , H04L63/1416 , H04L63/1433 , H04L63/20 , H04L67/10 , H04L67/22
摘要: A vendor usage assessment system analyzes network traffic from an enterprise data network and generates vendor usage analytics for the enterprise. In some embodiments, the vendor analytics may include vendor usage risk assessment. The vendor usage assessment system is advantageous applied to assess network security in view of an enterprise's network interactions with third party vendors or suppliers.
-
公开(公告)号:US09916554B2
公开(公告)日:2018-03-13
申请号:US15403956
申请日:2017-01-11
发明人: Dejan Curcic , Rajiv Gupta , Kaushik Narayan , Prasad Raghavendra Somasamudram , Sekhar Sarukkai
CPC分类号: G06Q10/0635 , H04L41/50 , H04L41/5032 , H04L63/1433 , H04L67/10
摘要: A method of assessing a risk level of an enterprise using cloud-based services from one or more cloud service providers includes assessing provider risk scores associated with the one or more cloud service providers; assessing cloud service usage behavior and pattern of the enterprise; and generating a risk score for the enterprise based on the provider risk scores and on the cloud service usage behavior and pattern of the enterprise. The risk score is indicative of the risk of the enterprise relating to the use of the cloud-based services from the one or more cloud service providers.
-
公开(公告)号:US20170185927A1
公开(公告)日:2017-06-29
申请号:US15403956
申请日:2017-01-11
发明人: Dejan Curcic , Rajiv Gupta , Kaushik Narayan , Prasad Raghavendra Somasamudram , Sekhar Sarukkai
CPC分类号: G06Q10/0635 , H04L41/50 , H04L41/5032 , H04L63/1433 , H04L67/10
摘要: A method of assessing a risk level of an enterprise using cloud-based services from one or more cloud service providers includes assessing provider risk scores associated with the one or more cloud service providers; assessing cloud service usage behavior and pattern of the enterprise; and generating a risk score for the enterprise based on the provider risk scores and on the cloud service usage behavior and pattern of the enterprise. The risk score is indicative of the risk of the enterprise relating to the use of the cloud-based services from the one or more cloud service providers.
-
8.
公开(公告)号:US10412102B1
公开(公告)日:2019-09-10
申请号:US15372643
申请日:2016-12-08
发明人: Vitali Fridman , Sekhar Sarukkai , Snehal Chennuru
IPC分类号: H04L29/06 , G06F21/62 , G06F16/901
摘要: A system for providing data loss prevention services includes an indexer system configured to generate a search index based on structured data to be protected and a detection system configured to receive the search index and network data content and to detect in the network data content for matching data based on the search index. The detection system includes a first processor and multiple graphical processing units. The first processor provides words from the network data content in parallel to each of the graphical processing units, each graphical processing unit receiving a different word from the network data content. The graphical processing units perform detection of the words in parallel to detect for matched data content in at least a portion of the search index.
-
公开(公告)号:US10291638B1
公开(公告)日:2019-05-14
申请号:US15260189
申请日:2016-09-08
发明人: Sandeep Chandana , Santosh Raghuram Kumar , Sekhar Sarukkai , Satyanarayana Vummidi , Madhavi Kavathekar , Vinay Gupta
摘要: A cloud security system and method implements cloud activity threat detection using analysis of cloud usage user behavior. In particular, the cloud security system and method implements threat detection for users, cloud service providers, or tenants (enterprises) of the cloud security system who are new or unknown to the cloud security system and therefore lacking sufficient cloud activity data to generate an accurate behavior model for effective threat detection. In accordance with embodiments of the present invention, the cloud security system and method performs user behavior analysis to generate generalized user behavior models for user groups, where each user group includes users with similar cloud usage behavior. The user behavior models of the user groups are assigned to users with sparse cloud activity data. In this manner, the cloud security system and method of the present invention ensures effective threat detection by using accurate and reliable user behavior models.
-
公开(公告)号:US20180225606A1
公开(公告)日:2018-08-09
申请号:US15885165
申请日:2018-01-31
发明人: Dejan Curcic , Rajiv Gupta , Kaushik Narayan , Prasad Raghavendra Somasamudram , Sekhar Sarukkai
CPC分类号: G06Q10/0635 , H04L41/50 , H04L41/5032 , H04L63/1433 , H04L67/10
摘要: A method of assessing a risk level of an enterprise using cloud-based services from one or more cloud service providers includes assessing provider risk scores associated with the one or more cloud service providers; assessing cloud service usage behavior and pattern of the enterprise; and generating a risk score for the enterprise based on the provider risk scores and on the cloud service usage behavior and pattern of the enterprise. The risk score is indicative of the risk of the enterprise relating to the use of the cloud-based services from the one or more cloud service providers.
-
-
-
-
-
-
-
-
-