GB2587713B - Securing endpoints in a heterogenous enterprise network - Google Patents
Securing endpoints in a heterogenous enterprise network Download PDFInfo
- Publication number
- GB2587713B GB2587713B GB2015005.8A GB202015005A GB2587713B GB 2587713 B GB2587713 B GB 2587713B GB 202015005 A GB202015005 A GB 202015005A GB 2587713 B GB2587713 B GB 2587713B
- Authority
- GB
- United Kingdom
- Prior art keywords
- heterogenous
- enterprise network
- endpoints
- securing endpoints
- securing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/71—Hardware identity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/945,166 US11271950B2 (en) | 2018-04-04 | 2018-04-04 | Securing endpoints in a heterogenous enterprise network |
| US15/945,291 US11616758B2 (en) | 2018-04-04 | 2018-04-04 | Network device for securing endpoints in a heterogeneous enterprise network |
| US15/945,346 US10972431B2 (en) | 2018-04-04 | 2018-04-04 | Device management based on groups of network adapters |
| US15/945,319 US10862864B2 (en) | 2018-04-04 | 2018-04-04 | Network device with transparent heartbeat processing |
| US15/945,226 US11140195B2 (en) | 2018-04-04 | 2018-04-04 | Secure endpoint in a heterogenous enterprise network |
| PCT/US2019/025710 WO2019195502A1 (en) | 2018-04-04 | 2019-04-04 | Securing endpoints in a heterogenous enterprise network |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| GB202015005D0 GB202015005D0 (en) | 2020-11-04 |
| GB2587713A GB2587713A (en) | 2021-04-07 |
| GB2587713B true GB2587713B (en) | 2021-09-22 |
Family
ID=68101424
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB2015005.8A Active GB2587713B (en) | 2018-04-04 | 2019-04-04 | Securing endpoints in a heterogenous enterprise network |
Country Status (2)
| Country | Link |
|---|---|
| GB (1) | GB2587713B (en) |
| WO (1) | WO2019195502A1 (en) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110891059A (en) * | 2019-11-26 | 2020-03-17 | 武汉卓云智方科技有限公司 | Internet safety management platform |
| EP3893461A1 (en) | 2020-04-10 | 2021-10-13 | Hewlett-Packard Development Company, L.P. | Low data rate signalling |
| US12074768B1 (en) | 2021-09-09 | 2024-08-27 | T-Mobile Usa, Inc. | Dynamic configuration of consensus-based network |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20060140181A1 (en) * | 2004-12-29 | 2006-06-29 | Fabian Trumper | Method for packet encapsulation and redirection of data packets |
| US7307996B2 (en) * | 2002-07-30 | 2007-12-11 | Brocade Communications Systems, Inc. | Infiniband router having an internal subnet architecture |
| US20120210000A1 (en) * | 2011-02-15 | 2012-08-16 | International Business Machines Corporation | Registering Devices For Network Access |
| US8990891B1 (en) * | 2011-04-19 | 2015-03-24 | Pulse Secure, Llc | Provisioning layer two network access for mobile devices |
| US20150312266A1 (en) * | 2014-04-28 | 2015-10-29 | Sophos Limited | Advanced persistent threat detection |
| US20160308762A1 (en) * | 2015-04-17 | 2016-10-20 | Equinix, Inc. | Cloud-based services exchange |
| US9680860B1 (en) * | 2016-02-16 | 2017-06-13 | Cylance Inc. | Endpoint-based man in the middle attack detection using multiple types of detection tests |
| US20170302535A1 (en) * | 2013-02-26 | 2017-10-19 | Zentera Systems, Inc. | Secure cloud fabric to connect subnets in different network domains |
| US20170310703A1 (en) * | 2016-04-22 | 2017-10-26 | Sophos Limited | Detecting triggering events for distributed denial of service attacks |
-
2019
- 2019-04-04 WO PCT/US2019/025710 patent/WO2019195502A1/en not_active Ceased
- 2019-04-04 GB GB2015005.8A patent/GB2587713B/en active Active
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7307996B2 (en) * | 2002-07-30 | 2007-12-11 | Brocade Communications Systems, Inc. | Infiniband router having an internal subnet architecture |
| US20060140181A1 (en) * | 2004-12-29 | 2006-06-29 | Fabian Trumper | Method for packet encapsulation and redirection of data packets |
| US20120210000A1 (en) * | 2011-02-15 | 2012-08-16 | International Business Machines Corporation | Registering Devices For Network Access |
| US8990891B1 (en) * | 2011-04-19 | 2015-03-24 | Pulse Secure, Llc | Provisioning layer two network access for mobile devices |
| US20170302535A1 (en) * | 2013-02-26 | 2017-10-19 | Zentera Systems, Inc. | Secure cloud fabric to connect subnets in different network domains |
| US20150312266A1 (en) * | 2014-04-28 | 2015-10-29 | Sophos Limited | Advanced persistent threat detection |
| US20160308762A1 (en) * | 2015-04-17 | 2016-10-20 | Equinix, Inc. | Cloud-based services exchange |
| US9680860B1 (en) * | 2016-02-16 | 2017-06-13 | Cylance Inc. | Endpoint-based man in the middle attack detection using multiple types of detection tests |
| US20170310703A1 (en) * | 2016-04-22 | 2017-10-26 | Sophos Limited | Detecting triggering events for distributed denial of service attacks |
Also Published As
| Publication number | Publication date |
|---|---|
| GB2587713A (en) | 2021-04-07 |
| WO2019195502A1 (en) | 2019-10-10 |
| GB202015005D0 (en) | 2020-11-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ZA201904928B (en) | Data isolation in a blockchain network | |
| GB2525701B (en) | A software defined network and a communication network comprising the same | |
| ZA201902904B (en) | Enabling multiple numerologies in a network | |
| SG11201606999YA (en) | Provisioning digital certificates in a network environment | |
| PL3616467T3 (en) | Network manager in a nr network | |
| EP3900295A4 (en) | VALIDATION IN A DECENTRALIZED NETWORK | |
| GB201522546D0 (en) | Power management in a power over data network | |
| GB202002614D0 (en) | Resource element in a telecommunication system | |
| EP3108598A4 (en) | Optimizing network resources in a telecommunications system | |
| GB201804826D0 (en) | Authentication in a compute network system | |
| IL261888A (en) | Rule enforcement in a network | |
| GB2575704B (en) | Secure communication in a nondeterministic network | |
| GB2587713B (en) | Securing endpoints in a heterogenous enterprise network | |
| GB2589988B (en) | Locally securing endpoints in an enterprise network using remote network resources | |
| SG11202006936RA (en) | Cleaning components and methods in a plating system | |
| GB201809777D0 (en) | Access mode configuration in a network | |
| GB2597201B (en) | Service management in a DBMS | |
| GB2555610B (en) | Data traffic management in a telecommunication network | |
| ZA202001245B (en) | Improved zoning configuration in a mesh network | |
| GB201814539D0 (en) | Network reporting in a cellular network | |
| GB2533186B (en) | A telecommunication network manager | |
| GB2588088B (en) | Managing a secure element | |
| ZA202002446B (en) | A second-order all-pass network comprising cciis | |
| GB2560568B (en) | Broadcasting in a communications network | |
| GB2553786B (en) | A telecommunication network |