SG11201603471XA - Cloud service security broker and proxy - Google Patents

Cloud service security broker and proxy

Info

Publication number
SG11201603471XA
SG11201603471XA SG11201603471XA SG11201603471XA SG11201603471XA SG 11201603471X A SG11201603471X A SG 11201603471XA SG 11201603471X A SG11201603471X A SG 11201603471XA SG 11201603471X A SG11201603471X A SG 11201603471XA SG 11201603471X A SG11201603471X A SG 11201603471XA
Authority
SG
Singapore
Prior art keywords
proxy
cloud service
service security
security broker
broker
Prior art date
Application number
SG11201603471XA
Other languages
English (en)
Inventor
Aviram Cohen
Liran Moysi
Ami Luttwak
Roy Reznik
Greg Vishnepolsky
Original Assignee
Adallom Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Adallom Inc filed Critical Adallom Inc
Publication of SG11201603471XA publication Critical patent/SG11201603471XA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • G06F16/9574Browsing optimisation, e.g. caching or content distillation of access to content, e.g. by caching
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/128Restricting unauthorised execution of programs involving web programs, i.e. using technology especially used in internet, generally interacting with a web browser, e.g. hypertext markup language [HTML], applets, java
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/51Source to source
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5032Generating service level reports
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/508Network service management, e.g. ensuring proper service fulfilment according to agreements based on type of value added network service under agreement
    • H04L41/5096Network service management, e.g. ensuring proper service fulfilment according to agreements based on type of value added network service under agreement wherein the managed service relates to distributed or central networked applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/565Conversion or adaptation of application format or content

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Quality & Reliability (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Economics (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Mathematical Physics (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
SG11201603471XA 2013-11-11 2014-11-12 Cloud service security broker and proxy SG11201603471XA (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201361902787P 2013-11-11 2013-11-11
US201361902786P 2013-11-11 2013-11-11
US201361902789P 2013-11-11 2013-11-11
US201462049473P 2014-09-12 2014-09-12
PCT/US2014/065305 WO2015070260A1 (en) 2013-11-11 2014-11-12 Cloud service security broker and proxy

Publications (1)

Publication Number Publication Date
SG11201603471XA true SG11201603471XA (en) 2016-05-30

Family

ID=53042265

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11201603471XA SG11201603471XA (en) 2013-11-11 2014-11-12 Cloud service security broker and proxy

Country Status (15)

Country Link
US (2) US9438565B2 (enrdf_load_stackoverflow)
EP (2) EP3734474A3 (enrdf_load_stackoverflow)
JP (1) JP6514202B2 (enrdf_load_stackoverflow)
KR (1) KR20160110913A (enrdf_load_stackoverflow)
CN (1) CN106031118B (enrdf_load_stackoverflow)
AU (1) AU2014346390B2 (enrdf_load_stackoverflow)
CA (1) CA2930106A1 (enrdf_load_stackoverflow)
CL (1) CL2016001116A1 (enrdf_load_stackoverflow)
IL (1) IL245181B (enrdf_load_stackoverflow)
MX (1) MX361791B (enrdf_load_stackoverflow)
MY (1) MY181777A (enrdf_load_stackoverflow)
PH (1) PH12016500808A1 (enrdf_load_stackoverflow)
RU (1) RU2679549C2 (enrdf_load_stackoverflow)
SG (1) SG11201603471XA (enrdf_load_stackoverflow)
WO (1) WO2015070260A1 (enrdf_load_stackoverflow)

Families Citing this family (126)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8560604B2 (en) 2009-10-08 2013-10-15 Hola Networks Ltd. System and method for providing faster and more efficient data communication
US9241044B2 (en) 2013-08-28 2016-01-19 Hola Networks, Ltd. System and method for improving internet communication by using intermediate nodes
US9692789B2 (en) * 2013-12-13 2017-06-27 Oracle International Corporation Techniques for cloud security monitoring and threat intelligence
US11474767B1 (en) * 2014-05-28 2022-10-18 Amazon Technologies, Inc. Print from web services platform to local printer
US10114966B2 (en) 2015-03-19 2018-10-30 Netskope, Inc. Systems and methods of per-document encryption of enterprise information stored on a cloud computing service (CCS)
US11023846B2 (en) 2015-04-24 2021-06-01 United Parcel Service Of America, Inc. Location-based pick up and delivery services
US11057446B2 (en) 2015-05-14 2021-07-06 Bright Data Ltd. System and method for streaming content from multiple servers
CN106302335B (zh) * 2015-05-22 2020-02-07 杭州海康威视数字技术股份有限公司 网络监控设备及重置其密码的方法、装置和系统、服务器
CN105242533B (zh) * 2015-09-01 2017-11-28 西北工业大学 一种融合多信息的变导纳遥操作控制方法
CN106487774B (zh) 2015-09-01 2019-06-25 阿里巴巴集团控股有限公司 一种云主机服务权限控制方法、装置和系统
US9740245B2 (en) 2015-10-05 2017-08-22 Microsoft Technology Licensing, Llc Locking mechanism
US20170118239A1 (en) * 2015-10-26 2017-04-27 Microsoft Technology Licensing, Llc. Detection of cyber threats against cloud-based applications
US10476886B2 (en) 2015-11-05 2019-11-12 Microsoft Technology Licensing, Llc Just-in-time access based on geolocation to maintain control of restricted data in cloud computing environments
US10560463B2 (en) 2015-11-05 2020-02-11 Microsoft Technology Licensing, Llc Incident management to maintain control of restricted data in cloud computing environments
US10484430B2 (en) 2015-11-05 2019-11-19 Microsoft Technology Licensing, Llc Just-in-time access based on screening criteria to maintain control of restricted data in cloud computing environments
US10498835B2 (en) 2015-11-10 2019-12-03 Avanan Inc. Cloud services discovery and monitoring
US10251144B2 (en) 2015-12-03 2019-04-02 Mobile Tech, Inc. Location tracking of products and product display assemblies in a wirelessly connected environment
US10517056B2 (en) 2015-12-03 2019-12-24 Mobile Tech, Inc. Electronically connected environment
US10728868B2 (en) 2015-12-03 2020-07-28 Mobile Tech, Inc. Remote monitoring and control over wireless nodes in a wirelessly connected environment
US9906480B2 (en) * 2015-12-10 2018-02-27 Facebook, Inc. Techniques for ephemeral messaging with legacy clients
US10200330B2 (en) 2015-12-10 2019-02-05 Facebook, Inc. Techniques for ephemeral messaging with a message queue
US10320844B2 (en) 2016-01-13 2019-06-11 Microsoft Technology Licensing, Llc Restricting access to public cloud SaaS applications to a single organization
US20170206148A1 (en) * 2016-01-20 2017-07-20 Facebook, Inc. Cross-region failover of application services
US10382424B2 (en) 2016-01-26 2019-08-13 Redhat, Inc. Secret store for OAuth offline tokens
US10826973B2 (en) 2016-02-04 2020-11-03 Carrier Corporation Security system including business continuity provider
US10536478B2 (en) 2016-02-26 2020-01-14 Oracle International Corporation Techniques for discovering and managing security of applications
US11425169B2 (en) 2016-03-11 2022-08-23 Netskope, Inc. Small-footprint endpoint data loss prevention (DLP)
US11403418B2 (en) 2018-08-30 2022-08-02 Netskope, Inc. Enriching document metadata using contextual information
US11985129B2 (en) 2016-03-28 2024-05-14 Zscaler, Inc. Cloud policy enforcement based on network trust
US12355767B2 (en) 2016-03-28 2025-07-08 Zscaler, Inc. Securing local network traffic using cloud computing
US12101318B2 (en) 2016-03-28 2024-09-24 Zscaler, Inc. Adaptive multipath tunneling in cloud-based systems
US9935955B2 (en) * 2016-03-28 2018-04-03 Zscaler, Inc. Systems and methods for cloud based unified service discovery and secure availability
US11297058B2 (en) * 2016-03-28 2022-04-05 Zscaler, Inc. Systems and methods using a cloud proxy for mobile device management and policy
US11533307B2 (en) 2016-03-28 2022-12-20 Zscaler, Inc. Enforcing security policies on mobile devices in a hybrid architecture
US11962589B2 (en) 2016-03-28 2024-04-16 Zscaler, Inc. Disaster recovery for a cloud-based security service
US11363022B2 (en) 2016-03-28 2022-06-14 Zscaler, Inc. Use of DHCP for location information of a user device for automatic traffic forwarding
US10291636B2 (en) 2016-05-23 2019-05-14 International Business Machines Corporation Modifying a user session lifecycle in a cloud broker environment
RU2634181C1 (ru) * 2016-06-02 2017-10-24 Акционерное общество "Лаборатория Касперского" Система и способ обнаружения вредоносных компьютерных систем
US10146609B1 (en) * 2016-07-08 2018-12-04 Splunk Inc. Configuration of continuous anomaly detection service
US10476907B2 (en) 2016-08-10 2019-11-12 Netskope, Inc. Systems and methods of detecting and responding to a data attack on a file system
US10305861B2 (en) * 2016-08-29 2019-05-28 Microsoft Technology Licensing, Llc. Cross-tenant data leakage isolation
US10243946B2 (en) 2016-11-04 2019-03-26 Netskope, Inc. Non-intrusive security enforcement for federated single sign-on (SSO)
CN106506648B (zh) * 2016-11-10 2019-05-17 东软集团股份有限公司 负载均衡服务管理方法及系统
US11637907B2 (en) * 2016-11-16 2023-04-25 Verizon Patent And Licensing Inc. Systems and methods for tracking device IDs for virtualized applications
US10333936B2 (en) * 2017-01-24 2019-06-25 Box, Inc. Method and system for secure cross-domain login
US10511599B2 (en) 2017-03-13 2019-12-17 Microsoft Technology Licensing, Llc System to filter impossible user travel indicators
US10178096B2 (en) 2017-03-31 2019-01-08 International Business Machines Corporation Enhanced data leakage detection in cloud services
US10558641B2 (en) 2017-04-21 2020-02-11 Microsoft Technology Licensing, Llc Trigger system for databases using proxy
KR101980568B1 (ko) * 2017-04-24 2019-05-22 (주)유엠로직스 3-tier 클라우드 보안통제 브로커의 메타 데이터 기반 보안통제 중복수행 방지 방법
US10977359B2 (en) 2017-05-15 2021-04-13 Microsoft Technology Licensing, Llc Automatic takeover of applications installed on client devices in an enterprise network
US11005864B2 (en) 2017-05-19 2021-05-11 Salesforce.Com, Inc. Feature-agnostic behavior profile based anomaly detection
US10794093B2 (en) 2017-05-19 2020-10-06 Microsoft Technology Licensing, Llc Method of optimizing memory wire actuator energy output
US10505918B2 (en) * 2017-06-28 2019-12-10 Cisco Technology, Inc. Cloud application fingerprint
JP6717548B2 (ja) * 2017-07-21 2020-07-01 日本電信電話株式会社 トラヒック制御システム及び方法
US10834113B2 (en) 2017-07-25 2020-11-10 Netskope, Inc. Compact logging of network traffic events
CN107295008A (zh) * 2017-08-01 2017-10-24 广东云下汇金科技有限公司 一种企业混合云计算环境下的连接建立方法
US11190374B2 (en) 2017-08-28 2021-11-30 Bright Data Ltd. System and method for improving content fetching by selecting tunnel devices
LT3770773T (lt) 2017-08-28 2024-03-12 Bright Data Ltd. Būdas pagerinti turinio parsisiuntimą, pasirenkant tunelinius įrenginius
US10999278B2 (en) 2018-10-11 2021-05-04 Spredfast, Inc. Proxied multi-factor authentication using credential and authentication management in scalable data networks
US11470161B2 (en) * 2018-10-11 2022-10-11 Spredfast, Inc. Native activity tracking using credential and authentication management in scalable data networks
EP3480753A1 (en) * 2017-11-02 2019-05-08 Lstech Ltd A computer implemented method, a system and a computer program for optimizing the operation of a cloud hosted software as a service (saas) system
US10630676B2 (en) * 2017-11-24 2020-04-21 Microsoft Technology Licensing, Llc Protecting against malicious discovery of account existence
CN107995273B (zh) * 2017-11-27 2021-02-09 北京酷我科技有限公司 一种iOS网络管理方法
US11061900B2 (en) 2018-01-22 2021-07-13 Spredfast, Inc. Temporal optimization of data operations using distributed search and server management
US10594773B2 (en) 2018-01-22 2020-03-17 Spredfast, Inc. Temporal optimization of data operations using distributed search and server management
US11055417B2 (en) 2018-04-17 2021-07-06 Oracle International Corporation High granularity application and data security in cloud environments
CN108718236B (zh) * 2018-05-21 2020-08-18 西安交通大学 互联网自组织汇流的数据传输方法
US11064013B2 (en) * 2018-05-22 2021-07-13 Netskope, Inc. Data loss prevention using category-directed parsers
US10951588B2 (en) 2018-07-26 2021-03-16 Palo Alto Networks, Inc. Object property getter and setter for clientless VPN
US10831836B2 (en) 2018-07-26 2020-11-10 Palo Alto Networks, Inc. Browser storage for clientless VPN
US11093574B2 (en) 2018-07-26 2021-08-17 Palo Alto Networks, Inc. Encoding-free javascript stringify for clientless VPN
JP6979494B2 (ja) * 2018-09-20 2021-12-15 エヌ・ティ・ティ・コミュニケーションズ株式会社 制御装置、制御方法、及びプログラム
US10944769B2 (en) 2018-09-25 2021-03-09 Oracle International Corporation Intrusion detection on load balanced network traffic
WO2020086575A1 (en) * 2018-10-25 2020-04-30 Mobile Tech, Inc. Proxy nodes for expanding the functionality of nodes in a wirelessly connected environment
US10771435B2 (en) * 2018-11-20 2020-09-08 Netskope, Inc. Zero trust and zero knowledge application access system
US11522832B2 (en) 2018-11-29 2022-12-06 Target Brands, Inc. Secure internet gateway
WO2020117681A1 (en) * 2018-12-03 2020-06-11 Salesforce.Com, Inc. Automated operations management for computer systems
US11416641B2 (en) 2019-01-24 2022-08-16 Netskope, Inc. Incident-driven introspection for data loss prevention
US11323454B1 (en) * 2019-01-30 2022-05-03 NortonLifeLock Inc. Systems and methods for securing communications
EP4220441A1 (en) 2019-02-25 2023-08-02 Bright Data Ltd. System and method for url fetching retry mechanism
EP3935792A4 (en) 2019-04-02 2022-11-30 Bright Data Ltd. System and method for managing non-direct url fetching service
US11263201B2 (en) * 2019-04-12 2022-03-01 Servicenow, Inc. Interface for supporting integration with cloud-based service providers
US11509673B2 (en) * 2019-06-11 2022-11-22 Zscaler, Inc. Automated estimation of network security policy risk
US10873644B1 (en) * 2019-06-21 2020-12-22 Microsoft Technology Licensing, Llc Web application wrapper
US11586685B2 (en) * 2019-10-31 2023-02-21 Citrix Systems, Inc. Systems and methods for generating data structures from browser data to determine and initiate actions based thereon
US20210160220A1 (en) * 2019-11-25 2021-05-27 Microsoft Technology Licensing, Llc Security service
US11568130B1 (en) * 2019-12-09 2023-01-31 Synopsys, Inc. Discovering contextualized placeholder variables in template code
CN111212077B (zh) * 2020-01-08 2022-07-05 中国建设银行股份有限公司 主机访问系统及方法
US11856022B2 (en) 2020-01-27 2023-12-26 Netskope, Inc. Metadata-based detection and prevention of phishing attacks
CA3170704A1 (en) * 2020-03-03 2021-09-10 Neil Brown System and method for securing cloud based services
US11356502B1 (en) * 2020-04-10 2022-06-07 Wells Fargo Bank, N.A. Session tracking
US11611629B2 (en) * 2020-05-13 2023-03-21 Microsoft Technology Licensing, Llc Inline frame monitoring
US20210360017A1 (en) * 2020-05-14 2021-11-18 Cynomi Ltd System and method of dynamic cyber risk assessment
US11438289B2 (en) 2020-09-18 2022-09-06 Khoros, Llc Gesture-based community moderation
US11356495B2 (en) 2020-10-29 2022-06-07 Microsoft Technology Licensing, Llc Restore URL context for proxies
CN112464175B (zh) * 2020-11-11 2024-12-03 中国建设银行股份有限公司 脚本审核执行方法、系统、设备和存储介质
US11546767B1 (en) 2021-01-21 2023-01-03 T-Mobile Usa, Inc. Cybersecurity system for edge protection of a wireless telecommunications network
US12166784B1 (en) 2021-01-21 2024-12-10 T-Mobile Usa, Inc. Cybersecurity system for network slices of wireless telecommunications network
US11431746B1 (en) 2021-01-21 2022-08-30 T-Mobile Usa, Inc. Cybersecurity system for common interface of service-based architecture of a wireless telecommunications network
US11662716B2 (en) 2021-02-26 2023-05-30 Kla Corporation Secure remote collaboration for equipment in a manufacturing facility
US11647052B2 (en) * 2021-04-22 2023-05-09 Netskope, Inc. Synthetic request injection to retrieve expired metadata for cloud policy enforcement
US11178188B1 (en) * 2021-04-22 2021-11-16 Netskope, Inc. Synthetic request injection to generate metadata for cloud policy enforcement
US11336698B1 (en) 2021-04-22 2022-05-17 Netskope, Inc. Synthetic request injection for cloud policy enforcement
US11184403B1 (en) 2021-04-23 2021-11-23 Netskope, Inc. Synthetic request injection to generate metadata at points of presence for cloud security enforcement
US11190550B1 (en) 2021-04-22 2021-11-30 Netskope, Inc. Synthetic request injection to improve object security posture for cloud security enforcement
US11271972B1 (en) 2021-04-23 2022-03-08 Netskope, Inc. Data flow logic for synthetic request injection for cloud security enforcement
US11271973B1 (en) 2021-04-23 2022-03-08 Netskope, Inc. Synthetic request injection to retrieve object metadata for cloud policy enforcement
US20220377098A1 (en) * 2021-05-21 2022-11-24 Netskope, Inc. Automatic detection of cloud-security features (adcsf) provided by saas applications
CN113190828B (zh) * 2021-05-25 2024-11-08 网宿科技股份有限公司 一种请求代理方法、客户端设备及代理服务设备
CN113391851B (zh) * 2021-06-03 2025-01-07 网宿科技股份有限公司 一种代理控制方法、客户端设备及代理服务设备
US11882155B1 (en) 2021-06-09 2024-01-23 State Farm Mutual Automobile Insurance Company Systems and methods for cybersecurity analysis and control of cloud-based systems
EP4374270A4 (en) * 2021-07-21 2024-11-13 Visa International Service Association AUTHENTICATION USING GROUP SIGNATURES OF USER DEVICES
US11475158B1 (en) 2021-07-26 2022-10-18 Netskope, Inc. Customized deep learning classifier for detecting organization sensitive data in images on premises
CN113704668B (zh) * 2021-09-01 2022-10-14 稿定(厦门)科技有限公司 用于网页开发的数据处理方法和装置
CN113704669B (zh) * 2021-09-01 2022-10-14 稿定(厦门)科技有限公司 用于网页运行的数据处理方法和装置
US11546358B1 (en) * 2021-10-01 2023-01-03 Netskope, Inc. Authorization token confidence system
US20230155983A1 (en) * 2021-11-16 2023-05-18 Capital One Services, Llc SYSTEMS AND METHODS FOR IMPLEMENTING TRANSPARENT SaaS PROXY ON AND OFF NETWORK
US12223029B2 (en) * 2022-01-12 2025-02-11 Dell Products, L.P. Systems and methods for transfer of workspace orchestration
US11943260B2 (en) 2022-02-02 2024-03-26 Netskope, Inc. Synthetic request injection to retrieve metadata for cloud policy enforcement
US20230254288A1 (en) * 2022-02-07 2023-08-10 Vivek Chinar Nair Secure System and Method for Sharing Online Accounts
CN114816558B (zh) * 2022-03-07 2023-06-30 深圳市九州安域科技有限公司 一种脚本注入方法、设备及计算机可读存储介质
US20240281341A1 (en) * 2023-01-31 2024-08-22 Hycu, Inc. Discovery of services in combination with enabling data protection and other workflows
US12261844B2 (en) 2023-03-06 2025-03-25 Spredfast, Inc. Multiplexed data exchange portal interface in scalable data networks
WO2024227254A1 (en) * 2023-05-04 2024-11-07 Codezero Technologies Inc. Debuggable deployment architecture for cloud-based software applications
US12197590B1 (en) 2024-01-29 2025-01-14 Netskope, Inc. Hierarchical risk scoring for SaaS applications
US20250260674A1 (en) * 2024-02-09 2025-08-14 Zscaler, Inc. Systems and methods for inline Hypertext Transfer Protocol (HTTP) cookie encryption

Family Cites Families (69)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6397246B1 (en) * 1998-11-13 2002-05-28 International Business Machines Corporation Method and system for processing document requests in a network system
US9444785B2 (en) * 2000-06-23 2016-09-13 Cloudshield Technologies, Inc. Transparent provisioning of network access to an application
US8204082B2 (en) * 2000-06-23 2012-06-19 Cloudshield Technologies, Inc. Transparent provisioning of services over a network
US7571217B1 (en) * 2000-08-16 2009-08-04 Parallel Networks, Llc Method and system for uniform resource locator transformation
US7865569B1 (en) 2000-09-26 2011-01-04 Juniper Networks, Inc. Method and system for modifying script portions of requests for remote resources
US7631084B2 (en) * 2001-11-02 2009-12-08 Juniper Networks, Inc. Method and system for providing secure access to private networks with client redirection
US8260964B2 (en) * 2003-10-02 2012-09-04 Google Inc. Dynamic content conversion
US7873707B1 (en) 2004-10-27 2011-01-18 Oracle America, Inc. Client-side URL rewriter
JPWO2006051719A1 (ja) 2004-11-12 2008-05-29 株式会社ジャストシステム データ処理装置及びデータ処理方法
US20060117388A1 (en) * 2004-11-18 2006-06-01 Nelson Catherine B System and method for modeling information security risk
US8543726B1 (en) 2005-04-08 2013-09-24 Citrix Systems, Inc. Web relay
US20060248575A1 (en) * 2005-05-02 2006-11-02 Zachary Levow Divided encryption connections to provide network traffic security
US8239939B2 (en) 2005-07-15 2012-08-07 Microsoft Corporation Browser protection module
US8316429B2 (en) * 2006-01-31 2012-11-20 Blue Coat Systems, Inc. Methods and systems for obtaining URL filtering information
CN101075240A (zh) * 2006-08-25 2007-11-21 腾讯科技(深圳)有限公司 跨域获取数据的方法和系统
JP2010515112A (ja) * 2006-10-21 2010-05-06 ネットピア.コム インコーポレイテッド キーワードの処理方法及びそれを実行するためのプログラムを記録した記録媒体
US7949716B2 (en) * 2007-01-24 2011-05-24 Mcafee, Inc. Correlation and analysis of entity attributes
AU2008286237A1 (en) * 2007-08-03 2009-02-12 Universal Vehicles Pty Ltd Evaluation of an attribute of an information object
US9548985B2 (en) 2007-09-20 2017-01-17 Oracle International Corporation Non-invasive contextual and rule driven injection proxy
US7958232B1 (en) * 2007-12-05 2011-06-07 Appcelerator, Inc. Dashboard for on-the-fly AJAX monitoring
US7664862B2 (en) * 2008-01-14 2010-02-16 International Business Machines Corporation Browser-based proxy server for customization and distribution of existing applications
US8365271B2 (en) * 2008-02-27 2013-01-29 International Business Machines Corporation Controlling access of a client system to access protected remote resources supporting relative URLs
JP5151696B2 (ja) * 2008-05-30 2013-02-27 富士通株式会社 ユニフォームリソースロケータ情報を書き換えるプログラム
US8707439B2 (en) * 2008-12-19 2014-04-22 Microsoft Corporation Selecting security offerings
GB0909695D0 (en) 2009-06-05 2009-07-22 Maxymiser Ltd On page console
US8856869B1 (en) * 2009-06-22 2014-10-07 NexWavSec Software Inc. Enforcement of same origin policy for sensitive data
US8205035B2 (en) * 2009-06-22 2012-06-19 Citrix Systems, Inc. Systems and methods for integration between application firewall and caching
AU2011213550A1 (en) 2010-02-03 2012-08-23 Universal Vehicles Pty Ltd Presentation of an information object
EP2542971B1 (en) * 2010-03-01 2019-01-30 EMC Corporation Detection of attacks through partner websites
US9369437B2 (en) 2010-04-01 2016-06-14 Cloudflare, Inc. Internet-based proxy service to modify internet responses
CN102255935B (zh) * 2010-05-20 2016-06-15 中兴通讯股份有限公司 云服务消费方法、云服务中介及云系统
US20110289434A1 (en) * 2010-05-20 2011-11-24 Barracuda Networks, Inc. Certified URL checking, caching, and categorization service
US20110289588A1 (en) * 2010-05-20 2011-11-24 Anupam Sahai Unification of security monitoring and IT-GRC
JP5581820B2 (ja) * 2010-06-04 2014-09-03 富士通株式会社 中継サーバ装置、クッキー制御方法およびクッキー制御プログラム
US8626853B2 (en) * 2010-07-28 2014-01-07 Unwired Planet, Llc Method and system for link-triggered link-translating proxying
US8938800B2 (en) * 2010-07-28 2015-01-20 Mcafee, Inc. System and method for network level protection against malicious software
WO2012063282A1 (ja) * 2010-11-10 2012-05-18 株式会社日立製作所 マッシュアップ・アプリケーションの動作方法およびシステム
EP2533161A1 (en) 2010-11-29 2012-12-12 Hughes Network Systems, LLC Computer networking system and method with javascript injection for web page response time determination
US9003552B2 (en) 2010-12-30 2015-04-07 Ensighten, Inc. Online privacy management
US9119017B2 (en) * 2011-03-18 2015-08-25 Zscaler, Inc. Cloud based mobile device security and policy enforcement
US9647989B2 (en) * 2011-04-27 2017-05-09 Symantec Corporation System and method of data interception and conversion in a proxy
ES2755780T3 (es) * 2011-09-16 2020-04-23 Veracode Inc Análisis estático y de comportamiento automatizado mediante la utilización de un espacio aislado instrumentado y clasificación de aprendizaje automático para seguridad móvil
US9292467B2 (en) 2011-09-16 2016-03-22 Radware, Ltd. Mobile resource accelerator
US20140053234A1 (en) * 2011-10-11 2014-02-20 Citrix Systems, Inc. Policy-Based Application Management
US8949993B2 (en) * 2011-10-17 2015-02-03 Mcafee Inc. Mobile risk assessment
US9391832B1 (en) 2011-12-05 2016-07-12 Menlo Security, Inc. Secure surrogate cloud browsing
WO2013091709A1 (en) 2011-12-22 2013-06-27 Fundació Privada Barcelona Digital Centre Tecnologic Method and apparatus for real-time dynamic transformation of the code of a web document
US8898796B2 (en) 2012-02-14 2014-11-25 International Business Machines Corporation Managing network data
JP2013196396A (ja) * 2012-03-19 2013-09-30 Fujitsu Ltd 中継サーバ、中継プログラム及び中継方法
US9460222B2 (en) * 2012-05-17 2016-10-04 Oracle International Corporation System for rewriting dynamically generated uniform resource locators in proxied hyper text markup language content in accordance with proxy server rules
US8819772B2 (en) * 2012-06-25 2014-08-26 Appthority, Inc. In-line filtering of insecure or unwanted mobile device software components or communications
US8713633B2 (en) * 2012-07-13 2014-04-29 Sophos Limited Security access protection for user data stored in a cloud computing facility
US9154479B1 (en) * 2012-09-14 2015-10-06 Amazon Technologies, Inc. Secure proxy
US20140109171A1 (en) * 2012-10-15 2014-04-17 Citrix Systems, Inc. Providing Virtualized Private Network tunnels
US9137131B1 (en) 2013-03-12 2015-09-15 Skyhigh Networks, Inc. Network traffic monitoring system and method to redirect network traffic through a network intermediary
US20140137273A1 (en) * 2012-11-13 2014-05-15 Appsense Limited System and method for securing the upload of files from a system server
US9009469B2 (en) * 2013-01-15 2015-04-14 Sap Se Systems and methods for securing data in a cloud computing environment using in-memory techniques and secret key encryption
US10686819B2 (en) * 2013-02-19 2020-06-16 Proofpoint, Inc. Hierarchical risk assessment and remediation of threats in mobile networking environment
US9197650B2 (en) * 2013-03-14 2015-11-24 Cisco Technology, Inc. Proxy that switches from light-weight monitor mode to full proxy
US9448826B2 (en) * 2013-03-15 2016-09-20 Symantec Corporation Enforcing policy-based compliance of virtual machine image configurations
EP2976709B1 (en) 2013-03-18 2018-10-03 Cloudmask Systems and methods for intercepting, processing, and protecting user data through web application pattern detection
US9124668B2 (en) 2013-05-20 2015-09-01 Citrix Systems, Inc. Multimedia redirection in a virtualized environment using a proxy server
EP3017393B1 (en) 2013-07-04 2020-12-09 JScrambler S.A. System and method for web application security
US20150066575A1 (en) * 2013-08-28 2015-03-05 Bank Of America Corporation Enterprise risk assessment
US9870349B2 (en) 2013-09-20 2018-01-16 Yottaa Inc. Systems and methods for managing loading priority or sequencing of fragments of a web object
WO2015076846A1 (en) * 2013-11-25 2015-05-28 Mcafee, Inc. Secure proxy to protect private data
US9576070B2 (en) 2014-04-23 2017-02-21 Akamai Technologies, Inc. Creation and delivery of pre-rendered web pages for accelerated browsing
US9635041B1 (en) 2014-06-16 2017-04-25 Amazon Technologies, Inc. Distributed split browser content inspection and analysis
US9438625B1 (en) 2014-09-09 2016-09-06 Shape Security, Inc. Mitigating scripted attacks using dynamic polymorphism

Also Published As

Publication number Publication date
US10091169B2 (en) 2018-10-02
AU2014346390A1 (en) 2016-05-19
CN106031118B (zh) 2020-10-09
CA2930106A1 (en) 2015-05-14
JP6514202B2 (ja) 2019-05-15
WO2015070260A1 (en) 2015-05-14
US20160112375A1 (en) 2016-04-21
PH12016500808B1 (en) 2016-06-13
CN106031118A (zh) 2016-10-12
US9438565B2 (en) 2016-09-06
IL245181B (en) 2019-03-31
JP2017504092A (ja) 2017-02-02
CL2016001116A1 (es) 2017-04-21
EP3069494A1 (en) 2016-09-21
MX361791B (es) 2018-12-17
KR20160110913A (ko) 2016-09-22
EP3734474A3 (en) 2021-01-20
RU2016117971A (ru) 2017-11-15
EP3734474A2 (en) 2020-11-04
EP3069494B1 (en) 2020-08-05
MY181777A (en) 2021-01-06
IL245181A0 (en) 2016-06-30
PH12016500808A1 (en) 2016-06-13
EP3069494A4 (en) 2017-06-28
RU2679549C2 (ru) 2019-02-11
RU2016117971A3 (enrdf_load_stackoverflow) 2018-07-09
MX2016006109A (es) 2017-03-03
AU2014346390B2 (en) 2018-06-21
US20150135302A1 (en) 2015-05-14

Similar Documents

Publication Publication Date Title
IL245181B (en) Proxy and broker for cloud service security
IL245733A0 (en) aplnr modulators and their uses
EP3056394A4 (en) Vehicle security network device and design method therefor
ZA201505936B (en) Symbiotic radar and communication system
IL240880B (en) 7 x 2p modulators
IL240542A0 (en) Shared cloud services and their uses
IL240527A0 (en) Composition of dentures and denture system
PT2995039T (pt) Sistemas e métodos para comunicação segura
EP2948856A4 (en) Traffic and/or workload processing
GB201316673D0 (en) Account association systems and methods
GB201317311D0 (en) Account association systems and methods
IL241003B (en) Systems, methods and preparations for transpositional modulation
ZA201506674B (en) Ship1 modulators and methods related thereto
SG11201509226RA (en) Communication methods and communication devices
GB2521452B (en) Point Cloud Simplification
IL241168A0 (en) 1 ship modulators and related methods
PL3044910T3 (pl) Serwer proxy sieci światłowodowej
EP3062466A4 (en) METHOD AND DEVICE FOR NETWORK SECURITY
ZA201504477B (en) Ship1 modulators and methods related thereto
IL241775A0 (en) Radar systems and methods
GB201307154D0 (en) Security systems and methods
GB201311696D0 (en) Assembly and methods
TH1601002681A (th) โบรกเกอร์รักษาความปลอดภัยการบริการแบบกลุ่มเมฆและพร็อกซี
AU2013901622A0 (en) Secure and Snug
GB201316053D0 (en) Fibre network proxy