Patents Assigned to Qualys, Inc.
-
Patent number: 10986135Abstract: A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the security management system may scan assets within the enterprise network for vulnerabilities and may receive data from these scans. The security management system may also receive data from other sources, and, as a result, the system may handle data having many different formats and attributes. When the security management system tries to associate data to assets, there may not be a globally unique identifier that is applicable for all received data. Provided in the present disclosure are exemplary techniques for tracking assets across a network using an asset correlation engine that can flexibly correlate data with assets based on attribute information.Type: GrantFiled: December 30, 2019Date of Patent: April 20, 2021Assignee: Qualys, Inc.Inventors: Sean M. Molloy, Matthew L. Wirges, Amol S. Sonawane
-
Patent number: 10965709Abstract: The present describes simulating a threat-actor executing an attack execution operation. According to one aspect of the subject matter described in this disclosure, a method for generating a domain-specific language (DSL) simulant is disclosed. The method may comprise determining, a framework based on an attack repository, determining a first primitive based on the framework, and determining a second primitive based on the framework. In one implementation, the first primitive and the second primitive are fundamental structures or constructs within a DSL. The method further comprises combining the first primitive and the second primitive into a DSL simulant. In one implementation, the DSL simulant is executed to simulate a threat-actor executing an attack execution operation.Type: GrantFiled: April 15, 2019Date of Patent: March 30, 2021Assignee: Qualys, Inc.Inventors: Mayuresh Vishwas Dani, Ankur S. Tyagi
-
Patent number: 10965712Abstract: The present disclosure describes defending against an attack execution operation. According to one aspect of the subject matter described in this disclosure, a method for generating a domain-specific language (DSL) file is disclosed. The method may comprise determining, a framework based on an attack repository, determining a first primitive based on the framework, and determining a second primitive based on the framework. In one implementation, the first primitive and the second primitive are fundamental structures or constructs within a DSL. The method further comprises combining the first primitive and the second primitive into a DSL file. In one implementation, the DSL file is executed to defend against a first attack execution operation executed by a threat-actor.Type: GrantFiled: April 15, 2019Date of Patent: March 30, 2021Assignee: Qualys, Inc.Inventors: Mayuresh Vishwas Dani, Ankur S. Tyagi
-
Patent number: 10958686Abstract: The present disclosure describes enticing a threat-actor to execute an attack execution operation. According to one aspect of the subject matter described in this disclosure, a method for generating a domain-specific language (DSL) file is disclosed. The method may comprise determining, a framework based on an attack repository, determining a first primitive based on the framework, and determining a second primitive based on the framework. In one implementation, the first primitive and the second primitive are fundamental structures or constructs within a DSL. The method further comprises combining the first primitive and the second primitive into a DSL file. In one implementation, the DSL file is executed to create a computing environment that entices a first attacker to execute an attack execution operation within a given domain.Type: GrantFiled: April 15, 2019Date of Patent: March 23, 2021Assignee: Qualys, Inc.Inventors: Mayuresh Vishwas Dani, Ankur S. Tyagi
-
Patent number: 10652268Abstract: Methods and systems for scanning an endpoint terminal across an open computer network are disclosed. An exemplary method includes providing a scanner engine in a computer server in communication with an open computer network, and establishing a secure connection across the open computer network between the scanner engine and a scanner agent installed on the endpoint terminal in communication with the open computer network. Commands for collecting data regarding the endpoint terminal are sent from the scanner engine across the secure connection to the scanner agent. The scanner engine then receives the collected data from the scanner agent across the secure connection, analyzes the data to assess a current posture of the endpoint terminal, and determines any updates for the endpoint terminal from the analysis. Updates are sent across the secure connection to the scanner agent for installation on the endpoint terminal, and the secure connection may then be terminated.Type: GrantFiled: June 29, 2018Date of Patent: May 12, 2020Assignee: Qualys, Inc.Inventors: Wissam Ali-Ahmad, Wolfgang Kandek, Holger Kruse, Vikas Dewan, Khair-ed-dine Mazboudi, Ganesh Jampani, Kenneth K. Okumura
-
Patent number: 10523713Abstract: A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the security management system may scan assets within the enterprise network for vulnerabilities and may receive data chunks from these scans. The security management system may also receive data chunks from other sources, and, as a result, the system may handle data chunks having many different formats and attributes. When the security management system tries to associate data chunks to assets, there may not be a globally unique identifier that is applicable for all received data chunks. Provided in the present disclosure are exemplary techniques for tracking assets across a network using an asset correlation engine that can flexibly match data chunks to assets based on the attribute or attributes that are available within the data chunks.Type: GrantFiled: July 9, 2018Date of Patent: December 31, 2019Assignee: Qualys, Inc.Inventors: Sean M. Molloy, Matthew L. Wirges, Amol S. Sonawane
-
Patent number: 10341509Abstract: The presently described embodiments relate to a novel system and method to collect state as a snapshot from a potentially transient endpoint and transmit the state to a public or private network for storage and processing. This system and method allows for the synchronization and virtualization of the endpoint state image in the network for purposes of processing, analysis, and reporting, including but not limited to endpoint vulnerability auditing.Type: GrantFiled: March 15, 2013Date of Patent: July 2, 2019Assignee: Qualys, Inc.Inventors: Rami Kawach, Terry K. Cook, Roger W. Sprague, Jr., Patrick J. Stratton
-
Patent number: 10229274Abstract: The disclosed principles describe systems and methods for assessing the security posture of a target device, wherein the assessment is performed by a scanning computer in communication with the target device via a communication network. By employing a system or method in accordance with the disclosed principles, distinct advantages are achieved. Specifically, conducting such a remote scan allows for the scanner computer to perform a remote scan of the remote device without installing client software to the remote device. Thus, the disclosed principles reduce the need for internal IT resources to manage the deployment and updates of client software on the target device. Also, conducting a remote scan according to the disclosed principles allows for the remote scan to be performed even if the scanner computer and remote device run different operating systems.Type: GrantFiled: March 12, 2018Date of Patent: March 12, 2019Assignee: Qualys, Inc.Inventors: Wolfgang Kandek, Holger Kruse, Tigran Gevorgyan, Gregor Glawitsch, Parminder Singh, Kenneth K. Okumura
-
Publication number: 20180316694Abstract: Embodiments disclosed herein are directed to intelligent malware detection. A scanner server is used to scan an endpoint device for malware. Various attributes and behaviors of the endpoint device are identified in retrieved scan data. Identified attributes and behaviors are then evaluated according to a malware detection framework, which is used to determine whether (as well as to what extent) the identified attributes and behaviors are indicative of malware. In this manner, potential security risks associated with the malware may be identified. The framework is constructed through a machine learning process that aggregates attributes and behaviors common amongst members of malware families. Advantageously, the framework enables the scanner server to detect unknown variants of known malware families.Type: ApplicationFiled: April 28, 2017Publication date: November 1, 2018Applicant: Qualys, Inc.Inventors: Sumedh Thakar, Ankur S. Tyagi, Abhijit V. Limaye
-
Patent number: 10108801Abstract: Present example embodiments relate generally to scanning websites, wherein the devices, methods, and logic for the scanning comprises receiving interaction information between a user computing device and a web application of the website; dynamically determining an action to be performed to the web application that approximately simulates the user computing device interacting with the web application, wherein the action is dynamically determined based on the received interaction information; establishing a browsing session with the website; discovering the web application within the website; and identifying a vulnerability of the web application by interacting with the web application using the action.Type: GrantFiled: November 15, 2012Date of Patent: October 23, 2018Assignee: Qualys, Inc.Inventors: Michael P. Shema, Vaagn Toukharian, Sergey Shekyan
-
Patent number: 10104101Abstract: Embodiments disclosed herein are directed to intelligent malware detection. A scanner server is used to scan an endpoint device for malware. Various attributes and behaviors of the endpoint device are identified in retrieved scan data. Identified attributes and behaviors are then evaluated according to a malware detection framework, which is used to determine whether (as well as to what extent) the identified attributes and behaviors are indicative of malware. In this manner, potential security risks associated with the malware may be identified. The framework is constructed through a machine learning process that aggregates attributes and behaviors common amongst members of malware families. Advantageously, the framework enables the scanner server to detect unknown variants of known malware families.Type: GrantFiled: April 28, 2017Date of Patent: October 16, 2018Assignee: Qualys, Inc.Inventors: Sumedh S. Thakar, Ankur S. Tyagi, Abhijit V. Limaye
-
Patent number: 10021140Abstract: A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the security management system may scan assets within the enterprise network for vulnerabilities and may receive data chunks from these scans. The security management system may also receive data chunks from other sources, and, as a result, the system may handle data chunks having many different formats and attributes. When the security management system tries to associate data chunks to assets, there may not be a globally unique identifier that is applicable for all received data chunks. Provided in the present disclosure are exemplary techniques for tracking assets across a network using an asset correlation engine that can flexibly match data chunks to assets based on the attribute or attributes that are available within the data chunks.Type: GrantFiled: March 6, 2017Date of Patent: July 10, 2018Assignee: Qualys, Inc.Inventors: Sean M. Molloy, Matthew L. Wirges, Amol S. Sonawane
-
Patent number: 10015187Abstract: Methods and systems for scanning an endpoint terminal across an open computer network are disclosed. An exemplary method includes providing a scanner engine in a computer server in communication with an open computer network, and establishing a secure connection across the open computer network between the scanner engine and a scanner agent installed on the endpoint terminal in communication with the open computer network. Commands for collecting data regarding the endpoint terminal are sent from the scanner engine across the secure connection to the scanner agent. The scanner engine then receives the collected data from the scanner agent across the secure connection, analyzes the data to assess a current posture of the endpoint terminal, and determines any updates for the endpoint terminal from the analysis. Updates are sent across the secure connection to the scanner agent for installation on the endpoint terminal, and the secure connection may then be terminated.Type: GrantFiled: August 29, 2016Date of Patent: July 3, 2018Assignee: Qualys, Inc.Inventors: Wissam Ali-Ahmad, Wolfgang Kandek, Holger Kruse, Vikas Dewan, Khair-ed-dine Mazboudi, Ganesh Jampani, Kenneth K. Okumura
-
Patent number: 9916455Abstract: The disclosed principles describe systems and methods for assessing the security posture of a target device, wherein the assessment is performed by a scanning computer in communication with the target device via a communication network. By employing a system or method in accordance with the disclosed principles, distinct advantages are achieved. Specifically, conducting such a remote scan allows for the scanner computer to perform a remote scan of the remote device without installing client software to the remote device. Thus, the disclosed principles reduce the need for internal IT resources to manage the deployment and updates of client software on the target device. Also, conducting a remote scan according to the disclosed principles allows for the remote scan to be performed even if the scanner computer and remote device run different operating systems.Type: GrantFiled: April 10, 2017Date of Patent: March 13, 2018Assignee: Qualys, Inc.Inventors: Wolfgang Kandek, Holger Kruse, Tigran Gevorgyan, Gregor Glawitsch, Parminder Singh, Kenneth K. Okumura
-
Patent number: 9900333Abstract: Described herein is a system and method for detecting vulnerability state deltas, the method comprising the steps of: receiving data related to a network connected device; determining a vulnerability state of the network connected device based upon the data; storing the vulnerability state in a vulnerability state database; receiving additional data related to the network connected device; determining an updated vulnerability state of the network connected device based upon the additional data; determining one or more deltas based upon differences between the vulnerability stare and the updated vulnerability state; and updating the stored vulnerability state with the updated vulnerability state.Type: GrantFiled: February 5, 2015Date of Patent: February 20, 2018Assignee: Qualys, Inc.Inventors: Sumedh Thakar, Bharat Patel, Balaji Venkatesan, Tristan Burch, Sean M. Molloy, Matthew L. Wirges
-
Patent number: 9876813Abstract: The technology described herein provides a novel system and method for web-based log analysis. The analysis combines the benefits of typical log monitoring systems with those of typical vulnerability managements systems. The synergy of the combined log monitoring and vulnerability management results in a single provider detecting vulnerability and subsequently accessing archived log data to detect if the vulnerability has been exploited in the past, identifying compromised machines for customers.Type: GrantFiled: February 11, 2015Date of Patent: January 23, 2018Assignee: Qualys, Inc.Inventors: Artem Harutyunyan, Amol R. Sarwate, Sumedh Thakar, Michael P. Shema
-
Patent number: 9621594Abstract: The disclosed principles describe systems and methods for assessing the security posture of a target device, wherein the assessment is performed by a scanning computer in communication with the target device via a communication network. By employing a system or method in accordance with the disclosed principles, distinct advantages are achieved. Specifically, conducting such a remote scan allows for the scanner computer to perform a remote scan of the remote device without installing client software to the remote device. Thus, the disclosed principles reduce the need for internal IT resources to manage the deployment and updates of client software on the target device. Also, conducting a remote scan according to the disclosed principles allows for the remote scan to be performed even if the scanner computer and remote device run different operating systems.Type: GrantFiled: February 8, 2016Date of Patent: April 11, 2017Assignee: Qualys, Inc.Inventors: Wolfgang Kandek, Holger Kruse, Tigran Gevorgyan, Gregor Glawitsch, Parminder Singh, Kenneth K. Okumura
-
Patent number: 9613099Abstract: A dynamical hierarchical tagging system connected to a user site through a remote communications network. The system may comprise a master controller, a job management server connected to the master controller, one or more scanners in communication with the job management server, wherein the one or more scanners are configured to scan for one or more user assets located at the user site, resulting in scan results, a scan logic processor connected to the master controller, wherein the scan logic processor is configured to store the scan results in a user database, a tagging logic engine connected to the master controller, wherein the tagging logic engine is configured to tag the scan results stored in the user database, and an indexing logic processor connected to the master controller, wherein the indexing logic processor is configured to search and index the tagged scan results stored in the user database.Type: GrantFiled: October 12, 2011Date of Patent: April 4, 2017Assignee: Qualys, Inc.Inventors: Sean Molloy, Terry Ramos, Sumedh Thakar
-
Patent number: 9591027Abstract: A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the security management system may scan assets within the enterprise network for vulnerabilities and may receive data chunks from these scans. The security management system may also receive data chunks from other sources, and, as a result, the system may handle data chunks having many different formats and attributes. When the security management system tries to associate data chunks to assets, there may not be a globally unique identifier that is applicable for all received data chunks. Provided in the present disclosure are exemplary techniques for tracking assets across a network using an asset correlation engine that can flexibly match data chunks to assets based on the attribute or attributes that are available within the data chunks.Type: GrantFiled: February 17, 2015Date of Patent: March 7, 2017Assignee: Qualys, Inc.Inventors: Sean M. Molloy, Matthew L. Wirges, Amol S. Sonawane
-
Patent number: 9432392Abstract: Methods and systems for scanning an endpoint terminal across an open computer network are disclosed. An exemplary method includes providing a scanner engine in a computer server in communication with an open computer network, and establishing a secure connection across the open computer network between the scanner engine and a scanner agent installed on the endpoint terminal in communication with the open computer network. Commands for collecting data regarding the endpoint terminal are sent from the scanner engine across the secure connection to the scanner agent. The scanner engine then receives the collected data from the scanner agent across the secure connection, analyzes the data to assess a current posture of the endpoint terminal, and determines any updates for the endpoint terminal from the analysis. Updates are sent across the secure connection to the scanner agent for installation on the endpoint terminal, and the secure connection may then be terminated.Type: GrantFiled: December 29, 2014Date of Patent: August 30, 2016Assignee: Qualys, Inc.Inventors: Wissam Ali-Ahmad, Wolfgang Kandek, Holger Kruse, Vikas Dewan, Khair-ed-dine Mazboudi, Ganesh Jampani, Kenneth K. Okumura