-
公开(公告)号:US20240039954A1
公开(公告)日:2024-02-01
申请号:US18365371
申请日:2023-08-04
Applicant: Zscaler, Inc.
Inventor: Shriyash Shete , Chakkaravarthy Periyasamy Balaiah , Karthikeyan Thamilarasu , Deepen Desai , Rubin Azad , Jithin Prajeev Nair , Raj Krishna
IPC: H04L9/40
CPC classification number: H04L63/1491 , H04L63/1425 , H04L63/1416
Abstract: Systems and methods are provided for performing risk assessment activities and preparing attained risk data for display on one or more user interfaces. In one implementation, a method may include the step of detecting one or more cybersecurity risk factors associated with an organization to determine a risk posture of the organization. The method may further include the step of attaining one or more remediation recommendations for enabling a person associated with the organization to select one or more actions for mitigating the one or more cybersecurity risk factors and improving the risk posture of the organization. Then, the method is configured to communicate display information to a user device associated with the organization, the display information including at least the one or more cybersecurity risk factors and the one or more remediation recommendations to be exhibited on a Graphical User Interface (GUI) of the user device.
-
公开(公告)号:US20240129338A1
公开(公告)日:2024-04-18
申请号:US18332140
申请日:2023-06-09
Applicant: Zscaler, Inc.
Inventor: Rubin Azad , Jithin Prajeev Nair , Deepen Desai , Chakkaravarthy Periyasamy Balaiah , Karthikeyan Thamilarasu , Shanghao Chen , Tejveer Singh
IPC: H04L9/40
CPC classification number: H04L63/1491 , H04L63/1416 , H04L63/1425
Abstract: Systems and methods are provided for evaluating the effectiveness of network security tools for mitigating network security risks. According to one implementation, a method includes the step of analyzing a network to measure security parameters associated with the use of one or more network security tools that are configured for mitigating risk with respect to network compromise, data loss, lateral movement, and asset exposure. Based on the measured security parameters, the method further includes the step of quantifying the one or more network security tools to determine an effectiveness score defining an ability of the one or more network security tools, in combination, to counteract the network compromise, data loss, lateral movement, and asset exposure.
-