Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Palo Alto Networks Inc patents


Recent patent applications related to Palo Alto Networks Inc. Palo Alto Networks Inc is listed as an Agent/Assignee. Note: Palo Alto Networks Inc may have other listings under different names/spellings. We're not affiliated with Palo Alto Networks Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "P" | Palo Alto Networks Inc-related inventors


Automatically configuring mobile devices and applying policy based on device state

Techniques for network-based security for mobile devices based on device state are disclosed. In some embodiments, automatically configuring mobile devices and applying policies based on a host information profile (hip) report includes receiving a host information profile (hip) report for a mobile device; performing a policy match based on the hip report for the mobile device; and performing an action based on the policy match based on the hip report for the mobile device.. ... Palo Alto Networks Inc

Bridging a virtual clone of a target device in a honey network to a suspicious device in an enterprise network

Techniques for bridging a honey network to a suspicious device in a network (e.g., an enterprise network) are disclosed. In some embodiments, a system for bridging a honey network to a suspicious device in an enterprise network includes a device profile data store that includes a plurality of attributes of each of a plurality of devices in the target network environment; a virtual clone manager executed on a processor that instantiates a virtual clone of one or more devices in the target network environment based on one or more attributes for a target device in the device profile data store; and a honey network policy that is configured to route an internal network communication from a suspicious device in the target network environment to the virtual clone for the target device in the honey network.. ... Palo Alto Networks Inc

Dynamic selection and generation of a virtual clone for detonation of suspicious content within a honey network

Techniques for dynamic selection and generation of detonation location of suspicious content with a honey network are disclosed. In some embodiments, a system for dynamic selection and generation of detonation location of suspicious content with a honey network includes a virtual machine (vm) instance manager that manages a plurality of virtual clones executed in an instrumented vm environment, in which the plurality of virtual clones executed in the instrumented vm environment correspond to the honey network that emulates a plurality of devices in an enterprise network; and an intelligent malware detonator that detonates a malware sample in at least one of the plurality of virtual clones executed in the instrumented vm environment.. ... Palo Alto Networks Inc

Detection of compromised credentials as a network service

Techniques for detection of compromised credentials as a network service are disclosed. In some embodiments, a system, process, and/or computer program product for detection of compromised credentials as a network service includes monitoring a plurality of sessions at a firewall, logging a plurality of failed or timed out attempts to authenticate at the firewall in a log, analyzing the log for a pattern of failed or timed out attempts to authenticate at the firewall to identify potentially compromised credentials for authentication, and determining that a set of credentials for authentication have been compromised based on the analysis of the log.. ... Palo Alto Networks Inc

Time-based network authentication challenges

Techniques for time-based network authentication challenges are disclosed. In some embodiments, a system, process, and/or computer program product for time-based network authentication challenges includes monitoring a session at a firewall to identify a user associated with the session, generating a timestamp for an authentication factor associated with the user after the user successfully authenticates for access to a resource based on an authentication profile, intercepting another request from the user for access to the resource at the firewall, and determining whether the timestamp for the authentication factor is expired based on the authentication profile.. ... Palo Alto Networks Inc

Intercept-based multifactor authentication enrollment of clients as a network service

Techniques for intercept-based multifactor authentication client enrollment as a network service are disclosed. In some embodiments, a system, process, and/or computer program product for intercept-based multifactor authentication client enrollment as a network service includes monitoring a session at a firewall, intercepting a request for access to a resource while monitoring the session at the firewall, determining that a user associated with the session is not enrolled for multifactor authentication, and initiating enrollment of the user for the multifactor authentication.. ... Palo Alto Networks Inc

Multifactor authentication as a network service

Techniques for multifactor authentication as a network service are disclosed. In some embodiments, a system, process, and/or computer program product for multifactor authentication as a network service includes monitoring a session at a firewall, applying an authentication profile based on the new session, and performing an action based on the authentication profile.. ... Palo Alto Networks Inc

Latency-based policy activation

Techniques for latency-based policy activation are disclosed. In some embodiments, a system for latency-based policy activation includes collecting a plurality of latency measures associated with monitored network communications; correlating the plurality of latency measures associated with the monitored network communications to detect anomalous network activity based on a profile; and performing a mitigation response to the anomalous network activity based on a policy.. ... Palo Alto Networks Inc

Determination of user reputation regarding data object exposure in cloud computing environments

Embodiments disclosed herein provide systems, methods, and computer readable media for determining user reputation regarding data object exposure in a cloud computing environment. In a particular embodiment, a method provides receiving, from the cloud computing environment, information regarding behavior of a user in the cloud computing environment. ... Palo Alto Networks Inc

Automatic repair of corrupt files for a detonation engine

Techniques for automatic repair of corrupt files (e.g., malware sample files) for a detonation engine are disclosed. In some embodiments, a system, process, and/or computer program for automatic repair of corrupt files for a detonation engine includes receiving a malware sample from a network device; determining whether the malware sample includes a corrupt file; and in an event that the malware sample is determined to include the corrupt file, repairing the corrupt file for the detonation engine.. ... Palo Alto Networks Inc

Single sign on proxy for regulating access to a cloud service

Embodiments disclosed herein provide systems, methods, and computer readable media for using a single sign-on proxy to regulate access to a cloud service. In a particular embodiment, a method provides receiving an authentication request from a user system directed to a sso service and determining whether the authentication request satisfies at least one criterion for allowing access to the cloud service associated with the sso service. ... Palo Alto Networks Inc

Malware domain detection using passive dns

Techniques for malware domain detection using passive domain name service (dns) are disclosed. In some embodiments, malware domain detection using passive dns includes generating a malware association graph that associates a plurality of malware samples with malware source information, in which the malware source information includes a first domain; generating a reputation score for the first domain using the malware association graph and passive dns information; and determining whether the first domain is a malware domain based on the reputation score for the first domain.. ... Palo Alto Networks Inc

Security policy enforcement for mobile devices based on device state

Techniques for network-based security for mobile devices based on device state are disclosed. In some embodiments, network-based security for mobile devices based on device state includes receiving a host information profile (hip) report for a mobile device from a mobile device management (mdm) service at the security device, in which the hip report includes device state information for the mobile device; applying a policy based on the hip report for the mobile device and the device state; and performing access control at the security device based on the policy based on the hip report for the mobile device.. ... Palo Alto Networks Inc

Malware detection using clustering with malware source information

Techniques for malware detection using clustering with malware source information are disclosed. In some embodiments, malware detection using clustering with malware source information includes generating a first cluster of source information associated with a first malware sample, in which the first malware sample was determined to be malware, and the first malware sample was determined to be downloaded from a first source; and determining that a second source is associated with malware based on the first cluster.. ... Palo Alto Networks Inc

11/09/17 / #20170324776

Generating a honey network configuration to emulate a target network environment

Techniques for generating a honey network configuration to emulate a target network environment are disclosed. In some embodiments, techniques for generating a honey network configuration to emulate a target network include receiving a network scan survey of the target network; generating the honey network configuration to emulate the target network using the network scan survey of the target network; and executing a honey network using the honey network configuration.. ... Palo Alto Networks Inc

09/14/17 / #20170264628

Automated insider threat prevention

Techniques for automated insider threat prevention are disclosed. In some embodiments, a system, process, and/or computer program product for automated insider threat prevention includes monitoring network communications at a network device; detecting an anomalous activity based on the monitored network communications associated with a user based on a behavior profile for the user; and performing an action in response to the detected anomalous activity based on a policy.. ... Palo Alto Networks Inc

09/14/17 / #20170264626

Malicious http cookies detection and clustering

Techniques for malicious http cookies detection and clustering are disclosed. In some embodiments, a system, process, and/or computer program product for malicious http cookies detection and clustering includes receiving a sample at a cloud security service; extracting a cookie from network traffic associated with the sample; determining that the cookie is associated with malware; and generating a signature based on the cookie.. ... Palo Alto Networks Inc

09/14/17 / #20170262629

Cookies watermarking in malware analysis

Techniques for cookies watermarking in malware analysis are disclosed. In some embodiments, a system, process, and/or computer program product for cookies watermarking in malware analysis includes receiving a sample at a cloud security service; detonating the sample in an instrumented virtual environment; and determining that the sample is malware based on detecting an attempt to access a watermark cookie during an automated malware analysis using the instrumented virtual environment.. ... Palo Alto Networks Inc

08/31/17 / #20170251003

Automatically determining whether malware samples are similar

Techniques for automatically determining whether malware samples are similar are disclosed. In some embodiments, a system, process, and/or computer program product for automatically determining whether malware samples are similar includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; comparing the log files based on the automated malware analysis; determining whether any of the plurality of samples are similar based on the comparison of the log files based on the automated malware analysis; and performing an action based on determining that at least two samples are similar.. ... Palo Alto Networks Inc

08/31/17 / #20170251002

Malware analysis platform for threat intelligence made actionable

Techniques for a malware analysis platform for threat intelligence made actionable are disclosed. In some embodiments, a system, process, and/or computer program product for a malware analysis platform for threat intelligence made actionable includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to determine artifacts associated with malware; and performing an action based on an artifact.. ... Palo Alto Networks Inc

08/31/17 / #20170250997

Alerting and tagging using a malware analysis platform for threat intelligence made actionable

Techniques for alerting and tagging using a malware analysis platform for threat intelligence made actionable are disclosed. In some embodiments, a system, process, and/or computer program product for alerting and tagging using a malware analysis platform for threat intelligence made actionable includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract artifacts associated with the log files; determining whether a tag matches any of the plurality of samples based on the artifacts; and performing an action based on whether the tag matches any of the plurality of samples.. ... Palo Alto Networks Inc

08/17/17 / #20170235973

Determination of data object exposure in cloud computing environments

Embodiments disclosed herein provide systems, methods, and computer readable media for indicating data object exposure in a cloud computing environment. In a particular embodiment, a method provides receiving information about a data object from the cloud computing environment. ... Palo Alto Networks Inc

07/20/17 / #20170208034

Encrypted peer-to-peer detection

Encrypted peer-to-peer detection is provided. In some embodiments, encrypted peer-to-peer detection includes monitoring network traffic from a first client to determine whether the first client is executing a peer-to-peer application; and generating network traffic that emulates peer-to-peer network traffic sent from the peer-to-peer application executing on the first client to a second client after detecting unknown network traffic sent from the first client to the second client. ... Palo Alto Networks Inc

07/06/17 / #20170195369

Externally defined objects in security policy

Using one or more externally defined objects to at least in part define a security policy is disclosed. In some embodiments, an external object list is obtained from an external list server, and a security policy comprising one or more rules based at least in part on one or more externally defined objects comprising the external object list and based at least in part on one or more locally defined objects is defined. ... Palo Alto Networks Inc

06/08/17 / #20170163603

Discovering and selecting candidates for sinkholing of network domains

Techniques for discovering and selecting candidates for sinkholing of network domains are provided. In some embodiments, a process for discovering and selecting candidates for sinkholing of network domains includes collecting passive dns data from a plurality of security devices to discover candidates for sinkholing of domain names; selecting one or more domain names that are most commonly queried by distinct client devices based on the passive dns data, wherein each of the one or more domain names is not yet registered; and automatically registering each of the one or more domain names with a domain registry to a sinkholed ip address in order to sinkhole each of the one or more domain names.. ... Palo Alto Networks Inc

05/18/17 / #20170142066

Network device implementing two-stage flow information aggregation

A network security device includes a network flow statistics processing engine to process network flow information related to network flows. The network flow statistics processing engine includes a first processing stage performing per-flow information aggregation and a second processing stage performing per-destination system component information aggregation, with each processing stage implementing a threshold-based data export scheme and a timer-based data export scheme. ... Palo Alto Networks Inc

03/09/17 / #20170068815

Detection of malware using an instrumented virtual machine environment

Various techniques for detection of malware using an instrumented virtual machine environment are disclosed. In some embodiments, detection of malware using an instrumented virtual machine environment includes instantiating a first virtual machine in the instrumented virtual machine environment, in which the first virtual machine is configured to support installation of two or more versions of a resource; installing a first version of the resource on the first virtual machine and monitoring the instrumented virtual machine environment while executing the first version of the resource with a malware sample opened using the first version of the resource; and installing a second version of the resource on the first virtual machine and monitoring the instrumented virtual machine environment while executing the second version of the resource with the malware sample opened using the second version of the resource.. ... Palo Alto Networks Inc

02/16/17 / #20170048197

Packet classification for network routing

Techniques for packet classification for network routing are disclosed. In some embodiments, packet classification for network routing includes receiving packets associated with a new flow at a security controller from a network device, in which the network device performs packet forwarding; classifying the flow; and determining an action for the flow based on a policy (e.g., a security policy). ... Palo Alto Networks Inc

02/02/17 / #20170034004

Discovering network nodes

Discovering nodes of a network is disclosed. A multicast group of the network is sent an internet protocol multicast packet that requires a receiver of the packet to provide a response packet. ... Palo Alto Networks Inc

01/19/17 / #20170019425

Synchronizing a honey network configuration to reflect a target network environment

Techniques for synchronizing a honey network configuration to reflect a target network environment are disclosed. In some embodiments, a system for synchronizing a honey network configuration to reflect a target network environment includes a device profile data store that includes a plurality of attributes of each of a plurality of devices in the target network environment; a virtual machine (vm) image library that includes one or more vm images; and a virtual clone manager executed on a processor that instantiates a virtual clone of one or more devices in the target enterprise network using a vm image selected from the vm image library that is customized based on one or more attributes for a target device in the device profile data store.. ... Palo Alto Networks Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Palo Alto Networks Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Palo Alto Networks Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###