18186862. LATERAL MOVEMENT FIREWALL simplified abstract (Microsoft Technology Licensing, LLC)

From WikiPatents
Jump to navigation Jump to search

LATERAL MOVEMENT FIREWALL

Organization Name

Microsoft Technology Licensing, LLC

Inventor(s)

Noam Hadash of Ness Ziona (IL)

Amir Kutcher of Kiryat Motzkin (IL)

Edan Zwick of Tel-Aviv (IL)

Philip Tsukerman of Herzliya (IL)

Yair Tsarfaty of Nahariy (IL)

LATERAL MOVEMENT FIREWALL - A simplified explanation of the abstract

This abstract first appeared for US patent application 18186862 titled 'LATERAL MOVEMENT FIREWALL

Simplified Explanation:

The patent application describes a system where potential cyberattacks are detected in a centralized computer system, and a prevention policy is generated to block specific functionality for certain users. This prevention policy is then distributed to multiple computer devices for enforcement.

  • Centralized computer system detects potential cyberattacks
  • Centralized policy service generates prevention policy
  • Prevention policy allows granular blocking of functionality for specific users
  • Policy is distributed to multiple computer devices for enforcement

Key Features and Innovation:

  • Detection of potential cyberattacks in a centralized system
  • Generation of prevention policy in response to detected cyberattacks
  • Granular blocking of functionality for specific users
  • Distribution of prevention policy for decentralized enforcement

Potential Applications:

The technology can be applied in various industries such as cybersecurity, network security, and data protection.

Problems Solved:

The technology addresses the need for efficient detection and prevention of cyberattacks in centralized computer systems.

Benefits:

  • Enhanced security measures against potential cyberattacks
  • Granular control over functionality access for specific users
  • Centralized generation and decentralized enforcement of prevention policies

Commercial Applications:

The technology can be utilized by organizations, government agencies, and businesses to strengthen their cybersecurity measures and protect sensitive data.

Prior Art:

Readers can explore prior patents related to centralized cybersecurity systems and prevention policies for further research.

Frequently Updated Research:

Stay updated on the latest advancements in centralized cybersecurity systems and prevention policies to enhance security measures.

Questions about Centralized Cybersecurity Systems:

1. How does the technology detect potential cyberattacks in a centralized system? 2. What are the benefits of distributing prevention policies for decentralized enforcement?


Original Abstract Submitted

In one or more examples disclosed herein, a potential cyberattack is detected in a centralized computer system. A centralized policy service generates a prevention policy in response, using the information about the potential cyberattack. The prevention policy allows granular blocking of selective functionality in respect of a certain user(s). Although generated centrally, one generated, the prevention policy is distributed to multiple computer devices (e.g. within an organization) for decentralized enforcement, by policy agents executed on those computer devices.