×

Techniques for discovering and managing security of applications

  • US 10,536,478 B2
  • Filed: 02/23/2017
  • Issued: 01/14/2020
  • Est. Priority Date: 02/26/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising, at a computer system of a security management system:

  • obtaining a file including data about network activity associated with a client device on a network of an organization, wherein the network activity is generated when the client device is operating as part of the network of the organization;

    identifying, using the data about the network activity, an application that has been accessed by the client device while the client device is operating as part of the network of the organization, wherein the application is provided to the client device from a network of a service provider, wherein the network of the organization and the network of the service provider are different networks;

    determining, using the data about the network activity, access information associated with the application, wherein the access information includes network activity indicating an access of the application from the client device;

    determining, using the access information, domain information about the application, wherein the domain information identifies the service provider;

    determining, using the domain information, security information about the application, wherein the security information comprises a first value indicative of a first security threat associated with the application and a second value indicative of a second security threat associated with the application;

    computing a first weighted value that is based on multiplying the first value by a first weight value;

    computing a second weighted value that is based on multiplying the second value by a second weight value;

    computing a first sum that is based on a summation of the first weighted value and the second weighted value;

    computing a second sum that is based on a summation of the first weight value and the second weight value;

    computing a measure of security based on dividing the first sum by the second sum; and

    performing, by applying a security policy based on the measure of security, a remediation action for the application.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×