×

Systems and methods for contextual and cross application threat detection and prediction in cloud applications

  • US 10,063,654 B2
  • Filed: 06/24/2015
  • Issued: 08/28/2018
  • Est. Priority Date: 12/13/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method, implemented by a computer system of a network security system, for detecting threat activity related to a cloud application, comprising:

  • receiving, from a service provider system, activity data corresponding to one or more actions performed during use of the cloud application by a user account with the cloud application, wherein the service provider system hosts the cloud application, wherein the user account is one of a set of user accounts associated with a tenant account provided by the service provider system for a tenant, wherein the set of user accounts enables one or more users associated with the tenant to access the cloud application;

    receiving, from a system that is different from the service provider system, contextual data associated with a user associated with the user account;

    generating a profile for the user using the activity data and the contextual data, wherein the profile is associated with the user account;

    determining a measure of anomalous activity using the profile;

    determining one or more security controls of the service provider system, wherein the one or more security controls are used by the service provider system to configure access to the cloud application;

    determining one or more instructions to send to the service provider system, wherein the one or more instructions are based on the measure of anomalous activity; and

    sending the one or more instructions to the service provider system, wherein the one or more instructions cause at least one security control from the one or more security controls to be changed, and wherein the access to the cloud application when the user account is used to access the cloud application is modified due to the change to the at least one security control.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×