Patents by Inventor Mayank Betala

Mayank Betala has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10389757
    Abstract: A device receives a new rule construct that includes a source address or a destination address, and at least one parameter, where the new rule construct includes a new rule to be provided to a network. The device identifies network devices, of the network, to which the new rule is to be provided based on the new rule construct, and determines a proper position for the new rule, in a list of existing rules provided in each network device, based on the new rule construct and information associated with the network devices. The device causes the new rule to be provided to and stored in the network devices, at the proper position, in the list of existing rules, determined for each network device.
    Type: Grant
    Filed: March 31, 2017
    Date of Patent: August 20, 2019
    Assignee: Juniper Networks, Inc.
    Inventors: Chandan Kumar, Mayank Betala, Nadeem Khan
  • Patent number: 10382451
    Abstract: Techniques are described for optimizing the placement of automatically generated rules within security policies. An administrator may, for example, interact with the graphical representation of rules rendered by the threat control module and, responsive to the interaction, the system may determine an optimal placement for the created rule in the list of rules for the identified security device based on either the existence of anomalies or threat IP data and/or advanced security parameters. In this way, the system allows administrators to configure rules with the most optimal sequence to detect threats.
    Type: Grant
    Filed: July 9, 2018
    Date of Patent: August 13, 2019
    Assignee: Juniper Networks, Inc.
    Inventors: Oscar Leonardo Bejarano Ardila, Rakesh Manocha, Rene Chavez, Pradeep Velappan Nair Pushkala Devi, Nadeem Khan, Mayank Betala, Andrew S. Chasin
  • Patent number: 10135841
    Abstract: Techniques are described for taking direct actions, such as selectively blocking or allowing traffic and applications, while monitoring events from a graphical representation of threats. As such, the administrator in an enterprise interacts with the graphical representation of threats rendered by the security management system to automatically invoke a policy/rule module of the security management system to configure and update security policies for the security devices deployed throughout the computer networks of the enterprise.
    Type: Grant
    Filed: December 30, 2015
    Date of Patent: November 20, 2018
    Assignee: Juniper Networks, Inc.
    Inventors: Lisa M. Beam, Lyubov Nesteroff, Natalia L. Shimuk, Amol Sood, Rene Chavez, Olga M. Towstopiat, Nadeem Khan, Ahzam Ali, Dharmendran Arumugam, Mayank Betala, Shrikanta Sharma
  • Publication number: 20180332055
    Abstract: Techniques are described for optimizing the placement of automatically generated rules within security policies. An administrator may, for example, interact with the graphical representation of rules rendered by the threat control module and, responsive to the interaction, the system may determine an optimal placement for the created rule in the list of rules for the identified security device based on either the existence of anomalies or threat IP data and/or advanced security parameters. In this way, the system allows administrators to configure rules with the most optimal sequence to detect threats.
    Type: Application
    Filed: July 9, 2018
    Publication date: November 15, 2018
    Inventors: Oscar Leonardo Bejarano Ardila, Rakesh Manocha, Rene Chavez, Pradeep Velappan Nair Pushkala Devi, Nadeem Khan, Mayank Betala, Andrew S. Chasin
  • Patent number: 10021115
    Abstract: Techniques are described for optimizing the placement of automatically generated rules within security policies. An administrator may, for example, interact with the graphical representation of rules rendered by the threat control module and, responsive to the interaction, the system may determine an optimal placement for the created rule in the list of rules for the identified security device based on either the existence of anomalies or threat IP data and/or advanced security parameters. In this way, the system allows administrators to configure rules with the most optimal sequence to detect threats.
    Type: Grant
    Filed: December 30, 2015
    Date of Patent: July 10, 2018
    Assignee: Juniper Networks, Inc.
    Inventors: Oscar Leonardo Bejarano Ardila, Rakesh Manocha, Rene Chavez, Pradeep Velappan Nair Pushkala Devi, Nadeem Khan, Mayank Betala, Andrew S. Chasin
  • Publication number: 20180176257
    Abstract: A device receives a new rule construct that includes a source address or a destination address, and at least one parameter, where the new rule construct includes a new rule to be provided to a network. The device identifies network devices, of the network, to which the new rule is to be provided based on the new rule construct, and determines a proper position for the new rule, in a list of existing rules provided in each network device, based on the new rule construct and information associated with the network devices. The device causes the new rule to be provided to and stored in the network devices, at the proper position, in the list of existing rules, determined for each network device.
    Type: Application
    Filed: March 31, 2017
    Publication date: June 21, 2018
    Inventors: Chandan Kumar, Mayank Betala, Nadeem Khan
  • Publication number: 20170126728
    Abstract: Techniques are described for taking direct actions, such as selectively blocking or allowing traffic and applications, while monitoring events from a graphical representation of threats. As such, the administrator in an enterprise interacts with the graphical representation of threats rendered by the security management system to automatically invoke a policy/rule module of the security management system to configure and update security policies for the security devices deployed throughout the computer networks of the enterprise.
    Type: Application
    Filed: December 30, 2015
    Publication date: May 4, 2017
    Inventors: Lisa M. Beam, Lyubov Nesteroff, Natalia L. Shimuk, Amol Sood, Rene Chavez, Olga M. Towstopiat, Nadeem Khan, Ahzam Ali, Dharmendran Arumugam, Mayank Betala, Shrikanta Sharma
  • Publication number: 20170126740
    Abstract: Techniques are described for optimizing the placement of automatically generated rules within security policies. An administrator may, for example, interact with the graphical representation of rules rendered by the threat control module and, responsive to the interaction, the system may determine an optimal placement for the created rule in the list of rules for the identified security device based on either the existence of anomalies or threat IP data and/or advanced security parameters. In this way, the system allows administrators to configure rules with the most optimal sequence to detect threats.
    Type: Application
    Filed: December 30, 2015
    Publication date: May 4, 2017
    Inventors: Oscar Leonardo Bejarano Ardila, Rakesh Manocha, Rene Chavez, Pradeep Velappan Nair Pushkala Devi, Nadeem Khan, Mayank Betala, Andrew S. Chasin