DYNAMICALLY TAILORED TRUST FOR SECURE APPLICATION-SERVICE NETWORKING IN AN ENTERPRISE

    公开(公告)号:US20210044623A1

    公开(公告)日:2021-02-11

    申请号:US16867642

    申请日:2020-05-06

    Abstract: Dynamically tailored trust for secure application-server networking and advanced enterprise security is provided. A system can individually assess the security posture of each application connecting to the Internet from each client device in an enterprise. For each application, the system tailors a security mode of the Internet connection based on the security posture of the application. Assessment of the security posture of an application is a comprehensive inventory of the security of the application, the security of the device hosting the application, the rights and security of the user, security attributes of the intended service or website being accessed, the security of the communication channel, and so forth. A network-based controller communicates with an agent running within a secure boot mode of each client device to select a security mode for application-service connection, including lean-trust direct access to the Internet, secure VPN-like access, or no access to the Internet.

    DYNAMIC PRIORITIZATION OF ATTACK PATHS IN CLOUD NATIVE APPLICATION

    公开(公告)号:US20250097252A1

    公开(公告)日:2025-03-20

    申请号:US18470884

    申请日:2023-09-20

    Abstract: Techniques for using real-time metrics and telemetry information to dynamically prioritize attack paths identified during a static analysis of a cloud native application, and using top priority attack paths identified during the static analysis to steer the dynamic analysis. The techniques may include identifying components of the cloud native application and connections between the components. The components and connections are analyzed to identify a set of attack paths. Network communications are monitored between the connections and metrics representing signals in the communications collected. A first subset of the attack paths based on a first portion of the metric indicating a real-time security vulnerability are identified. Finally, the first subset of the attack paths is prioritized over a second subset of the attack paths based at least in part on the first subset having the first portion of the metrics indicating real-time security vulnerabilities.

    Per-device single sign-on across applications

    公开(公告)号:US11968201B2

    公开(公告)日:2024-04-23

    申请号:US17141007

    申请日:2021-01-04

    CPC classification number: H04L63/0815 H04L63/0807 H04L63/0884 H04L63/164

    Abstract: Operations include transmitting, on behalf of a first application, a first request to a first service provider, the first request requesting first services from the first service provider, intercepting, at a local agent, a first redirect message from the first service provider to an identity provider, receiving an identity provider cookie from the identity provider based on a validation of credentials during the authentication process, storing a copy of the identity provider cookie, transmitting, on behalf of a second application, a second request to a second service provider, the second request requesting second services from the second service provider, intercepting a second redirect message from the second service provider to the identity provider, adding the identity provider cookie to the second redirect message, and receiving validation to access the second service provider from the identity provider based on the identity provider cookie stored by the local agent.

Patent Agency Ranking