The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
May. 10, 2022

Filed:

Sep. 23, 2020
Applicant:

Fortinet, Inc., Sunnyvale, CA (US);

Inventors:

Anurag Jain, Edison, NJ (US);

Kenneth Ammon, Leesburg, VA (US);

Thomas Cross, Atlanta, GA (US);

Michael C. Starr, Reston, VA (US);

Assignee:

Fortinet, Inc., Sunnyvale, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 12/10 (2016.01); H04L 9/32 (2006.01); H04L 9/08 (2006.01); H04W 12/041 (2021.01); G06F 12/14 (2006.01); G06F 12/02 (2006.01);
U.S. Cl.
CPC ...
G06F 12/10 (2013.01); H04L 9/0869 (2013.01); H04L 9/0894 (2013.01); H04L 9/3278 (2013.01); G06F 2212/1024 (2013.01); G06F 2212/7201 (2013.01);
Abstract

Systems and methods for a unified, cloud-managed platform for controlling enterprise network security are provided. According to one embodiment, a network of an enterprise is protected by a cloud-managed platform. An underlying architecture of the cloud-managed platform is abstracted by providing a portal through which modifications to security policies are expressed as business requirements of the enterprise. The security policies are automatically enforced regardless of location or endpoint. A policy digest, including information regarding the modifications and formatted according to a predefined format, generated and locally queued by the portal is retrieved. Security enforcement systems associated with the cloud-managed platform are configured to control communications to and from the network according to the security policies by generating API calls to the security enforcement systems and agents running on endpoints associated with the network are configured to control endpoint-to-endpoint connections according to the security policies based on the policy digest.


Find Patent Forward Citations

Loading…