Palo Alto Networks, Inc. (20240348652). SD-WAN IOT SECURITY POSTURE MANAGEMENT simplified abstract

From WikiPatents
Jump to navigation Jump to search

SD-WAN IOT SECURITY POSTURE MANAGEMENT

Organization Name

Palo Alto Networks, Inc.

Inventor(s)

Arunkumar Mutharasanallur Desigan of Bangalore (IN)

Vamsidhar Valluri of San Francisco CA (US)

Venkata Sarat Kumar Vajrapu of Bengaluru (IN)

Gong Cheng of Sunnyvale CA (US)

Madhusudhan Donthi Nagaraju of Bangalore (IN)

Anil Kumar Reddy Sirigiri of Bangalore (IN)

SD-WAN IOT SECURITY POSTURE MANAGEMENT - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240348652 titled 'SD-WAN IOT SECURITY POSTURE MANAGEMENT

The patent application discusses a security posture management system that leverages application identification and device discovery from ongoing collection and analysis of network traffic data to manage policies at device granularity, allowing tailored security posture management.

  • The system can tailor policies based on identified application and device type inputs obtained from ongoing collection and analysis.
  • It can configure SD-WAN construct-based parameters of a policy to tailor policies for different application traffic from different types of devices.

Potential Applications: This technology can be applied in enterprise networks to enhance security posture management by customizing policies based on specific applications and device types.

Problems Solved: The system addresses the challenge of managing security posture in complex networks with a variety of network traffic and variables to consider.

Benefits: Tailored security policies improve network security by addressing specific application traffic and device types, enhancing overall security posture management.

Commercial Applications: This technology can be valuable for IT security companies, network management firms, and enterprises looking to enhance their cybersecurity measures.

Prior Art: Researchers can explore existing literature on network security, policy management, and device discovery to understand the background of this technology.

Frequently Updated Research: Stay informed about the latest advancements in network security, policy management, and device identification to enhance the effectiveness of this technology.

Questions about Security Posture Management System: 1. How does the system differentiate between various types of network traffic for policy management? 2. What are the key benefits of tailoring security policies at device granularity?


Original Abstract Submitted

increasing use of web-based applications or software-as-a-service and iot devices within enterprise networks increases the variety of network traffic and variables for consideration in managing security posture, which includes policy management. a security posture management system as disclosed herein leverages application identification and device discovery from ongoing collection and analysis of network traffic data to manage policies at device granularity allowing tailored security posture management. the system can tailor policies to handle network traffic depending on identified application and device type inputs obtained from the ongoing collection and analysis. the security posture management system can configure sd-wan construct based parameters of a policy to tailor policies for different application traffic from different types of devices.