Patents Assigned to Zscaler, Inc.
  • Publication number: 20160036857
    Abstract: A cloud-based method, system, and transparent proxy for user-level policy, reporting, and authentication over Domain Name System (DNS) include maintaining a local user Internet Protocol (IP) database identifying users in an enterprise; and acting as a transparent proxy for all DNS requests from the users performing the steps of: for a user already identified in the local user IP database, forwarding a DNS request to a cloud-based system with an identifier from the local user IP database of the user associated with the DNS request; and for the user not identified in the local user IP database, performing a series of redirects and hand offs in the cloud-based system to identify the user.
    Type: Application
    Filed: August 4, 2014
    Publication date: February 4, 2016
    Applicant: ZSCALER, INC.
    Inventors: Patrick FOXHOVEN, John CHANAK, William FEHRING
  • Publication number: 20160036855
    Abstract: A cloud-based method, a system, and a cloud-based security system include receiving a request from a user for a cloud application at a proxy server; determining whether the user is authenticated based on a presence of cookies in the request; if the cookies are present, un-transforming the cookies by the proxy server and forwarding the request with the un-transformed cookies to the cloud application; and, if the cookies are not present, forwarding the request to the cloud application by the proxy server for authentication and transforming the cookies subsequent to the authentication prior to sending the cookies to the user.
    Type: Application
    Filed: July 31, 2014
    Publication date: February 4, 2016
    Applicant: Zscaler, Inc.
    Inventors: Tejus GANGADHARAPPA, Sivaprasad UDUPA, Dhawal SHARMA, Sridhar NARASIMHAN, Manoj APTE
  • Publication number: 20160036816
    Abstract: A method in a cloud-based security system includes operating a Domain Name System (DNS) resolution service, proxy, or monitor in the cloud-based security system; receiving DNS records with time-to-live (TTL) parameters; checking the TTL parameters for indication of a fast flux technique; and detecting domains performing the fast flux technique based on the DNS records. A cloud-based security system includes a plurality of nodes communicatively coupled to one or more users; and a Domain Name System (DNS) service providing a resolution service, proxy, or monitor in the cloud-based security system; wherein the DNS service is configured to receive DNS records with time-to-live (TTL) parameters; check the TTL parameters for indication of a fast flux technique; and detect domains performing the fast flux technique based on the DNS records.
    Type: Application
    Filed: July 30, 2014
    Publication date: February 4, 2016
    Applicant: ZSCALER, INC.
    Inventor: Subbu SRINIVASAN
  • Publication number: 20150372982
    Abstract: A method includes connecting to a client at a Virtual Private Network (VPN) device in a cloud system; forwarding requests from the client for the Internet or public clouds accordingly; and, for requests for an enterprise associated with the client, contacting a topology controller to fetch a topology of the enterprise, causing a tunnel to be established from the enterprise to the VPN device, and forwarding the requests for the enterprise through the tunnel. A cloud system and VPN system are also described. Advantageously, connections between the cloud and on-premises proxy are dynamic, on-demand and orchestrated by the cloud. Security is provided at the edge—there is no need to punch any holes in the existing on-premises firewalls.
    Type: Application
    Filed: June 20, 2014
    Publication date: December 24, 2015
    Applicant: Zscaler, Inc.
    Inventors: Sudhindra P. Herle, Patrick Foxhoven
  • Publication number: 20150331692
    Abstract: An upgrade method for a Unix or Unix-like operating system, a server, and a cloud-based system include operating a server with an old operating system with a partition structure for media, wherein the partition structure includes a root partition and a usr partition; copying media to the root partition and the usr partition associated with a new operating system while the old operating system is operating; rebooting the server with the new operating system set to load; and subsequent to the rebooting, making the root partition persistent using memory and the usr partition persistent using a NULL file system.
    Type: Application
    Filed: May 13, 2014
    Publication date: November 19, 2015
    Applicant: ZSCALER, INC.
    Inventors: Arcady Schekochikhin, Srikanth Devarajan
  • Publication number: 20150326613
    Abstract: A cloud-based secure Web gateway, a cloud-based secure Web method, and a network deliver a secure Web gateway (SWG) as a cloud-based service to organizations and provide dynamic user identification and policy enforcement therein. As a cloud-based service, the SWG systems and methods provide scalability and capability of accommodating multiple organizations therein with proper isolation therebetween. There are two basic requirements for the cloud-based SWG: (i) Having some means of forwarding traffic from the organization or its users to the SWG nodes, and (ii) Being able to authenticate the organization and users for policy enforcement and access logging. The SWG systems and methods dynamically associate traffic to users regardless of the source (device, location, encryption, application type, etc.), and once traffic is tagged to a user/organization, various polices can be enforced and audit logs of user access can be maintained.
    Type: Application
    Filed: May 14, 2015
    Publication date: November 12, 2015
    Applicant: ZSCALER, INC.
    Inventors: Srikanth Devarajan, Sridhar Narasimhan, Amit Sinha, Manoj Apte
  • Publication number: 20150326615
    Abstract: Cloud based mobile device security and policy systems and methods use the “cloud” to pervasively enforce security and policy on mobile devices. The cloud based mobile device security and policy systems and methods provide uniformity in securing mobile devices for small to large organizations. The cloud based mobile device security and policy systems and methods may enforce one or more policies for users wherever and whenever the users are connected across a plurality of different devices including mobile devices. This solution ensures protection across different types, brands, operating systems, etc. for smartphones, tablets, netbooks, mobile computers, and the like.
    Type: Application
    Filed: July 13, 2015
    Publication date: November 12, 2015
    Applicant: Zscaler, Inc.
    Inventor: Amit SINHA
  • Publication number: 20150319182
    Abstract: A cloud-based method, a behavioral analysis system, and a cloud-based security system can include a plurality of nodes communicatively coupled to one or more users, wherein the plurality of nodes each perform inline monitoring for one of the one or more users for security comprising malware detection and preclusion; and a behavioral analysis system communicatively coupled to the plurality of nodes, wherein the behavioral analysis system performs offline analysis for any suspicious content from the one or more users which is flagged by the plurality of nodes; wherein the plurality of nodes each comprise a set of known malware signatures for the inline monitoring that is periodically updated by the behavioral analysis system based on the offline analysis for the suspicious content.
    Type: Application
    Filed: July 10, 2015
    Publication date: November 5, 2015
    Applicant: ZSCALER, INC.
    Inventors: Sriram NATARAJAN, Narinder PAUL, Julien SOBRIER, Karthikeyan THAMILARASU, Balakrishna BAYAR, Michael Andrew William SUTTON
  • Patent number: 9152789
    Abstract: A cloud-based method, a behavioral analysis system, and a cloud-based security system can include a plurality of nodes communicatively coupled to one or more users, wherein the plurality of nodes each perform inline monitoring for one of the one or more users for security comprising malware detection and preclusion; and a behavioral analysis system communicatively coupled to the plurality of nodes, wherein the behavioral analysis system performs offline analysis for any suspicious content from the one or more users which is flagged by the plurality of nodes; wherein the plurality of nodes each comprise a set of known malware signatures for the inline monitoring that is periodically updated by the behavioral analysis system based on the offline analysis for the suspicious content.
    Type: Grant
    Filed: March 26, 2014
    Date of Patent: October 6, 2015
    Assignee: Zscaler, Inc.
    Inventors: Sriram Natarajan, Narinder Paul, Julien Sobrier, Karthikeyan Thamilarasu, Balakrishna Bayar, Michael Andrew William Sutton
  • Patent number: 9154475
    Abstract: Methods, systems, and apparatus, including computer program products, for distributed security system authorization. Client device authentication instructions are executed on a client device to determine if authentication data accessible by the client device authentication instructions are stored at the client device. If the authentication data are stored at the client device, the client device authentication instructions generate authenticated user data and store the authenticated user data at the client device. If the authentication data are not stored at the client device, the client device authentication instructions generate a login environment that allows a user of the client device to input login data. The login data are provided to a verification process that in response to verification provide the authentication data to the client device.
    Type: Grant
    Filed: January 16, 2009
    Date of Patent: October 6, 2015
    Assignee: Zscaler, Inc.
    Inventors: Kailash Kailash, Jeff Forristal, Narinder Paul, Sivaprasad Udupa
  • Publication number: 20150244741
    Abstract: The present disclosure relates to cloud based mobile device management (MDM) systems and methods to use the “cloud” to pervasively manage mobile devices. The cloud based MDM systems and methods provide an ability to manage mobile devices with or without MDM clients while no requiring an MDM appliance or service at the enterprise. This provides a “no hardware, no software” deployment. In an exemplary embodiment, a client-less implementation leverages the ActiveSync protocol proxied through distributed cloud nodes to enforce mobile policies. In another exemplary embodiment, a client-based implementation uses a platform specific application and associated application programming interfaces (API) to connect managed mobile devices and provide MDM features through the cloud. Advantageously, the cloud based MDM systems and methods provide reliability and resiliency, elasticity, lower cost, mobility, integration of management and security, and agility over conventional MDM based solutions.
    Type: Application
    Filed: May 14, 2015
    Publication date: August 27, 2015
    Applicant: ZSCALER, INC.
    Inventors: Amit SINHA, Narinder PAUL, Srikanth DEVARAJAN
  • Patent number: 9118689
    Abstract: A cloud based security method and processing node includes monitoring data traffic between a user and an external network, wherein the monitoring is performed by a processing node comprising a first server in a cloud based system, detecting a security incident, if an archiving rule exists based on the security incident, providing a notification to a second server within an organization's domain, wherein the user is part of the organization, and wherein the notification includes private data associated with the security incident based on the archiving rule, and storing non-private data in the cloud based system based on the archiving rule.
    Type: Grant
    Filed: April 13, 2012
    Date of Patent: August 25, 2015
    Assignee: Zscaler, Inc.
    Inventors: Manoj Apte, Sridhar Narasimhan, Purvi Desai
  • Patent number: 9119017
    Abstract: The present disclosure relates to cloud based mobile device security and policy systems and methods to use the “cloud” to pervasively enforce security and policy on mobile devices. The cloud based mobile device security and policy systems and methods provide uniformity in securing mobile devices for small to large organizations. The cloud based mobile device security and policy systems and methods may enforce one or more policies for users wherever and whenever the users are connected across a plurality of different devices including mobile devices. This solution ensures protection across different types, brands, operating systems, etc. for smartphones, tablets, netbooks, mobile computers, and the like.
    Type: Grant
    Filed: September 23, 2011
    Date of Patent: August 25, 2015
    Assignee: Zscaler, Inc.
    Inventor: Amit Sinha
  • Patent number: 9065800
    Abstract: A cloud-based secure Web gateway, a cloud-based secure Web method, and a network deliver a secure Web gateway (SWG) as a cloud-based service to organizations and provide dynamic user identification and policy enforcement therein. As a cloud-based service, the SWG systems and methods provide scalability and capability of accommodating multiple organizations therein with proper isolation therebetween. There are two basic requirements for the cloud-based SWG: (i) Having some means of forwarding traffic from the organization or its users to the SWG nodes, and (ii) Being able to authenticate the organization and users for policy enforcement and access logging. The SWG systems and methods dynamically associate traffic to users regardless of the source (device, location, encryption, application type, etc.), and once traffic is tagged to a user/organization, various polices can be enforced and audit logs of user access can be maintained.
    Type: Grant
    Filed: December 27, 2012
    Date of Patent: June 23, 2015
    Assignee: Zscaler, Inc.
    Inventors: Srikanth Devarajan, Sridhar Narasimhan, Amit Sinha, Manoj Apte
  • Patent number: 9065850
    Abstract: The present disclosure provides phishing heuristic systems and methods that detect phishing sites. The present invention may be implemented via a server connected to the Internet, via a distributed security system, and the like. Phishing sites may be detected in a single transaction, i.e. client request plus server reply, while knowing as little as possible about the site being masqueraded. In an exemplary embodiment, a phishing site detection system and method utilized three steps—whitelisting, blacklisting, and scoring. For example, if a particular page meets all requirements of blacklisting without any elements of whitelisting and has a score over a particular threshold, that particular site may be designated as a phishing page.
    Type: Grant
    Filed: February 7, 2011
    Date of Patent: June 23, 2015
    Assignee: Zscaler, Inc.
    Inventor: Julien Sobrier
  • Patent number: 9060239
    Abstract: The present disclosure relates to cloud based mobile device management (MDM) systems and methods to use the “cloud” to pervasively manage mobile devices. The cloud based MDM systems and methods provide an ability to manage mobile devices with or without MDM clients while no requiring an MDM appliance or service at the enterprise. This provides a “no hardware, no software” deployment. In an exemplary embodiment, a client-less implementation leverages the ActiveSync protocol proxied through distributed cloud nodes to enforce mobile policies. In another exemplary embodiment, a client-based implementation uses a platform specific application and associated application programming interfaces (API) to connect managed mobile devices and provide MDM features through the cloud. Advantageously, the cloud based MDM systems and methods provide reliability and resiliency, elasticity, lower cost, mobility, integration of management and security, and agility over conventional MDM based solutions.
    Type: Grant
    Filed: August 9, 2011
    Date of Patent: June 16, 2015
    Assignee: Zscaler, Inc.
    Inventors: Amit Sinha, Narinder Paul, Srikanth Devarajan
  • Publication number: 20150163199
    Abstract: Systems and methods of integrating log data from a cloud system with an internal management system are described, wherein the cloud system is located externally from a secure network which contains the internal management system. The systems and methods include receiving log data from a cloud system through a secure connection between the secure network and the cloud system; buffering the received log data; filtering the buffered, received log data; and transmitting the filtered, buffered, received log data to the internal management system in a format associated with the internal management system.
    Type: Application
    Filed: January 15, 2015
    Publication date: June 11, 2015
    Applicant: Zscaler, Inc.
    Inventors: Kailash Kailash, Chakkaravarthy Periyasamy Balaiah, Sushil Pangeni, Amit Sinha, Samuel John Crank, Manoj Apte, Sridhar Narasimhan
  • Publication number: 20150143504
    Abstract: A method implemented by an agent operating on a mobile device communicating to a cloud-based system includes opening up local listening sockets on the mobile device; redirecting outgoing traffic from all application on the mobile device except the agent to the local listening sockets; and forwarding the outgoing traffic from the local listening sockets to the cloud-based system with additional information included therein for the cloud-based system.
    Type: Application
    Filed: December 4, 2014
    Publication date: May 21, 2015
    Applicant: Zscaler, Inc.
    Inventors: Purvi DESAI, Vikas MAHAJAN, Abhinav BANSAL
  • Patent number: 9003023
    Abstract: A computer implemented method, a cloud system, and a log system provide interactive analytics providing various intuitive mechanisms for interaction with data visualizations of Internet traffic, email, etc. The methods and systems utilize a cloud based monitoring system where all traffic from an organization may be monitored in a location and platform independent manner. The methods and systems include context-aware drilldown with progressively applied filtering and grouping while maintaining workflow history such that a user can go back to any point in the flow and proceed down a new path of investigation.
    Type: Grant
    Filed: June 13, 2012
    Date of Patent: April 7, 2015
    Assignee: Zscaler, Inc.
    Inventors: Samuel John Crank, Upasona Kath Hazarika
  • Patent number: 9003186
    Abstract: Systems, methods and apparatus for a distributed security that provides authentication and authorization management. The system can include an epoch manager that is used to generate authentication and authorization data that remain valid only for an epoch. The epoch manager can generate an epoch key pair that can be used to encrypt and decrypt the authentication and authorization data during the epoch that the key is valid. The epoch manager can also associate the contents of the data with the epoch in which it was created, so that at decrypting the epoch that the data was generated in can be identified.
    Type: Grant
    Filed: July 24, 2008
    Date of Patent: April 7, 2015
    Assignee: Zscaler, Inc.
    Inventors: Kailash Kailash, Shashidhara Mysore Nanjundaswamy, Amarnath Mullick, Jose Raphel