APPLICATION SECURITY POLICY MANAGEMENT AGENT
    12.
    发明申请

    公开(公告)号:US20200026865A1

    公开(公告)日:2020-01-23

    申请号:US16037141

    申请日:2018-07-17

    Abstract: A policy generation agent automatically generates a security policy for an application and a specified custom security manager. The agent launches an application in a development environment. The agent instantiates a development security manager based on a custom security manager defined by the application. The agent runs the application in the development environment, causing the application to request permissions from the development security manager. The development security manager passes the permissions request to the custom security manager and approves the one or more permissions. The custom security manger determines whether to approve or deny the request based on a permissions policy. Responsive to a determination to deny the request, the agent updates the permissions policy to approve subsequent requests for the permissions. The agent also associates the updated permissions policy with the application. The agent may enable different sections of the policy based on performance, security, or application stakeholder preference.

    DATA COMPLIANCE METADATA MARKING
    13.
    发明申请

    公开(公告)号:US20240380734A1

    公开(公告)日:2024-11-14

    申请号:US18780780

    申请日:2024-07-23

    Abstract: A method is provided that is performed using an application performance management agent running on an application and/or application microservices. The method comprises detecting a request to the application and/or application microservices for data, and inserting data compliance metadata into packet headers of packets that are to be sent in response to the request by the application and/or application microservices. The data compliance metadata comprises data-compliance markings associated with the data based on user/operator-defined data compliance requirements. The method further includes causing the packets to be sent into a network so that one or more network devices or services in the network can read the data compliance metadata and apply packet handling policies.

    MICROSERVICE VISIBILITY AND CONTROL
    15.
    发明公开

    公开(公告)号:US20240305603A1

    公开(公告)日:2024-09-12

    申请号:US18647322

    申请日:2024-04-26

    CPC classification number: H04L61/4511

    Abstract: Methods are provided in which a domain name system (DNS) service obtains a lookup request for information about a source of a traffic flow being transmitted to a network resource external of a service cluster and performs, based on the lookup request, a lookup operation for a microservice that is the source of the traffic flow, among a plurality of microservices of the service cluster registered with the DNS service. The methods further include providing information about the microservice based on the lookup operation. The information includes at least a name of the microservice for visibility of the microservice external of the service cluster.

    System and Method for Evaluating Penetration Testing Tools

    公开(公告)号:US20240152623A1

    公开(公告)日:2024-05-09

    申请号:US18052240

    申请日:2022-11-03

    CPC classification number: G06F21/577 G06F2221/033

    Abstract: A system and method for evaluating penetration testing tools. In one embodiment, a method includes generating a plurality of instructions, wherein the instructions comprise one or more security vulnerabilities for testing a web server, generating the web server, wherein the web server comprises the plurality of instructions with the one or more security vulnerabilities, receiving a penetration test result from a penetration testing tool executing on the web server, and computing a precision of the penetration testing tool for detecting the one or more security vulnerabilities.

    DATA COMPLIANCE METADATA MARKING
    17.
    发明公开

    公开(公告)号:US20240073186A1

    公开(公告)日:2024-02-29

    申请号:US17900516

    申请日:2022-08-31

    CPC classification number: H04L63/0245 H04L69/22

    Abstract: A method is provided that is performed using an application performance management agent running on an application and/or application microservices. The method comprises detecting a request to the application and/or application microservices for data, and inserting data compliance metadata into packet headers of packets that are to be sent in response to the request by the application and/or application microservices. The data compliance metadata comprises data-compliance markings associated with the data based on user/operator-defined data compliance requirements. The method further includes causing the packets to be sent into a network so that one or more network devices or services in the network can read the data compliance metadata and apply packet handling policies.

    Application Vulnerability Score Based on Stack Traces

    公开(公告)号:US20230252162A1

    公开(公告)日:2023-08-10

    申请号:US17835074

    申请日:2022-06-08

    CPC classification number: G06F21/577 G06F21/52 G06F2221/033

    Abstract: A computing system for identifying and scoring problems associated with call stacks. The computing system identifies call stacks associated with an application and determines a problem occurs in the application. The computer system compares a call stack of a first set of applications with a call stack of a second set of applications, wherein the call stack of the first set of applications includes the problem and the call stack of the second set of applications does not include the problem. The computer system generates a score indicating a likelihood that a particular call stack caused the problem based on whether the particular call stack is included in the call stack of the first set of applications, the call stack of the second set of applications, or both. The computing system generates a notification comprising the score indicating the likelihood that the particular call stack caused the problem.

    REAL-TIME DATA TRANSACTION CONFIGURATION OF NETWORK DEVICES

    公开(公告)号:US20220321483A1

    公开(公告)日:2022-10-06

    申请号:US17216879

    申请日:2021-03-30

    Abstract: Methods and apparatuses for prioritizing transactions are disclosed. An example method of an application performance monitor (APM) comprises intercepting a first packet being transmitted in a network that is monitored by the APM; determining that the first packet is associated with a transaction of the web application that is to be provided with an alternate level of service; modifying a field in the first packet to include metadata interpretable by at least one network device in the network to cause the at least one network device to provide the alternate level of service; and injecting the first packet into the network. The APM may cause network devices to prioritize a specific transaction of an application based on importance.

Patent Agency Ranking