Movatterモバイル変換


[0]ホーム

URL:


US20220294829A1 - Privilege assurance of enterprise computer network environments - Google Patents

Privilege assurance of enterprise computer network environments
Download PDF

Info

Publication number
US20220294829A1
US20220294829A1US17/707,852US202217707852AUS2022294829A1US 20220294829 A1US20220294829 A1US 20220294829A1US 202217707852 AUS202217707852 AUS 202217707852AUS 2022294829 A1US2022294829 A1US 2022294829A1
Authority
US
United States
Prior art keywords
network
cyber
data
graph
domain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US17/707,852
Inventor
Jason Crabtree
Andrew Sellers
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qomplx Inc
Original Assignee
Qomplx Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/925,974external-prioritypatent/US20170124464A1/en
Priority claimed from US14/986,536external-prioritypatent/US10210255B2/en
Priority claimed from US15/091,563external-prioritypatent/US10204147B2/en
Priority claimed from US15/141,752external-prioritypatent/US10860962B2/en
Priority claimed from US15/166,158external-prioritypatent/US20170124501A1/en
Priority claimed from US15/186,453external-prioritypatent/US20170124497A1/en
Priority claimed from US15/206,195external-prioritypatent/US20170124492A1/en
Priority claimed from US15/229,476external-prioritypatent/US10454791B2/en
Priority claimed from US15/237,625external-prioritypatent/US10248910B2/en
Priority claimed from US15/343,209external-prioritypatent/US11087403B2/en
Priority claimed from US15/376,657external-prioritypatent/US10402906B2/en
Priority claimed from US15/616,427external-prioritypatent/US20170371726A1/en
Priority claimed from US15/655,113external-prioritypatent/US10735456B2/en
Priority claimed from US15/673,368external-prioritypatent/US20180130077A1/en
Priority claimed from US15/725,274external-prioritypatent/US10609079B2/en
Priority claimed from US15/787,601external-prioritypatent/US10860660B2/en
Priority claimed from US15/788,718external-prioritypatent/US10861014B2/en
Priority claimed from US15/788,002external-prioritypatent/US20180181914A1/en
Priority claimed from US15/790,327external-prioritypatent/US10860951B2/en
Priority claimed from US15/790,457external-prioritypatent/US10884999B2/en
Priority claimed from US15/806,697external-prioritypatent/US20180158147A1/en
Priority claimed from US15/813,097external-prioritypatent/US20180165587A1/en
Priority claimed from US15/818,733external-prioritypatent/US10673887B2/en
Priority claimed from US15/823,363external-prioritypatent/US10560483B2/en
Priority claimed from US15/823,285external-prioritypatent/US10740096B2/en
Priority claimed from US15/835,436external-prioritypatent/US10572828B2/en
Priority claimed from US15/835,312external-prioritypatent/US11055451B2/en
Priority claimed from US15/849,901external-prioritypatent/US11023284B2/en
Priority claimed from US15/887,496external-prioritypatent/US10783241B2/en
Priority claimed from US16/248,133external-prioritypatent/US20200004904A1/en
Priority claimed from US16/267,893external-prioritypatent/US20200004905A1/en
Priority claimed from US16/412,340external-prioritypatent/US11539663B2/en
Priority claimed from US16/777,270external-prioritypatent/US11025674B2/en
Priority claimed from US16/836,717external-prioritypatent/US10917428B2/en
Priority claimed from US16/855,724external-prioritypatent/US11218510B2/en
Priority claimed from US17/000,504external-prioritypatent/US11477245B2/en
Priority to US17/707,852priorityCriticalpatent/US20220294829A1/en
Application filed by Qomplx IncfiledCriticalQomplx Inc
Assigned to QOMPLX, INC.reassignmentQOMPLX, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: CRABTREE, JASON, SELLERS, ANDREW
Publication of US20220294829A1publicationCriticalpatent/US20220294829A1/en
Assigned to QPX, LLC.reassignmentQPX, LLC.PATENT ASSIGNMENT AGREEMENT TO ASSET PURCHASE AGREEMENTAssignors: QOMPLX, INC.
Assigned to QPX LLCreassignmentQPX LLCCORRECTIVE ASSIGNMENT TO CORRECT THE RECEIVING PARTY PREVIOUSLY RECORDED AT REEL: 064674 FRAME: 0408. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT.Assignors: QOMPLX, INC.
Assigned to QOMPLX LLCreassignmentQOMPLX LLCCHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: QPX LLC
Assigned to QOMPLX LLCreassignmentQOMPLX LLCCHANGE OF ADDRESSAssignors: QOMPLX LLC
Pendinglegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A system and method for the prevention, mitigation, and detection of cyberattack attacks on computer networks by identifying weaknesses in directory access object allowances and providing professionals with centralized graph-centric tools to maintain and observe key security and performance insights into their security posture. The system uses an interrogation agent to collect Active Directory configuration parameters and activity information about a forest and the devices operating within. Cyber-physical graphs and histograms using persisted time-series data provides critical information, patterns, and alerts about configurations, attack vectors, and vulnerabilities which enable information technology and cybersecurity professionals greater leverage and control over their infrastructure.

Description

Claims (2)

What is claimed is:
1. A system for privilege assurance protection of computer networks, comprising:
a graph engine comprising a first plurality of programming instructions stored in a memory of, and operating on a processor of, a first computing device, wherein the first plurality of programming instructions, when operating on the processor of the first computing device, cause the first computing device to:
receive a plurality of messages from a plurality of devices on a network, each message comprising network information relevant to privilege assurance, the network information comprising device identifiers and configuration parameters;
create and store a cyber-physical graph of the computer network using the received messages, wherein the vertices of the cyber-physical graph represent directory access protocol objects and the edges of the cyber-physical graph represent the relationships between those objects;
perform a plurality of queries over time on the cyber-physical graph for a cyberattack parameter of interest;
receive results of the plurality of queries; and
send the results to a time-series rule comparator; and
the time-series rule comparator comprising a second plurality of programming instructions stored in a memory of, and operating on a processor of, a second computing device, wherein the second plurality of programming instructions, when operating on the processor, cause the second computing device to:
receive the results from the graph engine;
measure changes over time in the results;
if the measurement of changes over time exceeds a threshold, identify the directory access protocol objects and relationships which caused the measurement of changes to exceed the threshold and send the results to a user interface.
2. A method for privilege assurance protection of computer networks, comprising the steps of:
receiving, at a graph engine, a plurality of messages from a plurality of devices on a network, each message comprising network information relevant to privilege assurance, the network information comprising device identifiers and configuration parameters;
using the graph engine, creating and storing a cyber-physical graph of the network using the received messages, wherein the vertices of the cyber-physical graph represent directory access protocol objects and the edges of the cyber-physical graph represent the relationships between those objects;
performing a plurality of queries over time on the cyber-physical graph for a cyberattack parameter of interest;
receiving results of the plurality of queries;
using a time-series rule comparator, measuring changes over time in the results; and
if the measurement of changes over time exceeds a threshold, identifying the directory access protocol objects and relationships which caused the measurement of changes to exceed the threshold and sending the results to a user interface.
US17/707,8522015-10-282022-03-29Privilege assurance of enterprise computer network environmentsPendingUS20220294829A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US17/707,852US20220294829A1 (en)2015-10-282022-03-29Privilege assurance of enterprise computer network environments

Applications Claiming Priority (44)

Application NumberPriority DateFiling DateTitle
US14/925,974US20170124464A1 (en)2015-10-282015-10-28Rapid predictive analysis of very large data sets using the distributed computational graph
US14/986,536US10210255B2 (en)2015-12-312015-12-31Distributed system for large volume deep web data extraction
US15/091,563US10204147B2 (en)2016-04-052016-04-05System for capture, analysis and storage of time series data from sensors with heterogeneous report interval profiles
US15/141,752US10860962B2 (en)2015-10-282016-04-28System for fully integrated capture, and analysis of business information resulting in predictive decision making and simulation
US15/166,158US20170124501A1 (en)2015-10-282016-05-26System for automated capture and analysis of business information for security and client-facing infrastructure reliability
US15/186,453US20170124497A1 (en)2015-10-282016-06-18System for automated capture and analysis of business information for reliable business venture outcome prediction
US15/206,195US20170124492A1 (en)2015-10-282016-07-08System for automated capture and analysis of business information for reliable business venture outcome prediction
US15/229,476US10454791B2 (en)2015-10-282016-08-05Highly scalable distributed connection interface for data capture from multiple network service sources
US15/237,625US10248910B2 (en)2015-10-282016-08-15Detection mitigation and remediation of cyberattacks employing an advanced cyber-decision platform
US15/343,209US11087403B2 (en)2015-10-282016-11-04Risk quantification for insurance process management employing an advanced decision platform
US15/376,657US10402906B2 (en)2015-10-282016-12-13Quantification for investment vehicle management employing an advanced decision platform
US15/616,427US20170371726A1 (en)2015-10-282017-06-07Rapid predictive analysis of very large data sets using an actor-driven distributed computational graph
US15/655,113US10735456B2 (en)2015-10-282017-07-20Advanced cybersecurity threat mitigation using behavioral and deep analytics
US15/673,368US20180130077A1 (en)2015-10-282017-08-09Automated selection and processing of financial models
US201762568291P2017-10-042017-10-04
US201762568312P2017-10-042017-10-04
US201762568298P2017-10-042017-10-04
US201762568307P2017-10-042017-10-04
US201762568305P2017-10-042017-10-04
US15/725,274US10609079B2 (en)2015-10-282017-10-04Application of advanced cybersecurity threat mitigation to rogue devices, privilege escalation, and risk-based vulnerability and patch management
US15/787,601US10860660B2 (en)2015-10-282017-10-18Method and apparatus for crowdsourced data gathering, extraction, and compensation
US15/788,718US10861014B2 (en)2015-10-282017-10-19Data monetization and exchange platform
US15/788,002US20180181914A1 (en)2015-10-282017-10-19Algorithm monetization and exchange platform
US15/790,457US10884999B2 (en)2015-10-282017-10-23Distributable model with biases contained within distributed data
US15/790,327US10860951B2 (en)2015-10-282017-10-23System and method for removing biases within a distributable model
US15/806,697US20180158147A1 (en)2015-10-282017-11-08Modeling multi-peril catastrophe using a distributed simulation engine
US15/813,097US20180165587A1 (en)2015-10-282017-11-14Epistemic uncertainty reduction using simulations, models and data exchange
US15/818,733US10673887B2 (en)2015-10-282017-11-20System and method for cybersecurity analysis and score generation for insurance purposes
US15/823,363US10560483B2 (en)2015-10-282017-11-27Rating organization cybersecurity using active and passive external reconnaissance
US15/823,285US10740096B2 (en)2015-10-282017-11-27Meta-indexing, search, compliance, and test framework for software development
US15/835,436US10572828B2 (en)2015-10-282017-12-07Transfer learning and domain adaptation using distributable data models
US15/835,312US11055451B2 (en)2015-10-282017-12-07System and methods for multi-language abstract model creation for digital environment simulations
US15/849,901US11023284B2 (en)2015-10-282017-12-21System and method for optimization and load balancing of computer clusters
US15/887,496US10783241B2 (en)2015-10-282018-02-02System and methods for sandboxed malware analysis and automated patch development, deployment and validation
US16/248,133US20200004904A1 (en)2015-10-282019-01-15System and method for multi-model generative simulation modeling of complex adaptive systems
US16/267,893US20200004905A1 (en)2015-10-282019-02-05System and methods for complex it process annotation, tracing, analysis, and simulation
US16/412,340US11539663B2 (en)2015-10-282019-05-14System and method for midserver facilitation of long-haul transport of telemetry for cloud-based services
US16/720,383US10944795B2 (en)2015-10-282019-12-19Rating organization cybersecurity using active and passive external reconnaissance
US16/777,270US11025674B2 (en)2015-10-282020-01-30Cybersecurity profiling and rating using active and passive external reconnaissance
US16/836,717US10917428B2 (en)2015-10-282020-03-31Holistic computer system cybersecurity evaluation and scoring
US16/855,724US11218510B2 (en)2015-10-282020-04-22Advanced cybersecurity threat mitigation using software supply chain analysis
US17/000,504US11477245B2 (en)2015-10-282020-08-24Advanced detection of identity-based attacks to assure identity fidelity in information technology environments
US17/008,276US11323484B2 (en)2015-10-282020-08-31Privilege assurance of enterprise computer network environments
US17/707,852US20220294829A1 (en)2015-10-282022-03-29Privilege assurance of enterprise computer network environments

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US17/008,276ContinuationUS11323484B2 (en)2015-10-282020-08-31Privilege assurance of enterprise computer network environments

Publications (1)

Publication NumberPublication Date
US20220294829A1true US20220294829A1 (en)2022-09-15

Family

ID=75162327

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US17/008,276Active2036-03-07US11323484B2 (en)2015-10-282020-08-31Privilege assurance of enterprise computer network environments
US17/707,852PendingUS20220294829A1 (en)2015-10-282022-03-29Privilege assurance of enterprise computer network environments

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US17/008,276Active2036-03-07US11323484B2 (en)2015-10-282020-08-31Privilege assurance of enterprise computer network environments

Country Status (1)

CountryLink
US (2)US11323484B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20240419787A1 (en)*2023-06-142024-12-19Zscaler, Inc.Identity threat detection and response

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11252172B1 (en)*2018-05-102022-02-15State Farm Mutual Automobile Insurance CompanySystems and methods for automated penetration testing
US11281806B2 (en)2018-12-032022-03-22Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11283825B2 (en)*2018-12-032022-03-22Accenture Global Solutions LimitedLeveraging attack graphs of agile security platform
US11159555B2 (en)2018-12-032021-10-26Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11184385B2 (en)2018-12-032021-11-23Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11418515B2 (en)*2019-06-032022-08-16Hewlett Packard Enterprise Development LpMulti-vendor support for network access control policies
US11695795B2 (en)2019-07-122023-07-04Accenture Global Solutions LimitedEvaluating effectiveness of security controls in enterprise networks using graph values
WO2021095223A1 (en)*2019-11-152021-05-20日本電気株式会社Analysis system, method, and program
EP3872665A1 (en)2020-02-282021-09-01Accenture Global Solutions LimitedCyber digital twin simulator for security controls requirements
US11539725B2 (en)2020-04-232022-12-27Specter Ops, Inc.System and method for continuous collection, analysis and reporting of attack paths choke points in a directory services environment
US12401664B2 (en)2020-04-232025-08-26Specter Ops, Inc.System and method for continuous collection, analysis and reporting of attack paths choke points in a directory services environment
US11876824B2 (en)2020-06-252024-01-16Accenture Global Solutions LimitedExtracting process aware analytical attack graphs through logical network analysis
US11411976B2 (en)2020-07-092022-08-09Accenture Global Solutions LimitedResource-efficient generation of analytical attack graphs
US12034756B2 (en)2020-08-282024-07-09Accenture Global Solutions LimitedAnalytical attack graph differencing
US12015629B2 (en)*2020-09-282024-06-18Cisco Technology, Inc.Tailored network risk analysis using deep learning modeling
US11582262B2 (en)*2020-10-082023-02-14Google LlcExtension framework for data analytics
US11831675B2 (en)2020-10-262023-11-28Accenture Global Solutions LimitedProcess risk calculation based on hardness of attack paths
US11973790B2 (en)2020-11-102024-04-30Accenture Global Solutions LimitedCyber digital twin simulator for automotive security assessment based on attack graphs
US11777978B2 (en)*2021-01-292023-10-03Varmour Networks, Inc.Methods and systems for accurately assessing application access risk
EP4047870B1 (en)2021-02-182024-11-13Accenture Global Solutions LimitedAutomated prioritization of process-aware cyber risk mitigation
US12242600B2 (en)*2021-05-132025-03-04Microsoft Technology Licensing, LlcAbnormally permissive role definition detection systems
CN113452710B (en)*2021-06-282022-12-27深圳前海微众银行股份有限公司Unauthorized vulnerability detection method, device, equipment and computer program product
US11880250B2 (en)2021-07-212024-01-23Accenture Global Solutions LimitedOptimizing energy consumption of production lines using intelligent digital twins
US11895150B2 (en)2021-07-282024-02-06Accenture Global Solutions LimitedDiscovering cyber-attack process model based on analytical attack graphs
US12231461B2 (en)2021-08-122025-02-18Accenture Global Solutions LimitedPrioritizing security controls using a cyber digital twin simulator
US12355798B2 (en)2021-08-252025-07-08Accenture Global Solutions LimitedAutomated prioritization of cyber risk mitigation by simulating exploits
CN113923019B (en)*2021-10-092023-07-21天翼物联科技有限公司Internet of things system safety protection method, device, equipment and medium
US20230195863A1 (en)*2021-12-212023-06-22Microsoft Technology Licensing, LlcApplication identity account compromise detection
US12289336B2 (en)2022-04-082025-04-29Accenture Global Solutions LimitedOntology-based risk propagation over digital twins
US12348552B2 (en)2022-06-152025-07-01Accenture Global Solutions LimitedAutomated prediction of cyber-security attack techniques using knowledge mesh
US12316652B2 (en)*2022-07-132025-05-27International Business Machines CorporationInvoking response(s) based on analysis of a dataset obtained from searching a security endpoint
US12284224B1 (en)*2023-10-032025-04-22strongDM, Inc.Virtualized permission and security enforcement
US12242599B1 (en)2024-09-272025-03-04strongDM, Inc.Fine-grained security policy enforcement for applications
US12348519B1 (en)2025-02-072025-07-01strongDM, Inc.Evaluating security policies in aggregate
US12432242B1 (en)2025-03-282025-09-30strongDM, Inc.Anomaly detection in managed networks

Family Cites Families (45)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US1010248A (en)1910-08-111911-11-28William Horace FrenchEar-muff.
US5410681A (en)1991-11-201995-04-25Apple Computer, Inc.Interpreter for performing remote testing of computer systems
DE19632609A1 (en)1996-08-131998-02-19Duerr Systems Gmbh Manufacturing plant
US7072863B1 (en)1999-09-082006-07-04C4Cast.Com, Inc.Forecasting using interpolation modeling
US20050289072A1 (en)2004-06-292005-12-29Vinay SabharwalSystem for automatic, secure and large scale software license management over any computer network
US7657406B2 (en)2005-06-092010-02-02Intepoint, LlcMulti-infrastructure modeling system
US7739653B2 (en)2005-07-052010-06-15Microsoft CorporationRepresenting software development item relationships via a graph
US7698213B2 (en)2005-08-192010-04-13The Hartford Steam Boiler Inspection And Insurance Co.Method of risk modeling by estimating frequencies of loss and loss distributions for individual risks in a portfolio
US8615800B2 (en)2006-07-102013-12-24Websense, Inc.System and method for analyzing web content
US9654495B2 (en)2006-12-012017-05-16Websense, LlcSystem and method of analyzing web addresses
US8788306B2 (en)2007-03-052014-07-22International Business Machines CorporationUpdating a forecast model
US8145761B2 (en)2008-03-032012-03-27Microsoft CorporationLoad skewing for power-aware server provisioning
EP2107715B1 (en)*2008-03-312019-12-25Synopsys, Inc.Method, device arrangement and computer program product for creating identity graphs analyzing communication network
US8793758B2 (en)2009-01-282014-07-29Headwater Partners I LlcSecurity, fraud detection, and fraud mitigation in device-assisted services systems
US8914878B2 (en)2009-04-292014-12-16Juniper Networks, Inc.Detecting malicious network software agents
US8949772B1 (en)2009-06-012015-02-03Amazon Technologies, Inc.Dynamic model based software application development
WO2011014471A1 (en)2009-07-272011-02-03Sensis CorporationSystem and method for correlating past activities, determining hidden relationships and predicting future activities
US10027711B2 (en)*2009-11-202018-07-17Alert Enterprise, Inc.Situational intelligence
US8281121B2 (en)2010-05-132012-10-02Microsoft CorporationPrivate aggregation of distributed time-series data
US9141360B1 (en)2011-03-162015-09-22Google Inc.Web application module translation service
US20160004858A1 (en)2011-03-162016-01-07J. Bradley ChenSecurity-Enhanced Web Application Module Translation
US8997233B2 (en)2011-04-132015-03-31Microsoft Technology Licensing, LlcDetecting script-based malware using emulation and heuristics
ES2755780T3 (en)2011-09-162020-04-23Veracode Inc Automated behavior and static analysis using an instrumented sandbox and machine learning classification for mobile security
US20130304623A1 (en)2012-04-182013-11-14The Florida State University Research Foundation, Inc.Stock ranking & price prediction based on neighborhood model
US20140279770A1 (en)2013-03-152014-09-18REMTCS Inc.Artificial neural network interface and methods of training the same for various use cases
US9916133B2 (en)2013-03-142018-03-13Microsoft Technology Licensing, LlcSoftware release workflow management
GB201310007D0 (en)2013-06-042013-07-17Lyst LtdMerchant system
US9134966B2 (en)2013-12-122015-09-15International Business Machines CorporationManagement of mixed programming languages for a simulation environment
WO2015149062A1 (en)2014-03-282015-10-01Zitovault, Inc.System and method for predicting impending cyber security events using multi channel behavioral analysis in a distributed computing environment
US9762443B2 (en)2014-04-152017-09-12Splunk Inc.Transformation of network data at remote capture agents
US10318882B2 (en)2014-09-112019-06-11Amazon Technologies, Inc.Optimized training of linear machine learning models
US10210246B2 (en)2014-09-262019-02-19Oracle International CorporationTechniques for similarity analysis and data enrichment using knowledge sources
US20160099960A1 (en)2014-10-012016-04-07Infocyte, Inc.System and method for scanning hosts using an autonomous, self-destructing payload
US9887933B2 (en)2014-10-312018-02-06The Nielsen Company (Us), LlcMethod and apparatus to throttle media access by web crawlers
US20160275123A1 (en)2015-03-182016-09-22Hitachi, Ltd.Pipeline execution of multiple map-reduce jobs
WO2016190868A1 (en)*2015-05-282016-12-01Hewlett Packard Enterprise Development LpProcessing network data using a graph data structure
WO2016200921A1 (en)2015-06-092016-12-15Machine Zone, Inc.Distributed scalable workload testing
US9756067B2 (en)*2015-08-102017-09-05Accenture Global Services LimitedNetwork security
US9699205B2 (en)*2015-08-312017-07-04Splunk Inc.Network security system
US20170124464A1 (en)2015-10-282017-05-04Fractal Industries, Inc.Rapid predictive analysis of very large data sets using the distributed computational graph
US10210255B2 (en)2015-12-312019-02-19Fractal Industries, Inc.Distributed system for large volume deep web data extraction
US10248910B2 (en)2015-10-282019-04-02Fractal Industries, Inc.Detection mitigation and remediation of cyberattacks employing an advanced cyber-decision platform
DE102015119597B4 (en)2015-11-132022-07-14Kriwan Industrie-Elektronik Gmbh cyber-physical system
US10367829B2 (en)2015-11-192019-07-30Anomali IncorporatedProtecting threat indicators from third party abuse
WO2017193140A1 (en)2016-05-062017-11-09Enterpriseweb LlcSystems and methods for domain-driven design and execution of modular and dynamic services, applications and processes

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20240419787A1 (en)*2023-06-142024-12-19Zscaler, Inc.Identity threat detection and response

Also Published As

Publication numberPublication date
US11323484B2 (en)2022-05-03
US20210099490A1 (en)2021-04-01

Similar Documents

PublicationPublication DateTitle
US20220294829A1 (en)Privilege assurance of enterprise computer network environments
US12107895B2 (en)Privilege assurance of enterprise computer network environments using attack path detection and prediction
US12113831B2 (en)Privilege assurance of enterprise computer network environments using lateral movement detection and prevention
US12058178B2 (en)Privilege assurance of enterprise computer network environments using logon session tracking and logging
US12267347B2 (en)System and method for comprehensive data loss prevention and compliance management
US12225042B2 (en)System and method for user and entity behavioral analysis using network topology information
US11757920B2 (en)User and entity behavioral analysis with network topology enhancements
US12003534B2 (en)Detecting and mitigating forged authentication attacks within a domain
US11968227B2 (en)Detecting KERBEROS ticket attacks within a domain
US20220368726A1 (en)Privilege assurance of computer network environments
US20220377093A1 (en)System and method for data compliance and prevention with threat detection and response
US11582207B2 (en)Detecting and mitigating forged authentication object attacks using an advanced cyber decision platform
US11757849B2 (en)Detecting and mitigating forged authentication object attacks in multi-cloud environments
US10594714B2 (en)User and entity behavioral analysis using an advanced cyber decision platform
US20230412620A1 (en)System and methods for cybersecurity analysis using ueba and network topology data and trigger - based network remediation
US10609079B2 (en)Application of advanced cybersecurity threat mitigation to rogue devices, privilege escalation, and risk-based vulnerability and patch management
WO2020102601A1 (en)Comprehensive data loss prevention and compliance management
WO2024258881A1 (en)Dynamic authentication revocation utilizing privilege assurance
WO2022046366A1 (en)Privilege assurance of enterprise computer network environments
US20250323928A1 (en)System and Method for Cybersecurity Threat Detection and Prevention with Discrete Event Simulation

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:QOMPLX, INC., VIRGINIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SELLERS, ANDREW;CRABTREE, JASON;REEL/FRAME:059636/0275

Effective date:20200828

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

ASAssignment

Owner name:QPX, LLC., NEW YORK

Free format text:PATENT ASSIGNMENT AGREEMENT TO ASSET PURCHASE AGREEMENT;ASSIGNOR:QOMPLX, INC.;REEL/FRAME:064674/0407

Effective date:20230810

ASAssignment

Owner name:QPX LLC, NEW YORK

Free format text:CORRECTIVE ASSIGNMENT TO CORRECT THE RECEIVING PARTY PREVIOUSLY RECORDED AT REEL: 064674 FRAME: 0408. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:QOMPLX, INC.;REEL/FRAME:064966/0863

Effective date:20230810

ASAssignment

Owner name:QOMPLX LLC, NEW YORK

Free format text:CHANGE OF NAME;ASSIGNOR:QPX LLC;REEL/FRAME:065036/0449

Effective date:20230824

ASAssignment

Owner name:QOMPLX LLC, VIRGINIA

Free format text:CHANGE OF ADDRESS;ASSIGNOR:QOMPLX LLC;REEL/FRAME:069083/0279

Effective date:20241001


[8]ページ先頭

©2009-2025 Movatter.jp