-
公开(公告)号:US20250159024A1
公开(公告)日:2025-05-15
申请号:US18508150
申请日:2023-11-13
Applicant: Zscaler, Inc.
Inventor: Jonathan Assayag , Shoham Danino
IPC: H04L9/40
Abstract: Systems and methods for abnormal Classless Inter-Domain Routing (CIDR) access detection. The present systems and methods are configured to perform the steps of scanning one or more security groups associated with a cloud environment; assigning a score to one or more Classless Inter-Domain Routing (CIDR) groups within the one or more security groups; and providing one or more suggested actions based on the score of the one or more CIDR groups.
-
公开(公告)号:US20250159023A1
公开(公告)日:2025-05-15
申请号:US18507455
申请日:2023-11-13
Applicant: Zscaler, Inc.
Inventor: Nathan Howe
IPC: H04L9/40
Abstract: Systems and methods for active exposure and unwanted connection protection. In various embodiments, steps include receiving a request from a user to access a destination service; directing the request to a control layer; enforcing one or more controls, via the control layer, on the request based on a configuration provided by an owner of the destination service; and creating a connection from the destination service to the control layer based on the one or more controls, thereby providing access to the destination service without exposing the destination service to a direct connection.
-
公开(公告)号:US20250158962A1
公开(公告)日:2025-05-15
申请号:US19024724
申请日:2025-01-16
Applicant: Zscaler, Inc.
Inventor: Srikanth Devarajan , Sushil Pangeni , Vladimir Stepanenko , Ravinder Verma , Naresh kumar Povlavaram Munirathnam
IPC: H04L9/40 , H04L43/028 , H04L67/10
Abstract: A method of providing cloud-based security services includes receiving, at one or more distributed processing nodes in a cloud-based system, network traffic from a plurality of endpoints associated with at least one tenant; applying, by each distributed processing node, at least one cloud-based security inspection function configured to detect threats or enforce policy controls in the received network traffic; determining, via a policy engine whether to block, allow, or further analyze the network traffic based on per-tenant security policies; logging, in a cloud-based logging repository, inspection results, policy decisions, and rule matches for subsequent reporting and analytics; and updating the security inspection function at the distributed processing nodes, in real time, with newly discovered threat signatures and policy changes to provide continuous protection across the cloud-based system.
-
公开(公告)号:US20250150455A1
公开(公告)日:2025-05-08
申请号:US18502280
申请日:2023-11-06
Applicant: Zscaler, Inc.
Inventor: Arvind Nadendla , Subramanian Srinivasan , Sanjay Kalra , Murat Bog
IPC: H04L9/40
Abstract: Systems and methods for generating sub-identities for workloads in a cloud-based system. Various embodiments include receiving a key from an external system; generating one or more sub-identities from the key; assigning the one or more sub-identities to one or more workloads; and enforcing policies on the one or more workloads and traffic associated therewith based on the one or more sub-identities.
-
公开(公告)号:US20250147812A1
公开(公告)日:2025-05-08
申请号:US18502273
申请日:2023-11-06
Applicant: Zscaler, Inc.
Inventor: Arvind Nadendla , Subramanian Srinivasan , Sanjay Kalra , Murat Bog
IPC: G06F9/50
Abstract: Systems and methods for determining and assigning identities to workloads in a cloud-based system. Various embodiments include monitoring traffic in a cloud-based system; extracting identification information from one or more payloads originating from one or more workloads operating in the cloud-based system; assigning an identity to each of the one or more workloads based on the identification information; and enforcing policies on the one or more workloads and traffic associated therewith based on the assigned identity.
-
公开(公告)号:US20250133120A1
公开(公告)日:2025-04-24
申请号:US18493351
申请日:2023-10-24
Applicant: Zscaler, Inc.
Inventor: Robert Valek , Tomer Heber , Arik Kfir
IPC: H04L9/40 , G06F16/9538
Abstract: The present disclosure includes systems and methods for a security policy framework. Various embodiments include responsive to receiving a trigger, fetching one or more policies from a policy catalog service; compiling the one or more policies into a query, wherein the one or more policies can be compiled into a plurality of different query languages; executing the query over customer data, the customer data being located in one or more data sources; and persisting results of the query.
-
公开(公告)号:US20250119432A1
公开(公告)日:2025-04-10
申请号:US18522769
申请日:2023-11-29
Applicant: Zscaler, Inc.
Inventor: Manikya Bardhan , Raimi Shah , Chenhui Hu , Hanchen Xiong , Nikhil Saini , Aayush Kumar
Abstract: Systems and methods for utilizing Large Language Models (LLMs) for improving machine learning models in network and computer security include obtaining tabular data related to an aspect of networking and computer security; converting the tabular data to natural language for each row in the tabular data; inputting the natural language for each row in the tabular data into a Large Language Model (LLM); obtaining an output from the LLM for each row in the tabular data with embedded data therewith; and utilizing the output to train a machine learning model related to the aspect of networking and computer security
-
公开(公告)号:US12255923B2
公开(公告)日:2025-03-18
申请号:US17687746
申请日:2022-03-07
Applicant: Zscaler, Inc.
Inventor: Michael J. Melson , Scott Laplante
IPC: H04L29/00 , H04L9/40 , H04L41/0816 , H04L41/12
Abstract: Systems and methods include receiving messages from local security agents each on a host in a network, wherein the messages include network topology of the network in terms of addresses and sockets; incrementally creating a network topology of the network based on the messages; determining security policies for one or more microsegments in the network based on flow data and the network topology; and providing the security policies to respective hosts for local implementation of the one or more microsegments.
-
公开(公告)号:US20250055866A1
公开(公告)日:2025-02-13
申请号:US18447938
申请日:2023-08-10
Applicant: Zscaler, Inc.
Inventor: Boris Gorin , Niv Steingarten
IPC: H04L9/40
Abstract: The disclosed system and methods are used for collecting information of third-party applications. A search is performed for detecting uniform resource locator (URL) that is associated with a web page allowing to download at least one third-party application. The search is based on URL patterns that are previously and uniquely determined for each digital data source. An identifier, e.g., client ID, of a third-party application is extracted from each URL of a web page which allows to download a third-party application. Then, the system initiates a software as a service (SaaS) instance in a cloud-based computing environment. The system provides to the third-party application access credentials to access the SaaS instance and extract attributes and behavior data of the third-party application based on at least the actions performed by the third-party application in the SaaS instance.
-
公开(公告)号:US20250039242A1
公开(公告)日:2025-01-30
申请号:US18910792
申请日:2024-10-09
Applicant: Zscaler, Inc.
Inventor: Deepen Desai , Zicun Cong , Akshay Paliwal , Aakarshan Chauhan , Janmey Sandeep Shukla , Shubham Khandhar , Rex Shang
IPC: H04L9/40
Abstract: Kill-chain reconstruction via machine learning includes, responsive to (1) training one or more machine learning models for kill-chain reconstruction, (2) monitoring one or more users associated with an enterprise, and (3) detecting an incident that is one or more of a threat and a policy violation for a user of the one or more users, identifying a transaction associated with the threat and a policy violation as a seed transaction; retrieving transactions of the user from a preconfigured time window leading up to and occurring after the seed transaction; and reconstructing a kill-chain based on the seed transaction and the time window.
-
-
-
-
-
-
-
-
-