Secure proxy
    21.
    发明授权

    公开(公告)号:US09954902B1

    公开(公告)日:2018-04-24

    申请号:US15592158

    申请日:2017-05-10

    Inventor: Tushaar Sethi

    Abstract: Methods and systems are provided herein to enable secure proxying of network traffic between trusted and untrusted environments. In particular, a secure proxy may be provided that includes a set of policies. The policies may be applicable to various network protocol layers (e.g., an application layer), network traffic types, and/or endpoint resolution. The set of policies may be used to inspect, restrict and/or modify traffic between the trusted and untrusted environment to ensure data and network security. A proxy device may use the set of policies, for example, to obtain current service-related information (such as the list of IP addresses) currently associated with a computing resource requested by an application. Such endpoint information may be used, in turn, to update a white list.

    Secure proxy
    23.
    发明授权

    公开(公告)号:US09660998B1

    公开(公告)日:2017-05-23

    申请号:US14874022

    申请日:2015-10-02

    Inventor: Tushaar Sethi

    Abstract: Methods and systems are provided herein to enable secure proxying of network traffic between trusted and untrusted environments. In particular, a secure proxy may be provided that includes a set of policies. The policies may be applicable to various network protocol layers (e.g., an application layer), network traffic types, and/or endpoint resolution. The set of policies may be used to inspect, restrict and/or modify traffic between the trusted and untrusted environment to ensure data and network security. A proxy device may use the set of policies, for example, to obtain current service-related information (such as the list of IP addresses) currently associated with a computing resource requested by an application. Such endpoint information may be used, in turn, to update a white list.

    Identifying sensitive data writes to data stores

    公开(公告)号:US10114960B1

    公开(公告)日:2018-10-30

    申请号:US14220880

    申请日:2014-03-20

    Abstract: Techniques for detecting access to computer system data by applications running on a computer system are described herein. Data access event log entries are recorded, the log entries including one or more metadata items associated with how the computer system application accessed the computer system data. The log entries are analyzed using correlations with other computer system events and, if improper access is detected, one or more operations relating to the type of data accessed and the type of violation are performed to mitigate the improper data access.

Patent Agency Ranking