Systems and methods for abnormal Classless Inter-Domain Routing (CIDR) access detection

    公开(公告)号:US20250159024A1

    公开(公告)日:2025-05-15

    申请号:US18508150

    申请日:2023-11-13

    Applicant: Zscaler, Inc.

    Abstract: Systems and methods for abnormal Classless Inter-Domain Routing (CIDR) access detection. The present systems and methods are configured to perform the steps of scanning one or more security groups associated with a cloud environment; assigning a score to one or more Classless Inter-Domain Routing (CIDR) groups within the one or more security groups; and providing one or more suggested actions based on the score of the one or more CIDR groups.

    Systems and methods for active exposure and unwanted connection protection

    公开(公告)号:US20250159023A1

    公开(公告)日:2025-05-15

    申请号:US18507455

    申请日:2023-11-13

    Applicant: Zscaler, Inc.

    Inventor: Nathan Howe

    Abstract: Systems and methods for active exposure and unwanted connection protection. In various embodiments, steps include receiving a request from a user to access a destination service; directing the request to a control layer; enforcing one or more controls, via the control layer, on the request based on a configuration provided by an owner of the destination service; and creating a connection from the destination service to the control layer based on the one or more controls, thereby providing access to the destination service without exposing the destination service to a direct connection.

    Cloud-based Intrusion Prevention System, Multi-Tenant Firewall, and Stream Scanner

    公开(公告)号:US20250158962A1

    公开(公告)日:2025-05-15

    申请号:US19024724

    申请日:2025-01-16

    Applicant: Zscaler, Inc.

    Abstract: A method of providing cloud-based security services includes receiving, at one or more distributed processing nodes in a cloud-based system, network traffic from a plurality of endpoints associated with at least one tenant; applying, by each distributed processing node, at least one cloud-based security inspection function configured to detect threats or enforce policy controls in the received network traffic; determining, via a policy engine whether to block, allow, or further analyze the network traffic based on per-tenant security policies; logging, in a cloud-based logging repository, inspection results, policy decisions, and rule matches for subsequent reporting and analytics; and updating the security inspection function at the distributed processing nodes, in real time, with newly discovered threat signatures and policy changes to provide continuous protection across the cloud-based system.

    Systems and methods for detecting and assigning identities for workloads

    公开(公告)号:US20250147812A1

    公开(公告)日:2025-05-08

    申请号:US18502273

    申请日:2023-11-06

    Applicant: Zscaler, Inc.

    Abstract: Systems and methods for determining and assigning identities to workloads in a cloud-based system. Various embodiments include monitoring traffic in a cloud-based system; extracting identification information from one or more payloads originating from one or more workloads operating in the cloud-based system; assigning an identity to each of the one or more workloads based on the identification information; and enforcing policies on the one or more workloads and traffic associated therewith based on the assigned identity.

    Security policy framework for cloud environments

    公开(公告)号:US20250133120A1

    公开(公告)日:2025-04-24

    申请号:US18493351

    申请日:2023-10-24

    Applicant: Zscaler, Inc.

    Abstract: The present disclosure includes systems and methods for a security policy framework. Various embodiments include responsive to receiving a trigger, fetching one or more policies from a policy catalog service; compiling the one or more policies into a query, wherein the one or more policies can be compiled into a plurality of different query languages; executing the query over customer data, the customer data being located in one or more data sources; and persisting results of the query.

    Stream processing of telemetry for a network topology

    公开(公告)号:US12255923B2

    公开(公告)日:2025-03-18

    申请号:US17687746

    申请日:2022-03-07

    Applicant: Zscaler, Inc.

    Abstract: Systems and methods include receiving messages from local security agents each on a host in a network, wherein the messages include network topology of the network in terms of addresses and sockets; incrementally creating a network topology of the network based on the messages; determining security policies for one or more microsegments in the network based on flow data and the network topology; and providing the security policies to respective hosts for local implementation of the one or more microsegments.

    SYSTEM AND METHOD THEREOF FOR ENHANCED COLLECTION OF DATA OF THIRD-PARTY APPLICATIONS

    公开(公告)号:US20250055866A1

    公开(公告)日:2025-02-13

    申请号:US18447938

    申请日:2023-08-10

    Applicant: Zscaler, Inc.

    Abstract: The disclosed system and methods are used for collecting information of third-party applications. A search is performed for detecting uniform resource locator (URL) that is associated with a web page allowing to download at least one third-party application. The search is based on URL patterns that are previously and uniquely determined for each digital data source. An identifier, e.g., client ID, of a third-party application is extracted from each URL of a web page which allows to download a third-party application. Then, the system initiates a software as a service (SaaS) instance in a cloud-based computing environment. The system provides to the third-party application access credentials to access the SaaS instance and extract attributes and behavior data of the third-party application based on at least the actions performed by the third-party application in the SaaS instance.

    Kill-chain reconstruction
    10.
    发明申请

    公开(公告)号:US20250039242A1

    公开(公告)日:2025-01-30

    申请号:US18910792

    申请日:2024-10-09

    Applicant: Zscaler, Inc.

    Abstract: Kill-chain reconstruction via machine learning includes, responsive to (1) training one or more machine learning models for kill-chain reconstruction, (2) monitoring one or more users associated with an enterprise, and (3) detecting an incident that is one or more of a threat and a policy violation for a user of the one or more users, identifying a transaction associated with the threat and a policy violation as a seed transaction; retrieving transactions of the user from a preconfigured time window leading up to and occurring after the seed transaction; and reconstructing a kill-chain based on the seed transaction and the time window.

Patent Agency Ranking