Movatterモバイル変換


[0]ホーム

URL:


US20160212167A1 - Classification of security policies across multiple security products - Google Patents

Classification of security policies across multiple security products
Download PDF

Info

Publication number
US20160212167A1
US20160212167A1US14/600,436US201514600436AUS2016212167A1US 20160212167 A1US20160212167 A1US 20160212167A1US 201514600436 AUS201514600436 AUS 201514600436AUS 2016212167 A1US2016212167 A1US 2016212167A1
Authority
US
United States
Prior art keywords
security
policy
policies
network
security policy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US14/600,436
Other versions
US9401933B1 (en
Inventor
Yedidya Dotan
Sanjay Agarwal
Robin Martherus
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cisco Technology Inc
Original Assignee
Cisco Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cisco Technology IncfiledCriticalCisco Technology Inc
Priority to US14/600,436priorityCriticalpatent/US9401933B1/en
Assigned to CISCO TECHNOLOGY, INC.reassignmentCISCO TECHNOLOGY, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: DOTAN, YEDIDYA, AGARWAL, SANJAY, MARTHERUS, ROBIN
Priority to PCT/US2016/013850prioritypatent/WO2016118478A2/en
Priority to EP21167280.3Aprioritypatent/EP3866040A1/en
Priority to EP16703876.9Aprioritypatent/EP3248134B1/en
Priority to US15/189,755prioritypatent/US9769210B2/en
Publication of US20160212167A1publicationCriticalpatent/US20160212167A1/en
Application grantedgrantedCritical
Publication of US9401933B1publicationCriticalpatent/US9401933B1/en
Expired - Fee Relatedlegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

A management entity connects with multiple security devices across a network. Each security device operates in accordance with one or more security policies. The management entity imports, over the network, data describing the security policies from the multiple security devices. The management entity classifies the imported security policies into security policy classifications based on commonality in information included in the security policies across the multiple security devices.

Description

Claims (25)

What is claimed is:
1. A method comprising:
at a management entity:
connecting with multiple security devices across a network, each security device configured to operate in accordance with one or more security policies;
importing, over the network, data describing the security policies from the multiple security devices; and
classifying the imported security policies into security policy classifications based on commonality in information included in the security policies across the multiple security devices.
2. The method ofclaim 1, wherein:
the importing includes importing each security policy as one or more security rules, each security rule including a set of rule parameters configured to permit or deny access to a resource based on a network protocol, source and destination addresses, and a device port; and
the classifying includes classifying the security policies into the security policy classifications based on commonality between the security rules across the multiple security devices.
3. The method ofclaim 2, wherein the classifying includes:
classifying security policies which have identical security rules into one or more identical security policy classifications;
classifying security policies which have similar security rules into one or more similar security policy classifications; and
classifying security policies which have unique security rules into a unique security policy classification.
4. The method ofclaim 3, further comprising:
classifying security policies not already classified into a security policy classification indicating further investigation is needed for certain security policies; and
generating an alert notification indicating that one or more security policies need further investigation.
5. The method ofclaim 3, further comprising comparing the rule parameters of each rule of each security policy across the security policies, wherein the classifying further includes classifying based on results of the comparing by:
classifying the security policies into the identical security policy classification if all of their associated rule parameters are equivalent to each other;
classifying the security policies into the similar security policy classification if only some of their associated rule parameters are equivalent to each other; and
classifying the security policies into a unique security policy classification if none of the associated rule parameters are equivalent to each other.
6. The method ofclaim 3, further comprising displaying a list of the rule parameters for each of the security policy classifications.
7. The method ofclaim 3, further comprising:
displaying the security policy classifications as selectable security policy classifications;
displaying a policy template naming option through which a policy template name may be entered;
receiving an entered policy template name and selections of multiple security policy classifications; and
assigning all of the security policies in the multiple selected security policy classifications to a security policy template having the entered policy template name.
8. The method ofclaim 2, further comprising:
displaying the security policy classifications in unexpanded views;
displaying the an expand option associated with each of the displayed security policy classifications;
receiving a selection of one of the expand options; and
displaying the security policy classification associated with the selected expand option in an expanded view that exposes device names of all of the security devices associated with that security policy classification.
9. The method ofclaim 8, wherein:
the displaying further includes displaying a filter option to specify a rule parameter associated with the security policy classifications;
receiving a specified rule parameter through the filter option; and
displaying all of the rules in each security policy classifications that include a rule parameter that matches the specified rule parameter.
10. An apparatus comprising:
a network interface unit to connect with a network; and
a processor coupled to the network interface unit to:
connect with multiple security devices across a network, each security device configured to operate in accordance with one or more security policies;
import, over the network, data describing the security policies from the multiple security devices; and
classify the imported security policies into security policy classifications based on commonality in information included in the security policies across the multiple security devices.
11. The apparatus ofclaim 10, wherein:
the processor imports by importing each security policy as one or more security rules, each security rule including a set of rule parameters configured to permit or deny access to a resource based on a network protocol, source and destination addresses, and a device port; and
the processor classifies by classifying the security policies into the security policy classifications based on commonality between the security rules across the security devices.
12. The apparatus ofclaim 11, wherein the processor classifies by:
classifying security policies which have identical security rules into one or more identical security policy classifications;
classifying security policies which have similar security rules into one or more similar security policy classifications; and
classifying security policies which have unique security rules into a unique security policy classification.
13. The apparatus ofclaim 12, wherein the processor further:
classifies security policies not already classified into a security policy classification indicating further investigation is needed for certain security policies; and
generates an alert notification indicating that one or more security policies need further investigation.
14. The apparatus ofclaim 12, wherein the processor further compares the rule parameters of each rule of each security policy across the security policies, and classifies further based on results of the compare by:
classifying the security policies into the identical security policy classification if all of their associated rule parameters are equivalent to each other;
classifying the security policies into the similar security policy classification if only some of their associated rule parameters are equivalent to each other; and
classifying security policies into the unique security policy classification if none of the associated rule parameters are equivalent to each other.
15. The apparatus ofclaim 12, wherein the processor generates for display a list of the rule parameters for each of the security policy classifications.
16. The apparatus ofclaim 11, wherein the processor further:
generates for display the security policy classifications in unexpanded views;
generates for display an expand option associated with each of the displayed security policy classifications;
receives a selection of one of the expand options; and
generates for display the security policy classification associated with the selected expand option in an expanded view that exposes device names of all of the security devices associated with that security policy classification.
17. The apparatus ofclaim 16, wherein the processor further:
generates for display a filter option to specify a rule parameter associated with the security policy classifications;
receives a specified rule parameter through the filter option; and
generates for display all of the rules in each security policy classifications that include a rule parameter that matches the specified rule parameter.
18. A non-transitory tangible computer readable storage media encoded with instructions that, when executed by a processor, cause the processor to:
connect with multiple security devices across a network, each security device configured to operate in accordance with one or more security policies;
import, over the network, data describing the security policies from the multiple security devices; and
classify the imported security policies into security policy classifications based on commonality in information included in the security policies across the multiple security devices.
19. The computer readable storage media ofclaim 18, wherein:
the instructions to cause the processor to import include instructions to cause the processor to import each security policy as one or more security rules, each security rule including a set of rule parameters configured to permit or deny access to a resource based on a network protocol, source and destination addresses, and a device port; and
the instructions to cause the processor to classify include instructions to cause the processor to classify the security policies into the security policy classifications based on commonality between the security rules across the security devices.
20. The computer readable storage media ofclaim 19, wherein the instructions to cause the processor to classify include instructions to cause the processor to:
classify security policies which have identical security rules into one or more identical security policy classifications;
classify security policies which have similar security rules into one or more similar security policy classifications; and
classify security policies which have unique security rules into a unique security policy classification.
21. The computer readable storage media ofclaim 20, further comprising instructions to cause the processor to:
classify security policies not already classified into a security policy classification indicating further investigation is needed for certain security policies; and
generate an alert notification indicating that one or more security policies need further investigation.
22. The computer readable storage media ofclaim 20, further comprising instructions to cause the processor to compare the rule parameters of each rule of each security policy across the security policies, wherein the instructions to cause the processor to classify include further instructions to cause the processor to, based on results of the compare:
classify the security policies into the identical security policy classification if all of their associated rule parameters are equivalent to each other;
classify the security policies into the similar security policy classification if only some of their associated rule parameters are equivalent to each other; and
classify security policies into the unique security policy classification if none of the associated rule parameters are equivalent to each other.
23. The computer readable storage media ofclaim 20, further comprising instructions to cause the processor to generate for display a list of the rule parameters for each of the security policy classifications.
24. The computer readable storage media ofclaim 19, further comprising instructions to cause the processor to:
generate for display the security policy classifications in unexpanded views;
generate for display an expand option associated with each of the displayed security policy classifications;
receive a selection of one of the expand options; and
generate for display the security policy classification associated with the selected expand option in an expanded view that exposes device names of all of the security devices associated with that security policy classification.
25. The computer readable storage media ofclaim 24, further comprising instructions to cause the processor to:
generate for display a filter option to specify a rule parameter associated with the security policy classifications;
receive a specified rule parameter through the filter option; and
generate for display all of the rules in each security policy classifications that include a rule parameter that matches the specified rule parameter.
US14/600,4362015-01-202015-01-20Classification of security policies across multiple security productsExpired - Fee RelatedUS9401933B1 (en)

Priority Applications (5)

Application NumberPriority DateFiling DateTitle
US14/600,436US9401933B1 (en)2015-01-202015-01-20Classification of security policies across multiple security products
PCT/US2016/013850WO2016118478A2 (en)2015-01-202016-01-19Security policy unification across different security products
EP21167280.3AEP3866040A1 (en)2015-01-202016-01-19Security policy unification across different security products
EP16703876.9AEP3248134B1 (en)2015-01-202016-01-19Security policy unification across different security products
US15/189,755US9769210B2 (en)2015-01-202016-06-22Classification of security policies across multiple security products

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US14/600,436US9401933B1 (en)2015-01-202015-01-20Classification of security policies across multiple security products

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US15/189,755ContinuationUS9769210B2 (en)2015-01-202016-06-22Classification of security policies across multiple security products

Publications (2)

Publication NumberPublication Date
US20160212167A1true US20160212167A1 (en)2016-07-21
US9401933B1 US9401933B1 (en)2016-07-26

Family

ID=56408695

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US14/600,436Expired - Fee RelatedUS9401933B1 (en)2015-01-202015-01-20Classification of security policies across multiple security products
US15/189,755ActiveUS9769210B2 (en)2015-01-202016-06-22Classification of security policies across multiple security products

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US15/189,755ActiveUS9769210B2 (en)2015-01-202016-06-22Classification of security policies across multiple security products

Country Status (1)

CountryLink
US (2)US9401933B1 (en)

Cited By (48)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20160344738A1 (en)*2015-05-192016-11-24Cisco Technology, Inc.Determining Similarity Between Security Rules Based On Weighted Comparisons Of Their Rule Parameters
US20160359905A1 (en)*2015-06-082016-12-08Illusive Networks Ltd.Automatically generating network resource groups and assigning customized decoy policies thereto
USD776147S1 (en)*2015-12-052017-01-10Velvet Ropes, Inc.Mobile device having graphical user interface
US20170208094A1 (en)*2016-01-142017-07-20Cisco Technology, Inc.Policy block creation with context-sensitive policy line classification
US9762619B1 (en)*2016-08-302017-09-12Nicira, Inc.Multi-layer policy definition and enforcement framework for network virtualization
USD797791S1 (en)*2016-03-222017-09-19Teletracking Technologies, Inc.Display screen with graphical user interface
CN109286617A (en)*2018-09-132019-01-29郑州云海信息技术有限公司 A data processing method and related equipment
US20190065755A1 (en)*2017-08-312019-02-28International Business Machines CorporationAutomatic transformation of security event detection rules
US20190081986A1 (en)*2016-06-152019-03-14Empow Cyber Security Ltd.Classification of security rules
US10333976B1 (en)2018-07-232019-06-25Illusive Networks Ltd.Open source intelligence deceptions
US10333977B1 (en)2018-08-232019-06-25Illusive Networks Ltd.Deceiving an attacker who is harvesting credentials
USD852811S1 (en)*2017-02-142019-07-02Roche Diabetes Care, Inc.Display screen with graphical user interface for glucose monitoring system
USD852812S1 (en)*2017-02-142019-07-02Roche Diabetes Care, Inc.Display screen with graphical user interface for glucose monitoring system
US10382483B1 (en)2018-08-022019-08-13Illusive Networks Ltd.User-customized deceptions and their deployment in networks
US10382484B2 (en)2015-06-082019-08-13Illusive Networks Ltd.Detecting attackers who target containerized clusters
US10382278B1 (en)*2018-01-312019-08-13EMC IP Holding Company LLCProcessing platform with independent definition and mutual enforcement of operational and application policies
US10404747B1 (en)2018-07-242019-09-03Illusive Networks Ltd.Detecting malicious activity by using endemic network hosts as decoys
US10432665B1 (en)2018-09-032019-10-01Illusive Networks Ltd.Creating, managing and deploying deceptions on mobile devices
US10503536B2 (en)2016-12-222019-12-10Nicira, Inc.Collecting and storing threat level indicators for service rule processing
CN110674109A (en)*2019-09-062020-01-10中国平安财产保险股份有限公司Data import method, system, computer device and computer readable storage medium
US10581960B2 (en)2016-12-222020-03-03Nicira, Inc.Performing context-rich attribute-based load balancing on a host
US10609160B2 (en)2016-12-062020-03-31Nicira, Inc.Performing context-rich attribute-based services on a host
US10606626B2 (en)2014-12-292020-03-31Nicira, Inc.Introspection method and apparatus for network access filtering
US10630695B2 (en)*2017-06-292020-04-21Amazon Technologies, Inc.Security policy monitoring service
US10757128B2 (en)2017-06-292020-08-25Amazon Technologies, Inc.Security policy analyzer service and satisfiability engine
US10778651B2 (en)2017-11-152020-09-15Nicira, Inc.Performing context-rich attribute-based encryption on a host
US10798058B2 (en)2013-10-012020-10-06Nicira, Inc.Distributed identity-based firewalls
US10805332B2 (en)2017-07-252020-10-13Nicira, Inc.Context engine model
US10803173B2 (en)2016-12-222020-10-13Nicira, Inc.Performing context-rich attribute-based process control services on a host
US10802893B2 (en)2018-01-262020-10-13Nicira, Inc.Performing process control services on endpoint machines
US10810316B2 (en)2017-05-152020-10-20International Business Machines CorporationUpdating monitoring systems using merged data policies
US10812451B2 (en)2016-12-222020-10-20Nicira, Inc.Performing appID based firewall services on a host
US10862773B2 (en)2018-01-262020-12-08Nicira, Inc.Performing services on data messages associated with endpoint machines
US10868836B1 (en)*2017-06-072020-12-15Amazon Technologies, Inc.Dynamic security policy management
US10938837B2 (en)2016-08-302021-03-02Nicira, Inc.Isolated network stack to manage security for virtual machines
US11032246B2 (en)2016-12-222021-06-08Nicira, Inc.Context based firewall services for data message flows for multiple concurrent users on one machine
US11108728B1 (en)2020-07-242021-08-31Vmware, Inc.Fast distribution of port identifiers for rule processing
US11212322B2 (en)*2018-10-102021-12-28Rockwelll Automation Technologies, Inc.Automated discovery of security policy from design data
US11228610B2 (en)2016-06-152022-01-18Cybereason Inc.System and method for classifying cyber security threats using natural language processing
CN114205125A (en)*2021-11-252022-03-18北京国泰网信科技有限公司 A security zone-based policy management method, device, device and medium
US11281485B2 (en)2015-11-032022-03-22Nicira, Inc.Extended context delivery for context-based authorization
CN114786025A (en)*2022-04-012022-07-22北京达佳互联信息技术有限公司Live broadcast data processing method and device, computer equipment and medium
US20220321608A1 (en)*2019-12-182022-10-06Huawei Technologies Co., Ltd.Executing security negotiation for network configuration
US11483317B1 (en)*2018-11-302022-10-25Amazon Technologies, Inc.Techniques for analyzing security in computing environments with privilege escalation
US11539718B2 (en)2020-01-102022-12-27Vmware, Inc.Efficiently performing intrusion detection
US20230117962A1 (en)*2021-10-182023-04-20Sophos LimitedExecutable policy declarations for network security
JP2023065535A (en)*2017-06-292023-05-12アマゾン テクノロジーズ インコーポレイテッド Security Policy Analyzer Service and Satisfaction Engine
US20250063045A1 (en)*2023-08-152025-02-20Citibank, N.A.Access control for requests to services

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9774604B2 (en)2015-01-162017-09-26Zingbox, Ltd.Private cloud control
US10212178B2 (en)2015-04-072019-02-19Zingbox, Ltd.Packet analysis based IoT management
US10380348B2 (en)2016-11-212019-08-13ZingBox, Inc.IoT device risk assessment
US11070568B2 (en)2017-09-272021-07-20Palo Alto Networks, Inc.IoT device management visualization
US11082296B2 (en)2017-10-272021-08-03Palo Alto Networks, Inc.IoT device grouping and labeling
US20190222610A1 (en)*2018-01-182019-07-18Illumio, Inc.User-Based Visibility and Control of a Segmentation Policy
JP7098000B2 (en)2018-06-182022-07-08パロ アルト ネットワークス,インコーポレイテッド Pattern matching based detection in IoT security
US10554765B2 (en)2018-06-252020-02-04Verizon Patent And Licensing Inc.Intelligent programmable policies for network functions
US11411822B2 (en)2018-06-292022-08-09Forescout Technologies, Inc.Segmentation management including translation
US11677627B2 (en)2018-06-292023-06-13Forescout Technologies, Inc.Dynamic segmentation management
US11271812B2 (en)*2018-06-292022-03-08Forescout Technologies, Inc.Segmentation management including visualization, configuration, simulation, or a combination thereof
EP3847571A4 (en)2018-09-042022-06-01Palo Alto Networks, Inc. LEARN AN IOT APPLICATION
AU2019347611A1 (en)*2018-09-272021-04-29Forescout Technologies, Inc.Segmentation management including translation
CA3114327A1 (en)*2018-09-272020-04-02Forescout Technologies, Inc.Segmentation management including visualization, configuration, simulation, or a combination thereof
CN119782027A (en)2018-10-152025-04-08帕洛阿尔托网络公司 Multi-dimensional periodic detection of IoT device behavior
US11451571B2 (en)2018-12-122022-09-20Palo Alto Networks, Inc.IoT device risk assessment and scoring
US11689573B2 (en)2018-12-312023-06-27Palo Alto Networks, Inc.Multi-layered policy management
US12047418B2 (en)*2019-06-052024-07-23Cisco Technology, Inc.Adaptive network controls for IoT and other applications
US12302451B2 (en)2020-06-012025-05-13Palo Alto Networks, Inc.IoT security policy on a firewall
US11115799B1 (en)2020-06-012021-09-07Palo Alto Networks, Inc.IoT device discovery and identification
US11593363B1 (en)*2020-09-232023-02-28Styra, Inc.Comprehension indexing feature
US11552975B1 (en)2021-10-262023-01-10Palo Alto Networks, Inc.IoT device identification with packet flow behavior machine learning model
US12301600B2 (en)2022-01-182025-05-13Palo Alto Networks, Inc.IoT device identification by machine learning with time series behavioral and statistical features

Family Cites Families (65)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5764911A (en)1996-02-131998-06-09Hitachi, Ltd.Management system for updating network managed by physical manager to match changed relation between logical objects in conformity with changed content notified by logical manager
JP3636272B2 (en)1998-02-092005-04-06富士通株式会社 Icon display method, apparatus thereof, and recording medium
US6021376A (en)1998-07-232000-02-01Trimble Navigation LimitedMethod of displaying connections in the field between like geographical features
US6678827B1 (en)1999-05-062004-01-13Watchguard Technologies, Inc.Managing multiple network security devices from a manager device
US6738908B1 (en)1999-05-062004-05-18Watchguard Technologies, Inc.Generalized network security policy templates for implementing similar network security policies across multiple networks
US8099758B2 (en)1999-05-122012-01-17Microsoft CorporationPolicy based composite file system and method
JP3808683B2 (en)2000-03-012006-08-16三菱電機株式会社 Optical disk device
US7376965B2 (en)2000-05-152008-05-20Hewlett-Packard Development Company, L.P.System and method for implementing a bubble policy to achieve host and network security
US7263719B2 (en)2000-05-152007-08-28Hewlett-Packard Development Company, L.P.System and method for implementing network security policies on a common network infrastructure
US7444395B2 (en)2000-06-072008-10-28Microsoft CorporationMethod and apparatus for event handling in an enterprise
US20060129933A1 (en)2000-12-192006-06-15Sparkpoint Software, Inc.System and method for multimedia authoring and playback
US7333482B2 (en)2000-12-222008-02-19Interactive People Unplugged AbRoute optimization technique for mobile IP
US20020112043A1 (en)2001-02-132002-08-15Akira KagamiMethod and apparatus for storage on demand service
US20020169957A1 (en)2001-05-082002-11-14Hale Douglas LavellGUI administration of discretionary or mandatory security policies
US8141144B2 (en)2001-05-102012-03-20Hewlett-Packard Development Company, L.P.Security policy management for network devices
US7231661B1 (en)2001-06-212007-06-12Oracle International CorporationAuthorization services with external authentication
US20030065942A1 (en)2001-09-282003-04-03Lineman David J.Method and apparatus for actively managing security policies for users and computers in a network
US7103914B2 (en)*2002-06-172006-09-05Bae Systems Information Technology LlcTrusted computer system
US8225371B2 (en)2002-09-182012-07-17Symantec CorporationMethod and apparatus for creating an information security policy based on a pre-configured template
US7149510B2 (en)2002-09-232006-12-12Telefonaktiebolaget Lm Ericsson (Publ)Security access manager in middleware
US7653930B2 (en)2003-02-142010-01-26Bea Systems, Inc.Method for role and resource policy management optimization
JP2006518080A (en)*2003-02-142006-08-03プリベンシス,インコーポレイティド Network audit and policy assurance system
AU2004264582B2 (en)2003-06-052010-05-13Intertrust Technologies CorporationInteroperable systems and methods for peer-to-peer service orchestration
US7725921B2 (en)2004-04-222010-05-25Microsoft CorporationSystems and methods for managing networks
US7484237B2 (en)2004-05-132009-01-27Hewlett-Packard Development Company, L.P.Method and apparatus for role-based security policy management
US20060048224A1 (en)2004-08-302006-03-02Encryptx CorporationMethod and apparatus for automatically detecting sensitive information, applying policies based on a structured taxonomy and dynamically enforcing and reporting on the protection of sensitive data through a software permission wrapper
US20060161879A1 (en)*2005-01-182006-07-20Microsoft CorporationMethods for managing standards
US8117640B1 (en)2005-02-232012-02-14Mark MoriconiSystems and methods for analyzing application security policies
US7774830B2 (en)2005-03-142010-08-10Microsoft CorporationAccess control policy engine controlling access to resource based on any of multiple received types of security tokens
US8140664B2 (en)2005-05-092012-03-20Trend Micro IncorporatedGraphical user interface based sensitive information and internal information vulnerability management system
US20070199044A1 (en)2006-02-172007-08-23Samsung Electronics Co., Ltd.Systems and methods for distributed security policy management
KR101359324B1 (en)2006-03-272014-02-24텔레콤 이탈리아 소시에떼 퍼 아찌오니System for enforcing security policies on mobile communications devices
US7882539B2 (en)2006-06-022011-02-01Microsoft CorporationAbstracting security policy from, and transforming to, native representations of access check mechanisms
KR20080001959A (en)2006-06-302008-01-04삼성전자주식회사 User terminal device for managing driver and network port, and method for managing driver and network port
US8607300B2 (en)2006-07-182013-12-10Genband Us LlcNetwork security policy mediation
US9111088B2 (en)2006-08-142015-08-18Quantum Security, Inc.Policy-based physical security system for restricting access to computer resources and data flow through network equipment
US8452876B1 (en)2006-09-052013-05-28Blue Coat Systems, Inc.Graphical configuration interface for network policy
US8490163B1 (en)2006-09-082013-07-16Intapp, Inc.Enforcing security policies across heterogeneous systems
US7861290B2 (en)2006-09-222010-12-28Oracle International CorporationNon-invasive insertion of pagelets
KR100882348B1 (en)2006-12-072009-02-13한국전자통신연구원 Method and device for setting security policy for secure operating system
US8010991B2 (en)2007-01-292011-08-30Cisco Technology, Inc.Policy resolution in an entitlement management system
US20080183603A1 (en)*2007-01-302008-07-31Agiliarice, Inc.Policy enforcement over heterogeneous assets
US8127336B2 (en)2007-03-012012-02-28Bridgewater Systems Corp.Systems and methods for policy-based service management
US20100122208A1 (en)2007-08-072010-05-13Adam HerrPanoramic Mapping Display
US9043861B2 (en)2007-09-172015-05-26Ulrich LangMethod and system for managing security policies
US8424053B2 (en)2008-07-012013-04-16International Business Machines CorporationMethod of dynamically updating network security policy rules when new network resources are provisioned in a service landscape
US8266694B1 (en)2008-08-202012-09-11At&T Mobility Ii LlcSecurity gateway, and a related method and computer-readable medium, for neutralizing a security threat to a component of a communications network
US8504504B2 (en)*2008-09-262013-08-06Oracle America, Inc.System and method for distributed denial of service identification and prevention
JP4696151B2 (en)2008-10-232011-06-08株式会社エヌ・ティ・ティ・ドコモ Information processing apparatus and memory management method
US8844041B1 (en)2010-01-122014-09-23Symantec CorporationDetecting network devices and mapping topology using network introspection by collaborating endpoints
US8429255B1 (en)2010-01-272013-04-23Juniper Networks, Inc.Determining reorder commands for remote reordering of policy rules
US7912983B1 (en)2010-10-212011-03-22Intelepeer, Inc.Multi-layer stack platform for cloud communications
KR101744743B1 (en)2010-12-232017-06-12한국전자통신연구원Method and apparatus for generating security label for scalable contents distribution
US8719919B2 (en)2011-07-122014-05-06Bank Of America CorporationService mediation framework
US20130246336A1 (en)*2011-12-272013-09-19Mcafee, Inc.System and method for providing data protection workflows in a network environment
US20130179937A1 (en)2012-01-102013-07-11Marco Casassa MontSecurity model analysis
US9049207B2 (en)2012-04-112015-06-02Mcafee, Inc.Asset detection system
US9027077B1 (en)2012-04-302015-05-05Palo Alto Networks, Inc.Deploying policy configuration across multiple security devices through hierarchical configuration templates
US9189636B2 (en)2012-07-302015-11-17Hewlett-Packard Development Company, L.P.Office machine security policy
US9208295B2 (en)2012-10-162015-12-08Cisco Technology, Inc.Policy-based control layer in a communication fabric
US9071644B2 (en)*2012-12-062015-06-30International Business Machines CorporationAutomated security policy enforcement and auditing
US9813447B2 (en)2013-03-152017-11-07Extreme Networks, Inc.Device and related method for establishing network policy based on applications
US20150026760A1 (en)2013-07-202015-01-22Keith LipmanSystem and Method for Policy-Based Confidentiality Management
US9379998B2 (en)2014-02-072016-06-28International Business Machines CorporationSymmetric coherent request/response policy enforcement
US10367814B2 (en)2014-06-222019-07-30Citrix Systems, Inc.Enabling user entropy encryption in non-compliant mobile applications

Cited By (85)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11695731B2 (en)2013-10-012023-07-04Nicira, Inc.Distributed identity-based firewalls
US12335232B2 (en)2013-10-012025-06-17VMware LLCDistributed identity-based firewalls
US10798058B2 (en)2013-10-012020-10-06Nicira, Inc.Distributed identity-based firewalls
US10606626B2 (en)2014-12-292020-03-31Nicira, Inc.Introspection method and apparatus for network access filtering
US20160344738A1 (en)*2015-05-192016-11-24Cisco Technology, Inc.Determining Similarity Between Security Rules Based On Weighted Comparisons Of Their Rule Parameters
US10038697B2 (en)*2015-05-192018-07-31Cisco Technology, Inc.Determining similarity between security rules based on weighted comparisons of their rule parameters
US9954878B2 (en)2015-06-082018-04-24Illusive Networks Ltd.Multi-factor deception management and detection for malicious actions in a computer network
US9712547B2 (en)*2015-06-082017-07-18Illusive Networks Ltd.Automatically generating network resource groups and assigning customized decoy policies thereto
US9787715B2 (en)2015-06-082017-10-10Iilusve Networks Ltd.System and method for creation, deployment and management of augmented attacker map
US9794283B2 (en)2015-06-082017-10-17Illusive Networks Ltd.Predicting and preventing an attacker's next actions in a breached network
US9742805B2 (en)2015-06-082017-08-22Illusive Networks Ltd.Managing dynamic deceptive environments
US9985989B2 (en)2015-06-082018-05-29Illusive Networks Ltd.Managing dynamic deceptive environments
US10382484B2 (en)2015-06-082019-08-13Illusive Networks Ltd.Detecting attackers who target containerized clusters
US20160359905A1 (en)*2015-06-082016-12-08Illusive Networks Ltd.Automatically generating network resource groups and assigning customized decoy policies thereto
US10097577B2 (en)2015-06-082018-10-09Illusive Networks, Ltd.Predicting and preventing an attacker's next actions in a breached network
US10142367B2 (en)2015-06-082018-11-27Illusive Networks Ltd.System and method for creation, deployment and management of augmented attacker map
US10623442B2 (en)2015-06-082020-04-14Illusive Networks Ltd.Multi-factor deception management and detection for malicious actions in a computer network
US10291650B2 (en)2015-06-082019-05-14Illusive Networks Ltd.Automatically generating network resource groups and assigning customized decoy policies thereto
US11281485B2 (en)2015-11-032022-03-22Nicira, Inc.Extended context delivery for context-based authorization
USD776147S1 (en)*2015-12-052017-01-10Velvet Ropes, Inc.Mobile device having graphical user interface
US20170208094A1 (en)*2016-01-142017-07-20Cisco Technology, Inc.Policy block creation with context-sensitive policy line classification
US9992232B2 (en)*2016-01-142018-06-05Cisco Technology, Inc.Policy block creation with context-sensitive policy line classification
USD797791S1 (en)*2016-03-222017-09-19Teletracking Technologies, Inc.Display screen with graphical user interface
US11228610B2 (en)2016-06-152022-01-18Cybereason Inc.System and method for classifying cyber security threats using natural language processing
US10673903B2 (en)*2016-06-152020-06-02Empow Cyber Security Ltd.Classification of security rules
US20190081986A1 (en)*2016-06-152019-03-14Empow Cyber Security Ltd.Classification of security rules
US10938837B2 (en)2016-08-302021-03-02Nicira, Inc.Isolated network stack to manage security for virtual machines
US10333983B2 (en)2016-08-302019-06-25Nicira, Inc.Policy definition and enforcement for a network virtualization platform
US9762619B1 (en)*2016-08-302017-09-12Nicira, Inc.Multi-layer policy definition and enforcement framework for network virtualization
US10715607B2 (en)2016-12-062020-07-14Nicira, Inc.Performing context-rich attribute-based services on a host
US10609160B2 (en)2016-12-062020-03-31Nicira, Inc.Performing context-rich attribute-based services on a host
US10802857B2 (en)2016-12-222020-10-13Nicira, Inc.Collecting and processing contextual attributes on a host
US11032246B2 (en)2016-12-222021-06-08Nicira, Inc.Context based firewall services for data message flows for multiple concurrent users on one machine
US10581960B2 (en)2016-12-222020-03-03Nicira, Inc.Performing context-rich attribute-based load balancing on a host
US10812451B2 (en)2016-12-222020-10-20Nicira, Inc.Performing appID based firewall services on a host
US10503536B2 (en)2016-12-222019-12-10Nicira, Inc.Collecting and storing threat level indicators for service rule processing
US10802858B2 (en)2016-12-222020-10-13Nicira, Inc.Collecting and processing contextual attributes on a host
US11327784B2 (en)2016-12-222022-05-10Nicira, Inc.Collecting and processing contextual attributes on a host
US10803173B2 (en)2016-12-222020-10-13Nicira, Inc.Performing context-rich attribute-based process control services on a host
USD852812S1 (en)*2017-02-142019-07-02Roche Diabetes Care, Inc.Display screen with graphical user interface for glucose monitoring system
USD852811S1 (en)*2017-02-142019-07-02Roche Diabetes Care, Inc.Display screen with graphical user interface for glucose monitoring system
US10810316B2 (en)2017-05-152020-10-20International Business Machines CorporationUpdating monitoring systems using merged data policies
US20210211473A1 (en)*2017-06-072021-07-08Amazon Technologies, Inc.Dynamic security policy management
US11683349B2 (en)*2017-06-072023-06-20Amazon Technologies, Inc.Dynamic security policy management
US20220217182A1 (en)*2017-06-072022-07-07Amazon Technologies, Inc.Dynamic security policy management
US12301629B2 (en)*2017-06-072025-05-13Amazon Technologies, Inc.Dynamic security policy management
US12132764B2 (en)2017-06-072024-10-29Amazon Technologies, Inc.Dynamic security policy management
US10868836B1 (en)*2017-06-072020-12-15Amazon Technologies, Inc.Dynamic security policy management
JP2023065535A (en)*2017-06-292023-05-12アマゾン テクノロジーズ インコーポレイテッド Security Policy Analyzer Service and Satisfaction Engine
US10757128B2 (en)2017-06-292020-08-25Amazon Technologies, Inc.Security policy analyzer service and satisfiability engine
JP7294739B2 (en)2017-06-292023-06-20アマゾン テクノロジーズ インコーポレイテッド Security Policy Analyzer Service and Satisfaction Engine
US11616800B2 (en)2017-06-292023-03-28Amazon Technologies, Inc.Security policy analyzer service and satisfiability engine
US10630695B2 (en)*2017-06-292020-04-21Amazon Technologies, Inc.Security policy monitoring service
US10805332B2 (en)2017-07-252020-10-13Nicira, Inc.Context engine model
US10586051B2 (en)*2017-08-312020-03-10International Business Machines CorporationAutomatic transformation of security event detection rules
US20190065755A1 (en)*2017-08-312019-02-28International Business Machines CorporationAutomatic transformation of security event detection rules
US10778651B2 (en)2017-11-152020-09-15Nicira, Inc.Performing context-rich attribute-based encryption on a host
US10862773B2 (en)2018-01-262020-12-08Nicira, Inc.Performing services on data messages associated with endpoint machines
US10802893B2 (en)2018-01-262020-10-13Nicira, Inc.Performing process control services on endpoint machines
US10382278B1 (en)*2018-01-312019-08-13EMC IP Holding Company LLCProcessing platform with independent definition and mutual enforcement of operational and application policies
US10333976B1 (en)2018-07-232019-06-25Illusive Networks Ltd.Open source intelligence deceptions
US10404747B1 (en)2018-07-242019-09-03Illusive Networks Ltd.Detecting malicious activity by using endemic network hosts as decoys
US10382483B1 (en)2018-08-022019-08-13Illusive Networks Ltd.User-customized deceptions and their deployment in networks
US10333977B1 (en)2018-08-232019-06-25Illusive Networks Ltd.Deceiving an attacker who is harvesting credentials
US10432665B1 (en)2018-09-032019-10-01Illusive Networks Ltd.Creating, managing and deploying deceptions on mobile devices
CN109286617A (en)*2018-09-132019-01-29郑州云海信息技术有限公司 A data processing method and related equipment
US11212322B2 (en)*2018-10-102021-12-28Rockwelll Automation Technologies, Inc.Automated discovery of security policy from design data
US11483317B1 (en)*2018-11-302022-10-25Amazon Technologies, Inc.Techniques for analyzing security in computing environments with privilege escalation
CN110674109A (en)*2019-09-062020-01-10中国平安财产保险股份有限公司Data import method, system, computer device and computer readable storage medium
US20220321608A1 (en)*2019-12-182022-10-06Huawei Technologies Co., Ltd.Executing security negotiation for network configuration
US12155695B2 (en)*2019-12-182024-11-26Huawei Technologies Co., Ltd.Executing security negotiation for network configuration
US11848946B2 (en)2020-01-102023-12-19Vmware, Inc.Efficiently performing intrusion detection
US11539718B2 (en)2020-01-102022-12-27Vmware, Inc.Efficiently performing intrusion detection
US11539659B2 (en)2020-07-242022-12-27Vmware, Inc.Fast distribution of port identifiers for rule processing
US11108728B1 (en)2020-07-242021-08-31Vmware, Inc.Fast distribution of port identifiers for rule processing
US12210895B2 (en)2021-10-182025-01-28Sophos LimitedUpdating a cluster of nodes in a network appliance
US12153948B2 (en)2021-10-182024-11-26Sophos LimitedDistributed zero trust network access
US12159158B2 (en)2021-10-182024-12-03Sophos LimitedExtending expiration of user sessions with authentication refresh
US20230117962A1 (en)*2021-10-182023-04-20Sophos LimitedExecutable policy declarations for network security
US12299472B2 (en)*2021-10-182025-05-13Sophos LimitedExecutable policy declarations for network security
US12321771B2 (en)2021-10-182025-06-03Sophos LimitedSoftware rollback of cluster of network devices
CN114205125A (en)*2021-11-252022-03-18北京国泰网信科技有限公司 A security zone-based policy management method, device, device and medium
CN114786025A (en)*2022-04-012022-07-22北京达佳互联信息技术有限公司Live broadcast data processing method and device, computer equipment and medium
US20250063045A1 (en)*2023-08-152025-02-20Citibank, N.A.Access control for requests to services
US12309152B2 (en)*2023-08-152025-05-20Citibank, N.A.Access control for requests to services

Also Published As

Publication numberPublication date
US9401933B1 (en)2016-07-26
US20160301717A1 (en)2016-10-13
US9769210B2 (en)2017-09-19

Similar Documents

PublicationPublication DateTitle
US9769210B2 (en)Classification of security policies across multiple security products
US10116702B2 (en)Security policy unification across different security products
US9680875B2 (en)Security policy unification across different security products
US9571524B2 (en)Creation of security policy templates and security policies based on the templates
US9521167B2 (en)Generalized security policy user interface
US10645122B2 (en)System for monitoring and managing firewall devices and firewall management platforms
US12009981B2 (en)Segmentation management including visualization, configuration, simulation, or a combination thereof
US9641540B2 (en)User interface driven translation, comparison, unification, and deployment of device neutral network security policies
US8091117B2 (en)System and method for interfacing with heterogeneous network data gathering tools
CN107534568B (en) Synthetic Constraints for Network Policy
US8904511B1 (en)Virtual firewalls for multi-tenant distributed services
JP2020114016A (en)Network flow log for multi-tenant environment
CN110785965B (en)System and method for performing network assurance checks on correct deployment of configurations in a fabric
JP2022515007A (en) Detection of inappropriate activity in the presence of unauthenticated API requests using artificial intelligence
CN112219382A (en)Ensuring of security rules in a network
KR20220024758A (en) Discovery and mapping of cloud-based authentication, authorization, and user management services
JP2022191348A (en) Hierarchical API to define multi-segment applications in SDDC
CN110754063B (en) Verify endpoint configuration between nodes
WO2015066208A1 (en)Pairing in a distributed network management system that uses a logical multi-dimensional label-based policy model
CN110785963A (en)Collecting network model and node information from a network
US11750568B1 (en)Secure proxy service
US11425139B2 (en)Enforcing label-based rules on a per-user basis in a distributed network management system
JP7516677B2 (en) Unified Policy Enforcement Management in the Cloud
EP3248134B1 (en)Security policy unification across different security products
US20240291864A1 (en)Intrusion detection based on implicit active learning

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:CISCO TECHNOLOGY, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DOTAN, YEDIDYA;AGARWAL, SANJAY;MARTHERUS, ROBIN;SIGNING DATES FROM 20150206 TO 20150212;REEL/FRAME:035018/0165

STCFInformation on status: patent grant

Free format text:PATENTED CASE

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:4

FEPPFee payment procedure

Free format text:MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPSLapse for failure to pay maintenance fees

Free format text:PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCHInformation on status: patent discontinuation

Free format text:PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FPLapsed due to failure to pay maintenance fee

Effective date:20240726


[8]ページ先頭

©2009-2025 Movatter.jp