Abstract:
In certain embodiments, a method comprises forming a cluster of peered network devices comprising a plurality of three or more peered network devices and a plurality of control information connections between pairs of the peered network devices. The method further comprises classifying a connection by associating the connection with an application, wherein a first peered network device associated with the cluster classifies the connection based at least in part on sequential payload packets associated with the connection, at least some of which the first device receives from other peered network devices associated with the cluster. The method also comprises sending control information over one of the control information connections between the first peered network device and a second peered network device associated with the cluster, wherein the control information comprises information regarding the classification of the connection.
Abstract:
A security gateway appliance is configured to evaluate network traffic according to security rules that classify traffic flows according to specifically identified application programs responsible for producing and/or consuming the network traffic and to enforce policies in accordance with network traffic classifications. The appliance includes an on-box anti-virus/anti-malware engine, on-box data loss prevention engine and on-box authentication engine. One or more of these engines is informed by an on-box dynamic real tie rating system that allows for determined levels of scrutiny to be paid to the network traffic. Security gateways of this type can be clustered together to provide a set of resources for one or more networks, and in some instances as the backbone of a cloud-based service.
Abstract:
The disclosed computer-implemented method for protecting users may include (i) intercepting, through a cloud-based security proxy service, network traffic originating from a mobile application at a mobile device connected to a local area network protected by the cloud-based security proxy service, (ii) detecting, by the cloud-based security proxy service, a threat indicator indicated by the mobile application, and (iii) modifying the network traffic originating from the mobile application at the mobile device by applying, by the cloud-based security proxy service based on detecting the threat indicator indicated by the mobile application, a security policy to protect the local area network from a candidate threat corresponding to the threat indicator. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
The disclosed computer-implemented method for verifying connection integrity may include (i) receiving a request from a client to initiate a connection to a server via a middlebox, (ii) receiving, from the client, via a side protocol executing in parallel with a transport layer security protocol, a request for a certificate for the middlebox, (iii) sending, to the client, via the side protocol, the certificate, (iv) receiving, from the client, via the side protocol, a request for an additional certificate from a device upstream of the middlebox, (v) requesting, from the device upstream of the middlebox, via the side protocol, the additional certificate, (vi) receiving, from the device upstream of the middlebox, via the side protocol, the additional certificate, (vii) sending, to the client, via the side protocol, the additional certificate, and (viii) relaying data via the connection. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
The disclosed computer-implemented method for protecting users may include (i) displaying, through a graphical user interface for a third-party security application executing within an operating system environment, a button for a user to select, (ii) displaying, through the graphical user interface, a prompt that prompts the user to select the button in order to receive a reward, (iii) configuring the graphical user interface such that selecting the button triggers both a conspicuous response that provides access to the reward and a more hidden response that initiates application of a security service to protect the user, and (iv) performing, based on receiving a selection of the button, both the conspicuous response and the more hidden response. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
The disclosed computer-implemented method for synchronizing microservice data stores may include (i) establishing, at a first network node, an instance of a first microservice for an application and an instance of a distinct second microservice, (ii) establishing, at a distinct second network node, an additional instance of the first microservice and an additional instance of the distinct second microservice, (iii) establishing a single network channel for synchronizing, between the first network node and the distinct second network node, a first data store for the first microservice and a second data store for the distinct second microservice, and (iv) synchronizing the first data store for the first microservice and the second data store for the distinct second microservice. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
The disclosed computer-implemented method for performing computing cluster node switchover may include (i) detecting an indication to switch an assignment of a transaction task away from a first network node in a computing cluster, (ii) executing, in response to detecting the indication, by each network node in a set of multiple network nodes within the computing cluster, a switchover algorithm to select a second network node, (iii) switching over the assignment of the transaction task from the first network node to the second network node, and (iv) performing, by the second network node, at least part of a remainder of the transaction task in response to switching over the assignment of the transaction task from the first network node to the second network node. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
The disclosed computer-implemented method for network traffic routing to reduce service congestion at a server may include (1) receiving, by the computing device and from the cloud server, a traffic routing policy, (2) identifying, for a transaction and using at least one hook inserted into an operating system of the computing device, metadata describing a traffic type, (3) comparing the metadata with the traffic routing policy to determine the transaction is bypass traffic, and (4) sending the bypass traffic from the computing device to a destination other than the cloud server. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
Application identification and control in a network device. In one embodiment, a method may include establishing, at a network device, a Virtual Private Network (VPN) tunnel through which all Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) traffic sent from or received at the network device is routed. The method may also include monitoring, at the network device, all TCP and UDP traffic sent from or received at the network device through the VPN tunnel. The method may further include extracting, at the network device, payload data from the monitored TCP and UDP traffic. The method may also include analyzing the extracted payload data to identify applications executing on the network device that sent or received the monitored TCP and UDP traffic. The method may further include taking, at the network device, a security action on the network device based on the identified applications.
Abstract:
A security gateway appliance is configured to evaluate network traffic according to security rules that classify traffic flows according to specifically identified application programs responsible for producing and/or consuming the network traffic and to enforce policies in accordance with network traffic classifications. The appliance includes an on-box anti-virus/anti-malware engine, on-box data loss prevention engine and on-box authentication engine. One or more of these engines is informed by an on-box dynamic real tie rating system that allows for determined levels of scrutiny to be paid to the network traffic. Security gateways of this type can be clustered together to provide a set of resources for one or more networks, and in some instances as the backbone of a cloud-based service.