Patent classifications
H04L63/0209
Dynamically enforcing context sensitive network access control policies
The present disclosure envisages enforcing micro-segmentation policies on a user computer that intermittently migrates between a secured enterprise network and an unsecured network, for instance, a public network. The present disclosure envisages switching between appropriate micro-segmentation policies, in-line with the change in the current location of the user device, the change triggered by the user device migrating from the enterprise network to an unsecured network or vice-versa. The present disclosure envisages selectively enforcing micro-segmentation policies upon a user device based on the current location thereof, such that the micro-segmentation policies and the corresponding access permissions assigned to the user device differ in line with the current location of the user device, thereby exposing sensitive enterprise resources, forming a part of the enterprise network, in a selective and restricted manner, in line with the micro-segmentation policies enforced upon the user device based primarily on the current location of the user device.
Automated syncing of data between security domains
Described herein are systems, methods, and non-transitory computer readable media for automating the transfer/syncing of datasets or other artifacts from one security domain (e.g., a low security side environment) to another security domain (e.g., a high security side environment) in a seamless manner that complies with requirements of a data transfer mechanism used to transfer data between the two security domains while ensuring data integrity and consistency between the two security domains.
System and method of emulating a cloud computing environment
A system and a method of emulating a second cloud computing environment on a first cloud computing environment are disclosed herein. The first cloud computing environment includes an innovation platform having a private domain name system. The private domain name system is split between a customer subnet and a private subnet. The customer subnet is limited to communications with only the private subnet. The customer subnet executes an application thereon. The application is targeted for use on the second cloud computing environment.
Method device and system for policy based packet processing
Provided are methods, apparatus, and system for policy based wide area network. A network of network appliances is configured with a policy configuration. Each network appliance is configured to validate each wide area network packet against the policy configuration. The validation can include verifying that the packets meet the SD-WAN network segment requirements and security rules including verifying that the source and destination address of the packet meet the firewall zone requirements. Each wide area network packet contains a policy header that is checked by the sending and receiving network appliance against the policy configuration.
ACTIVATION OF GATEWAY DEVICE
Systems and methods for activating an interface device for use at a premises are described. An interface device may be activated for a security system at the premises. The interface device may communicate with a remote server to request activation. The remote server may also be in communication with a user device. A correspondence of a first address of the interface device and a second address of the user device may be used to authorize the interface device for activation. The interface device may receive an activation message and begin communicating with and controlling a security system and other devices at the premises.
Encoding-free javascript stringify for clientless VPN
A client device requests a web page via a clientless VPN. In response to the request, web page content comprising at least one script element is received at the clientless VPN. The clientless VPN inserts a wrapper function around at least a portion of the script element, forming modified web content. The client device is provided with the modified web content.
Secure internet gateway
A system includes a plurality of secure gateways that each use a plurality of datasets to determine how to process messages between devices on a network and websites on the internet. A version control server in the system automatically sends a dataset to each secure gateway in the plurality of secure gateways.
User security credentials as an element of functional safety
An industrial safety architecture integrates employee identity and enterprise-level security policy into plant-floor functional safety systems, allowing control and safety systems on the plant floor to regulate safe interactions with hazardous controlled machinery based on user identity or role. The architecture leverages existing employee identity and security policy data maintained on the corporate level of an industrial enterprise to manage identity- and/or role-based control and safety on the plant level. Safety authority systems at both the corporate level and the plant level of the industrial enterprise obtain employee and security policy data from corporate-level systems and provides this data in as SIL-rated manner to industrial control and safety systems on the plant floor, where the identity and security policy information is used by functional safety systems to control access to industrial systems as a function of user identity, role, certifications, or other qualifications.
SECURE MULTI-TENANT CLOUD SUBSCRIPTION SHARING
The disclosed techniques improve the efficiency and functionality of cloud services by providing a system for sharing individual subscriptions among multiple tenants. A cloud service provider utilizes a location-based manager to retrieve a pool of subscriptions from a cloud platform. Individual subscriptions within the pool can define a set of cloud resources for a resource unit such as a server farm. The location-based manager can assign one or multiple subscriptions for a resource unit to share amongst multiple tenants. In this way, security boundaries between individual tenants can be maintained while also dramatically reducing the number of subscriptions a cloud service provider must manage. In addition, by assigning subscriptions at the granularity of resource units rather than tenants, the location-based manager can enhance the security of the cloud platform by creating a logical zone about individual resource units to serve as an additional security boundary.
ADVERTISING DEVICE INSPECTION CAPABILITIES TO ENHANCE NETWORK TRAFFIC INSPECTIONS
Techniques for advertising device inspection capabilities to enhance network traffic inspections are described herein. The techniques may include determining, by a first inspection device of a network, that a second inspection device is disposed within the network. The first inspection device may also receive, from the second inspection device, an indication that the second inspection device is capable of performing a first type of inspection. The techniques may also include receiving, at the first inspection device, a packet that is to be sent through the network along a path that includes the second inspection device. Based at least in part on the path including the second inspection device, the first inspection device may refrain from performing the first type of inspection on the packet at the first inspection device such that the second inspection device can perform the first type of inspection on the packet.