Patents Assigned to BeyondTrust Software, Inc.
  • Patent number: 11556634
    Abstract: Systems and methods are disclosed for event-based application control. A system extension is configured to leverage an endpoint security API for monitoring event activity within operating system kernel processes. The system extension registers with the endpoint security API particular event types for which the system extension would like to receive notifications. In response to receiving notifications regarding detected events corresponding to the registered event types, the system extension determines if the event, and its corresponding process, are safe and allowable to execute. In various embodiments, the system leverages whitelists, blacklists, and rules policies for making a safeness determination regarding the event notification. The system extension transmits this determination to the operating system via the endpoint security API.
    Type: Grant
    Filed: June 15, 2020
    Date of Patent: January 17, 2023
    Assignee: Beyondtrust Software, Inc.
    Inventors: Omar Jawayd Ikram, Simon Fradkin
  • Patent number: 11528149
    Abstract: Systems and methods for root-level application selective configuration for managing installation of applications in a file system include at least one computing device and an agent. The at least one computing device can receive selections from a user for a file and for actions desired to be executed on the file. Instead of requiring a particular privilege level for the user, the agent can be provided privileges based on a policy file associated with the selected file, thereby allowing the selectable actions to be executed via the agent. The agent can be executed by the at least one computing device and register with an OS during a boot sequence. The agent can receive a selection of a file and render a context menu based on metadata from an associated policy file. The context menu can include one or more badges providing an indication of executable actions for the selected file.
    Type: Grant
    Filed: April 27, 2020
    Date of Patent: December 13, 2022
    Assignee: Beyondtrust Software, Inc.
    Inventors: Simon Fradkin, Steven Joruk
  • Patent number: 9654474
    Abstract: To control privileges and access to resources on a per-process basis, an administrator creates a rule that may be applied to modify a process's token. The rule includes an application-criterion set and changes to be made to the groups and/or privileges of a token. The rule is set as a policy within a group policy object (GPO), where a GPO is associated with one or more groups of computers. When a GPO containing a rule is applied to a computer, a driver installed on the computer accesses the rule(s) anytime a logged-on user executes a process. If the executed process satisfies the criterion set of a rule the changes contained within the rule are made to the process token, and the user has expanded and/or contracted access and/or privileges for only that process.
    Type: Grant
    Filed: September 11, 2013
    Date of Patent: May 16, 2017
    Assignee: BEYONDTRUST SOFTWARE, INC.
    Inventor: Marco Peretti
  • Publication number: 20170078315
    Abstract: Systems and methods for detecting vulnerabilities and/or privileged access are disclosed. In some embodiments, a computerized method comprises receiving asset state information and asset user behavior information for each of a plurality of assets, each of the assets connected to a network; clustering the assets into a plurality of cluster nodes based on the asset state information and the asset user behavior information, each of the assets being clustered in one of the cluster nodes, at least a first asset being clustered in a particular one of the cluster nodes; calculating a node value of the particular one of the cluster nodes, the node value based on the number of assets clustered in the particular one of the cluster nodes; comparing the node value with a threshold node value; and triggering one or more actions based on the comparison of the node value with the threshold node value.
    Type: Application
    Filed: October 1, 2015
    Publication date: March 16, 2017
    Applicant: BeyondTrust Software, Inc.
    Inventors: David Allen, Morey J. Haber, Brad Hibbert
  • Publication number: 20170078309
    Abstract: Systems and methods for detecting vulnerabilities and/or privileged access are disclosed. In some embodiments, a computerized method comprises receiving asset information for each of a plurality of assets, the assets connected to a network; clustering the assets into a plurality of cluster nodes based on the asset information, each of the assets being clustered in one of the cluster nodes, at least a first asset being clustered in a particular one of the cluster nodes; receiving one or more events associated with the first asset; remapping the first asset to a different one of the cluster nodes based on the asset information of the first asset and the one or more events associated with the first asset; calculating a distance between the particular cluster node and the different cluster node; and triggering one or more actions based on the distance between the particular cluster node and the different cluster node.
    Type: Application
    Filed: October 1, 2015
    Publication date: March 16, 2017
    Applicant: BeyondTrust Software, Inc.
    Inventors: David Allen, Morey J. Haber, Brad Hibbert
  • Patent number: 9594898
    Abstract: To control privileges and access to resources on a per-process basis, an administrator creates a rule that may be applied to modify a token of a process. The rule may include an application-criterion set and changes to be made to the groups and/or privileges of the token. The rule may be set as a policy within a group policy object (GPO), where a GPO is associated with one or more groups of computers or users. When a GPO containing a rule is applied to a computer, a driver installed on the computer may access the rule(s) anytime a logged-on user executes a process. If the executed process satisfies the criterion set of a rule, the changes contained within the rule are made to the process token, and the user has expanded and/or contracted access and/or privileges for only that process.
    Type: Grant
    Filed: October 23, 2014
    Date of Patent: March 14, 2017
    Assignee: BeyondTrust Software, Inc.
    Inventors: Peter David Beauregard, Andrey Kolishchak, Shannon E. Jennings, Robert F. Hogan
  • Patent number: 9558343
    Abstract: To control privileges and access to resources on a per-process basis, an administrator creates a rule that may be applied to modify a token of a process. The rule may include an application-criterion set and changes to be made to the groups and/or privileges of the token. The rule may be set as a policy within a group policy object (GPO), where a GPO is associated with one or more groups of computers or users. When a GPO containing a rule is applied to a computer, a driver installed on the computer may access the rule(s) anytime a logged-on user executes a process. If the executed process satisfies the criterion set of a rule, the changes contained within the rule are made to the process token, and the user has expanded and/or contracted access and/or privileges for only that process.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: January 31, 2017
    Assignee: BeyondTrust Software, Inc.
    Inventors: Peter David Beauregard, Andrey Kolishchak, Shannon E. Jennings, Robert F. Hogan
  • Patent number: 9531726
    Abstract: In various embodiments, a method comprises scanning a directory structure to generate a scan result comprising a plurality of discovered systems, identifying one or more accounts associated with at least one of the plurality of discovered systems, configuring a security appliance to change one or more old passwords to one or more new passwords for the one or more accounts, and changing, with the configured security appliance, the one or more old passwords to the one or more new passwords.
    Type: Grant
    Filed: December 29, 2015
    Date of Patent: December 27, 2016
    Assignee: BeyondTrust Software, Inc.
    Inventors: Gyle Iverson, Jeffery Nielsen, Julie Lustig-Rusch, James Mitchell
  • Patent number: 9467465
    Abstract: In various embodiments, an agent on a digital device may comprise a monitor module, an application identification module, a vulnerability module, a rules database, and a rule module. The monitor module may be configured to monitor a device for an instruction to execute a legitimate application. The application identification module may be configured to identify one or more attributes of the legitimate application. The vulnerability module may be configured to retrieve risk information based on the one or more attributes of the legitimate application. The risk information may be determined from known vulnerabilities of the legitimate application. The rules database may be for storing a rule associated with the risk information. The rule module may be configured to retrieve the rule from the rule database based on the risk information and to control the legitimate application based on the rule.
    Type: Grant
    Filed: February 18, 2014
    Date of Patent: October 11, 2016
    Assignee: BeyondTrust Software, Inc.
    Inventors: Brad Hibbert, Chris Silva
  • Publication number: 20160149924
    Abstract: In various embodiments, a method comprises scanning a directory structure to generate a scan result comprising a plurality of discovered systems, identifying one or more accounts associated with at least one of the plurality of discovered systems, configuring a security appliance to change one or more old passwords to one or more new passwords for the one or more accounts, and changing, with the configured security appliance, the one or more old passwords to the one or more new passwords.
    Type: Application
    Filed: December 29, 2015
    Publication date: May 26, 2016
    Applicant: BeyondTrust Software, Inc.
    Inventors: Gyle Iverson, Jeffery Nielsen, Julie Lustig-Rusch, James Mitchell
  • Patent number: 9225723
    Abstract: In various embodiments, a method comprises scanning a directory structure to generate a scan result comprising a plurality of discovered systems, identifying one or more accounts associated with at least one of the plurality of discovered systems, configuring a security appliance to change one or more old passwords to one or more new passwords for the one or more accounts, and changing, with the configured security appliance, the one or more old passwords to the one or more new passwords.
    Type: Grant
    Filed: July 9, 2014
    Date of Patent: December 29, 2015
    Assignee: BeyondTrust Software, Inc.
    Inventors: Gyle Iverson, Jeffery Nielsen, Julie Lustig-Rusch, James Mitchell
  • Patent number: 9160545
    Abstract: In various embodiments, security may be provided for application to application (A2A) and application to database (A2DB) implementations. In some embodiments, a method comprises receiving a registration request at a first digital device for a first application, receiving a first program factor associated with the first application, confirming the first program factor, generating a first password for a second application based, at least, on the confirmation of the first program factor, and providing the first password to a second digital.
    Type: Grant
    Filed: July 2, 2009
    Date of Patent: October 13, 2015
    Assignee: BeyondTrust Software, Inc.
    Inventors: Gyle Iverson, Jeffery Nielsen, Julie Lustig-Rusch, James Mitchell
  • Publication number: 20150074828
    Abstract: To control privileges and access to resources on a per-process basis, an administrator creates a rule that may be applied to modify a token of a process. The rule may include an application-criterion set and changes to be made to the groups and/or privileges of the token. The rule may be set as a policy within a group policy object (GPO), where a GPO is associated with one or more groups of computers or users. When a GPO containing a rule is applied to a computer, a driver installed on the computer may access the rule(s) anytime a logged-on user executes a process. If the executed process satisfies the criterion set of a rule, the changes contained within the rule are made to the process token, and the user has expanded and/or contracted access and/or privileges for only that process.
    Type: Application
    Filed: September 30, 2014
    Publication date: March 12, 2015
    Applicant: BeyondTrust Software, Inc.
    Inventors: Peter David Beauregard, Andrey Kolishchak, Shannon E. Jennings, Robert F. Hogan
  • Publication number: 20150047025
    Abstract: To control privileges and access to resources on a per-process basis, an administrator creates a rule that may be applied to modify a token of a process. The rule may include an application-criterion set and changes to be made to the groups and/or privileges of the token. The rule may be set as a policy within a group policy object (GPO), where a GPO is associated with one or more groups of computers or users. When a GPO containing a rule is applied to a computer, a driver installed on the computer may access the rule(s) anytime a logged-on user executes a process. If the executed process satisfies the criterion set of a rule, the changes contained within the rule are made to the process token, and the user has expanded and/or contracted access and/or privileges for only that process.
    Type: Application
    Filed: October 23, 2014
    Publication date: February 12, 2015
    Applicant: BEYONDTRUST SOFTWARE, INC.
    Inventors: Peter David Beauregard, Andrey Kolishchak, Shannon E. Jennings, Robert F. Hogan
  • Patent number: 8863253
    Abstract: In various embodiments, a method comprises scanning a directory structure to generate a scan result comprising a plurality of discovered systems, identifying one or more accounts associated with at least one of the plurality of discovered systems, configuring a security appliance to change one or more old passwords to one or more new passwords for the one or more accounts, and changing, with the configured security appliance, the one or more old passwords to the one or more new passwords.
    Type: Grant
    Filed: September 30, 2009
    Date of Patent: October 14, 2014
    Assignee: BeyondTrust Software, Inc.
    Inventors: Gyle Iverson, Jeffery Nielsen, Julie Lustig-Rusch, James Mitchell
  • Patent number: 8850549
    Abstract: To control privileges and access to resources on a per-process basis, an administrator creates a rule that may be applied to modify a token of a process. The rule may include an application-criterion set and changes to be made to the groups and/or privileges of the token. The rule may be set as a policy within a group policy object (GPO), where a GPO is associated with one or more groups of computers or users. When a GPO containing a rule is applied to a computer, a driver installed on the computer may access the rule(s) anytime a logged-on user executes a process. If the executed process satisfies the criterion set of a rule, the changes contained within the rule are made to the process token, and the user has expanded and/or contracted access and/or privileges for only that process.
    Type: Grant
    Filed: May 3, 2010
    Date of Patent: September 30, 2014
    Assignee: BeyondTrust Software, Inc.
    Inventors: Peter David Beauregard, Andrey Kolishchak, Shannon E. Jennings, Robert F. Hogan
  • Publication number: 20140245376
    Abstract: In various embodiments, an agent on a digital device may comprise a monitor module, an application identification module, a vulnerability module, a rules database, and a rule module. The monitor module may be configured to monitor a device for an instruction to execute a legitimate application. The application identification module may be configured to identify one or more attributes of the legitimate application. The vulnerability module may be configured to retrieve risk information based on the one or more attributes of the legitimate application. The risk information may be determined from known vulnerabilities of the legitimate application. The rules database may be for storing a rule associated with the risk information. The rule module may be configured to retrieve the rule from the rule database based on the risk information and to control the legitimate application based on the rule.
    Type: Application
    Filed: February 18, 2014
    Publication date: August 28, 2014
    Applicant: BeyondTrust Software, Inc.
    Inventors: Brad Hibbert, Chris Silva
  • Publication number: 20140201843
    Abstract: In various embodiments, a method comprises receiving a plurality of records from a first digital device, each of the plurality of records generated during execution or termination of a different executable and containing information related to execution or termination of the different executable, retrieving at least one segment from at least one of the plurality of records, the at least one segment being less than all of the at least one of the plurality of records, the segment including an application or file attribute related to the different executable, comparing the application or file attribute to a vulnerability database, identifying a risk based on the comparison, and generating a report identifying the risk.
    Type: Application
    Filed: January 15, 2014
    Publication date: July 17, 2014
    Applicant: BeyondTrust Software, Inc.
    Inventors: Brad Hibbert, Chris Silva