Patent classifications
H04L63/0245
SYSTEM AND METHOD FOR INTEGRATING AN ONLINE PLATFORM WITH COMPUTING SYSTEM INFRASTRUCTURES OF EDUCATIONAL INSTITUTIONS
A system for connecting technological infrastructure of educational institutions with an external web-based marketplace platform that accesses the course data associated with the learning courses, generate offerings for the learning courses based on the course data, and process enrollments and payments to the learning courses. The system further comprising an end-user portal including access to content associated with the learning courses from a learning management system at the institutional information systems and an employer portal configured to solicit talent from a pool of users corresponding to the learning courses, as well as communicate specific requests to institutional officials. The system further comprising an employer portal configured to direct requests to educational institutions associated with the institutional information systems and connect with users that are currently or previously enrolled in the learning courses.
Computer networking with security features
In one implementation, a system for the prevention of malicious attack on a computing resource includes one or more processor; computer memory storing instructions that, when executed by the one or more processors, cause the one or more processors to perform operations including: observing traffic flow of a network; altering a SYN threshold value based on the observing of the traffic flow of the network; comparing a metric of SYN messages submitted to the network; and based on the comparison of the metric of SYN messages submitted, selectively engaging corrective action with the network.
Systems, methods, and media for securing connections to Internet of Things devices
Mechanisms (which can include systems, methods, and media) for securing connections to IoT devices are provided. In some embodiments, systems for securing connections to Internet of Things (IoT) devices are provided, the systems comprising: a memory; and a hardware processor coupled to the memory and configured to: receive first inbound traffic at a router from a wide area network (WAN), wherein the first inbound traffic is destined for a first IoT device; block the first inbound traffic at the router; notify a server on the WAN that the first inbound traffic has been blocked; receive instructions from the server indicating to unblock the first inbound traffic; and unblock the first inbound traffic.
Method device and system for policy based packet processing
Provided are methods, apparatus, and system for policy based wide area network. A network of network appliances is configured with a policy configuration. Each network appliance is configured to validate each wide area network packet against the policy configuration. The validation can include verifying that the packets meet the SD-WAN network segment requirements and security rules including verifying that the source and destination address of the packet meet the firewall zone requirements. Each wide area network packet contains a policy header that is checked by the sending and receiving network appliance against the policy configuration.
System and method for automatic WAF service configuration
A method and system for continuously configuring a web application firewall (WAF) are provided. The method includes receiving a request directed at a protected web application, wherein the request is received from a client device associated with a trusted user account, and wherein the protected web application is protected by the WAF; validating the received request based on at least a signature included in a header of the received request; when the received request is validated, generating an authorization rule based on the received request, wherein the authorization rule allows access to a resource of the protected web application designated in the received request, wherein the generated authorization rule is included in at least one whitelist the WAF is configured with; and configuring the WAF with the generated authorization rule to allow the received request and subsequent request to be directed to the resource of the protected web application.
Policies and Encryption to Protect Digital Information
A technique and system protects documents at rest and in motion using declarative policies and encryption. Encryption in the system is provided transparently and can work in conjunction with policy enforcers installed at a system. A system can protect information or documents from: (i) insider theft; (ii) ensure confidentiality; and (iii) prevent data loss, while enabling collaboration both inside and outside of a company.
SYSTEM AND METHOD FOR DYNAMIC MANAGEMENT OF PRIVATE DATA
Systems and methods of dynamic management of private data during communication between a remote server and a user's device, including receipt of a request for retrieval of at least one data packet from the user's device, wherein the user's device is configured to provide a response corresponding to the received request, determination of at least one communication data type of the at least one data packet corresponding to the received request, receipt of a privacy preference for the user's device, wherein the privacy preference comprises a list of allowed data packet communication types for sharing during communication, modification of data packets corresponding to requests for sharing of responses that are not compatible with the received privacy preference and maintenance of communication between the remote server and the user's device, with sharing of the modified data packet.
API-BASED AD BLOCKING AND TRAFFIC MANAGEMENT
Systems and methods for API-based device management for ad blocking on computing device is disclosed. API-based device management is performed using API and other method hooking within a virtual container. By directly intercepting API calls and other method calls at the application layer, no interception of network traffic is necessary, and there is no need to support network protocols at the network layer, because data can be received directly from an application. The identity of the APIs or methods to intercept and hook may be determined by analyzing a constructor or a signature in the application package.
CAUSING OR PREVENTING AN UPDATE TO A NETWORK ADDRESS TRANSLATION TABLE
A network device may be configured to receive one or more packets that are to initiate a communication session. The network device may be configured to process, using a plurality of packet analysis techniques, the one or more packets to determine analysis information associated with the one or more packets. The network device may be configured to determine, based on the analysis information associated with the one or more packets, whether the one or more packets are suspicious. The network device may be configured to cause or prevent inclusion in a NAT table, based on determining whether the one or more packets are suspicious, of at least one entry associated with the one or more packets and the communication session.
ENHANCED CLOUD INFRASTRUCTURE SECURITY THROUGH RUNTIME VISIBILITY INTO DEPLOYED SOFTWARE
A system retrieves from cloud storage a packet(s) sampled from network traffic detected for software deployed on a cloud instance within a cloud environment. Each packet is inspected with deep packet inspection (DPI) to determine characteristics of the packet from which the identity/type of the corresponding software are determined. The system correlates the data/metadata generated from DPI with data/metadata of other cloud resources of the cloud environment based on determining the cloud resources to which the cloud instance is related or which also support deployment/execution of the software. The correlated data/metadata are evaluated based on security policies which include criteria for characteristics of software running on the cloud infrastructure rather than criteria for cloud infrastructure configuration alone. The system thus determines whether a cloud resource complies with the security policies based at least partly on the types/characteristics of software with which it is correlated.