Patents by Inventor Rubin Azad

Rubin Azad has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240314169
    Abstract: Systems and methods for cloud-based threat alerts and monitoring include monitoring network traffic via a cloud-based system of one or more tenants of the cloud-based system; receiving a plurality of alerts associated with the network traffic from a plurality of security tools of the cloud-based system; logging the plurality of alerts; and providing an event chain, including the plurality of alerts. Based on the event chain, alerts can be identified as being false positives or legitimate.
    Type: Application
    Filed: May 24, 2024
    Publication date: September 19, 2024
    Applicant: Zscaler, Inc.
    Inventor: Rubin Azad
  • Publication number: 20240163312
    Abstract: Systems and methods are provided for calculating a security risk score. In one implementation, a method includes the step of analyzing a network to assess a license status of the network, where the license status is related to one or more security licenses procured for providing security protection to the network. The method also includes the step of analyzing the network to assess a configuration status of the network, where the configuration status is related to configurations settings of one or more security policies currently operating with respect to the network. Based on the assessed license status and configuration status, the method further includes the step of calculating a security risk score indicating a current level of risk that the network faces against threats, intrusions, cyber-attacks, breaches, and/or data loss.
    Type: Application
    Filed: June 9, 2023
    Publication date: May 16, 2024
    Inventors: Rubin Azad, Deepen Desai, Varun Singh, Shriyash Shete
  • Publication number: 20240129338
    Abstract: Systems and methods are provided for evaluating the effectiveness of network security tools for mitigating network security risks. According to one implementation, a method includes the step of analyzing a network to measure security parameters associated with the use of one or more network security tools that are configured for mitigating risk with respect to network compromise, data loss, lateral movement, and asset exposure. Based on the measured security parameters, the method further includes the step of quantifying the one or more network security tools to determine an effectiveness score defining an ability of the one or more network security tools, in combination, to counteract the network compromise, data loss, lateral movement, and asset exposure.
    Type: Application
    Filed: June 9, 2023
    Publication date: April 18, 2024
    Inventors: Rubin Azad, Jithin Prajeev Nair, Deepen Desai, Chakkaravarthy Periyasamy Balaiah, Karthikeyan Thamilarasu, Shanghao Chen, Tejveer Singh
  • Publication number: 20240039954
    Abstract: Systems and methods are provided for performing risk assessment activities and preparing attained risk data for display on one or more user interfaces. In one implementation, a method may include the step of detecting one or more cybersecurity risk factors associated with an organization to determine a risk posture of the organization. The method may further include the step of attaining one or more remediation recommendations for enabling a person associated with the organization to select one or more actions for mitigating the one or more cybersecurity risk factors and improving the risk posture of the organization. Then, the method is configured to communicate display information to a user device associated with the organization, the display information including at least the one or more cybersecurity risk factors and the one or more remediation recommendations to be exhibited on a Graphical User Interface (GUI) of the user device.
    Type: Application
    Filed: August 4, 2023
    Publication date: February 1, 2024
    Inventors: Shriyash Shete, Chakkaravarthy Periyasamy Balaiah, Karthikeyan Thamilarasu, Deepen Desai, Rubin Azad, Jithin Prajeev Nair, Raj Krishna
  • Publication number: 20210344693
    Abstract: Systems and methods include, responsive to starting a plurality of listener modules, receiving a Uniform Resource Locator (URL) for a site on the Internet into a database; loading the URL; receiving artifacts based on the loading; using the plurality of listener modules to run rules based on the received artifacts; scoring the URL based on the rules and the received artifacts; and determining whether the URL is one of benign, suspicious, or malicious based on the scoring. The steps can include any of blocking the URL, allowing the URL, further analyzing the URL, adding the URL to a whitelist or blacklist, and providing a notification, based on whether the URL is benign, suspicious, or malicious.
    Type: Application
    Filed: July 13, 2021
    Publication date: November 4, 2021
    Inventors: Rubin Azad, Deepen Desai, Narinder Paul