Jump to content

20240054229. TECHNIQUES FOR DETECTING APPLICATIONS PATHS UTILIZING EXPOSURE ANALYSIS simplified abstract (Wiz, Inc.)

From WikiPatents

TECHNIQUES FOR DETECTING APPLICATIONS PATHS UTILIZING EXPOSURE ANALYSIS

Organization Name

Wiz, Inc.

Inventor(s)

Matilda Lidgi of Tel Aviv (IL)

Shai Keren of Tel Aviv (IL)

Raaz Herzberg of Tel Aviv (IL)

Avi Tal Lichtenstein of Tel Aviv (IL)

Ami Luttwak of Binyamina (IL)

Roy Reznik of Tel Aviv (IL)

TECHNIQUES FOR DETECTING APPLICATIONS PATHS UTILIZING EXPOSURE ANALYSIS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240054229 titled 'TECHNIQUES FOR DETECTING APPLICATIONS PATHS UTILIZING EXPOSURE ANALYSIS

Simplified Explanation

The abstract describes a system and method for detecting an application path in a cloud computing environment through active inspection.

  • Select a reachable resource in the cloud computing environment with at least one network path.
  • Choose a second resource with a second network path based on the first resource's network path.
  • Actively inspect the second network path to determine accessibility from the first resource.

Potential Applications

  • Cloud computing security
  • Network optimization in cloud environments

Problems Solved

  • Ensuring efficient and secure application paths in cloud computing
  • Identifying network connectivity issues in cloud environments

Benefits

  • Improved application performance
  • Enhanced network security in cloud computing
  • Efficient resource utilization in cloud environments


Original Abstract Submitted

a system and method for detecting an application path utilizing active inspection of a cloud computing environment, includes selecting a reachable resource having at least one network path to access the reachable resource, wherein the reachable resource is a cloud object deployed in the cloud computing environment, and accessible from a network which is external to the cloud computing environment; selecting a second resource having a second network path based on the network path of the reachable resource; and actively inspecting the second network path to determine if the second resource is accessible through the second network path from the reachable resource.

Cookies help us deliver our services. By using our services, you agree to our use of cookies.