Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking

ABSTRACT

Various embodiments described herein disclose an endpoint modeling and grouping management system that can collect data from endpoint computer devices in a network. In some embodiments, agents installed on the endpoints can collect real-time information at the kernel level providing the system with deep visibility. In some embodiments, the endpoint modeling and grouping management system can identify similarities in behavior in response to assessing the data collected by the agents. In some embodiments, the endpoint modeling and grouping management system can dynamically model groups such as logical groups, and cluster endpoints based on the similarities and/or differences in behavior of the endpoints. In some embodiments, the endpoint modeling and grouping management system transmits the behavioral models to the agents to allow the agents to identify anomalies and/or security threats autonomously.

CROSS REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of U.S. patent applicationSer. No. 17/069,415, which is a continuation of U.S. patent applicationSer. No. 16/525,415, now U.S. Pat. No. 10,841,325, which is acontinuation of U.S. patent application Ser. No. 16/058,810, now U.S.Pat. No. 10,462,171, filed Aug. 8, 2018, which claims the benefit under35 U.S.C. § 119(c) of U.S. Provisional Application No. 62/542,288, filedAug. 8, 2017, U.S. Provisional Application No. 62/545,917, filed Aug.15, 2017, and U.S. Provisional Application No. 62/550,439, filed Aug.25, 2017, each of which is hereby incorporated herein by reference inits entirety under 37 C.F.R. § 1.57. Any and all applications for whicha foreign or domestic priority claim is identified in the ApplicationData Sheet as filed with the present application are hereby incorporatedby reference under 37 C.F.R. § 1.57.

BACKGROUND Field

The embodiments disclosed herein generally relate to systems and methodsfor dynamically modeling and grouping endpoints for edge networking, inparticular, modeling and grouping endpoints based on technicalbehavioral analysis enabled by deep visibility into the computerprocesses of and electronic communications in and to the endpoints.

Description

The detection of viruses, malware, ransomware, and the like on computerendpoints connected to an enterprise network is a large-scale problemfor information technologists who are charged with maintaining andprotecting the confidential information and software programs stored onthese systems. The foregoing challenge is made more complicated bytoday's complex enterprise networks that are no longer just confined tohardware positioned behind or within a firewall and/or data accessmanagement system. With the development of cloud computing storagefacilities and software as a service (SaaS) capabilities, and theproliferation of mobile devices, such as smart phones, laptops, tabletsand other devices, all of which generally sit outside the enterprisefirewall, the enterprise network is not just contained by hardware thatis behind or within a firewall and/or data access management system.

Rather, the enterprise network, broadly speaking, is now an elasticnetwork as opposed to a fixed boundary network. Thus, new systems andmethods for security, management, control, access, and supervision ofcomputer networks that are more suitable to modern networks are needed.

SUMMARY

For purposes of this summary, certain aspects, advantages, and novelfeatures of the invention are described herein. It is to be understoodthat not all such advantages necessarily may be achieved in accordancewith any particular embodiment of the invention. Thus, for example,those skilled in the art will recognize that the invention may beembodied or carried out in a manner that achieves one advantage or groupof advantages as taught herein without necessarily achieving otheradvantages as may be taught or suggested herein.

In some embodiments, described herein is a dynamic endpoint-based edgenetworking system for protecting security and integrity of an elasticcomputer network, the system comprising: a plurality of agents, whereineach of the plurality of agents is installed on a target endpointdevice, the target endpoint device being one of a plurality of endpointdevices forming an elastic computer network, and wherein each of theplurality of agents is configured to: access an operating system of thetarget endpoint device on which the agent is installed to obtainvisibility of operating system processes and network communications ofthe target endpoint device; monitor the operating system processes andthe network communications of the target endpoint device to obtaintarget endpoint data, the target endpoint data comprising informationregarding at least one of the system processes or network processes ofthe target endpoint device; transmit the target endpoint data to acentral server system; identify, using a local security protocol, one ormore local anomalous indicators on the target endpoint device based atleast in part on the target endpoint data; and respond to the one ormore local anomalous indicators on an endpoint-level based at least inpart on the local security protocol, wherein the local security protocolcomprises one or more rule sets, policies, or access rights designed toensure local security of each of the plurality of endpoint devices; anda central server system comprising: one or more computer readablestorage devices configured to store a plurality of computer executableinstructions; and one or more hardware computer processors incommunication with the one or more computer readable storage devices andconfigured to execute the plurality of computer executable instructionsin order to cause the central server system to: receive the targetendpoint data from each of the plurality of agents installed on a targetendpoint device; analyze the target endpoint data received from each ofthe plurality of agents to identify network-wide activity patterns;identify, using a network-wide security protocol, one or morenetwork-wide anomalous indicators on a network level across theplurality of endpoint devices based at least in part on the identifiednetwork-wide activity patterns; and respond to the one or morenetwork-wide anomalous indicators on the network level across theplurality of endpoint devices based at least in part on the network-widesecurity protocol.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein monitoring the operating system processes andthe network communications of the target endpoint device comprisescontinuously verifying and authenticating target endpoint activities.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein the plurality of endpoint devices compriseone or more cellphones, servers, virtual machines, laptops, tablets,desktop computers, Internet of Things (IoT) devices, landline phones,wearable devices, or smart home devices.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein the local anomalous indicator comprisesactivities of malicious software on the target endpoint device.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein the malicious software comprises a virus,malware, ransomware, adware, spyware, Trojan horse, worm, rootkit,scareware, rogueware, active content software, or logic bomb.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein the malicious software comprises zero-daysoftware.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein responding to the one or more local anomalousindicators based on the local security protocol comprises controllingone or more operating system processes or network communications of thetarget device.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein responding to the one or more local anomalousindicators based on the local security protocol comprises limiting oneor more operating system processes or network communications of thetarget device.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein limiting one or more operating systemprocesses or the network communications of the target device effectivelyisolates malicious software located on the target endpoint.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein at least one endpoint device of the pluralityof endpoint devices is located outside of a computer network firewall.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein one or more of the central server system orplurality of agents is further configured to analyze the target endpointdata to determine typical network access behavior and typical processorbehavior of the target endpoint.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein the determined typical network accessbehavior and typical processor behavior of the target endpoint is usedto update the local security protocol.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein one or more artificial intelligence (AI)techniques are employed by one or more of the central server system orplurality of agents to analyze the target endpoint data to determinetypical network access behavior and typical processor behavior of thetarget endpoint.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein the central server system is further causedto group and one or more endpoints of the plurality of endpoints into anendpoint cluster, wherein the one or more endpoints of the endpointcluster comprise one or more similar processing or network accesspatterns.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein the central server system is further causedto generate and assign a common local security protocol to each of theone or more endpoints of the endpoint cluster.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein each of the plurality of agents is furtherconfigured to perform a point-in-time validation of the target endpointdevice, wherein the point-in-time validation comprises a verificationthat no local anomalous indicators are present on the target endpointdevice.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein the local anomalous indicator is a pattern oflocal anomalous activity on the target endpoint device.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein one or more of the local security protocol orthe network-wide security protocol is manually configured by a networkadministrator.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein one or more of the local security protocol orthe network-wide security protocol is based on a pre-configured ruleset.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein one or more of the local security protocol orthe network-wide security protocol is automatically generated andassigned by one or more of the central server system or plurality ofagents.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein a unique local security protocol is generatedfor each of the plurality of endpoint devices.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein the local security protocol is dynamicallyupdated by one or more of the central server or plurality of agentsbased on one or more operating system processes or networkcommunications of the target endpoint device.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein the local security protocol comprises one ormore policies for restricting or allowing access between the targetendpoint device and another endpoint device of the plurality of endpointdevices, between the target endpoint device and an outside service orsystem, or between the target endpoint device and an internal service orsystem.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein the plurality of agents are furtherconfigured to scan a visible network to identify devices in or inproximity to a network.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein the scan comprises utilizing discoveryprotocols to identify the devices in or in proximity to the network andobtain data therefrom.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein the data obtained from the devices in or inproximity to the network comprises one or more of an operating systemtype, device type, IP address, or MAC address.

In some embodiments, provided herein is the dynamic endpoint-based edgenetworking system, wherein responding to the one or more local anomalousindicators based on the local security protocol comprises one or more ofaltering data access rights of the target endpoint device, excludingaccess to the target endpoint device by a user, or locking the targetendpoint device.

In some embodiments, provided herein is a computer-implemented methodfor protecting security and integrity of an elastic computer network,the method comprising: installing a software agent on each of aplurality of endpoint devices forming an elastic computer network;accessing, by each software agent, an operating system of an endpointdevice on which the software agent is installed to obtain visibility ofoperating system processes and network communications of the endpointdevice; monitoring, by each software agent, the operating systemprocesses and the network communications of the endpoint device toobtain endpoint data, the endpoint data comprising information regardingat least one of the system processes or network processes of theendpoint device; transmitting, by each software agent, the endpoint datato a central server system; identifying, by the software agent using alocal security protocol, one or more local anomalous indicators on theendpoint device based at least in part on the endpoint data; responding,by each software agent, to the one or more local anomalous indicators onan endpoint-level based at least in part on the local security protocol,wherein the local security protocol comprises one or more rule sets,policies, or access rights designed to ensure local security of each ofthe plurality of endpoint devices; receiving, by the central serversystem, the endpoint data from each software agent on each of theplurality of endpoint devices; analyzing, by the central server system,the endpoint data received from each software agent on each of theplurality of endpoint devices to identify network-wide activitypatterns; identifying, by the central server system using a network-widesecurity protocol, one or more network-wide anomalous indicators on anetwork level across the plurality of endpoint devices based at least inpart on the identified network-wide activity patterns; and responding,by the central server system, to the one or more network-wide anomalousindicators on the network level across the plurality of endpoint devicesbased at least in part on the network-wide security protocol, whereinthe central server system comprises a computer processor and anelectronic storage medium.

In some embodiments, provided herein is the computer-implemented method,wherein at least one endpoint device of the plurality of endpointdevices is located outside of a computer network firewall.

In some embodiments, provided herein is the computer-implemented method,wherein a common local security protocol is generated for a portion ofthe plurality of endpoint devices and a unique local security protocolis generated for another portion of the plurality of endpoint devices.

BRIEF DESCRIPTION OF THE DRAWINGS

A better understanding of the devices and methods described herein willbe appreciated upon reference to the following description inconjunction with the accompanying drawings, wherein:

FIG. 1A is a block diagram illustrating a traditional enterprise networkperimeter based on a firewall and/or data access management systems;

FIG. 1B is a block diagram illustrating a traditional enterprise networkperimeter based on a firewall and/or data access management systems withexternal devices and cloud services;

FIG. 1C is a block diagram illustrating a network perimeter using anendpoint modeling and grouping management system and agents installed onendpoints according to some embodiments;

FIG. 1D is a block diagram illustrating a grouping of endpoints withinstalled agents according to some embodiments;

FIG. 1E is a block diagram illustrating a grouping by an endpointmodeling and grouping management system, which can be configured toapply access restrictions to the grouping according to some embodiments;

FIG. 1F is a block diagram according illustrating various groupingsaccording to some embodiments;

FIG. 1G is a block diagram illustrating various groupings ofin-perimeter and out-perimeter endpoints according to some embodiments;

FIG. 1H is a block diagram illustrating various groupings with differingaccess restrictions according to some embodiments;

FIG. 1I is a block diagram illustrating identification of abnormalbehavior according to some embodiments;

FIG. 1J is a block diagram illustrating deployment of an agent to anunmanaged endpoint according to some embodiments;

FIG. 2 is a diagram illustrating example edge networks using artificialintelligence (AI) according to some embodiments;

FIG. 3 is a diagram illustrating edge networks in a fully elastic edgegrid according to some embodiments;

FIG. 4 is a schematic diagram illustrating an endpoint modeling andgrouping management system according to some embodiments;

FIG. 5 is a block diagram illustrating a computer hardware systemconfigured to run software for implementing one or more embodiments ofan endpoint modeling and grouping management system according to someembodiments;

FIG. 6 is a block diagram illustrating one or more agents collectingdata from an endpoint according to some embodiments;

FIG. 7 is a graphical user interface of the data the agent can collectaccording to some embodiments;

FIG. 8 is a flow diagram illustrating transmission of one or more modelsto one or more agents based on analysis of data collected from theagents according to some embodiments of an endpoint modeling andgrouping management system;

FIG. 9 is a graphical user interface of a group view according to someembodiments;

FIG. 10 is a graphical user interface of a dashboard listing groups,data centers, and services according to some embodiments;

FIG. 11 is a graphical user interface of a group and associatedviolations according to some embodiments;

FIG. 12 is a graphical user interface of a group with access controls totwo servers and two services according to some embodiments;

FIG. 13 is a graphical user interface of a group with access controls toservers, two services, and a local database file storage according tosome embodiments; and

FIG. 14 is a graphical user interface of a listing of groups andassociated characteristics according to some embodiments.

DETAILED DESCRIPTION

Although several embodiments, examples and illustrations are disclosedbelow, it will be understood by those of ordinary skill in the art thatthe invention described herein extends beyond the specifically disclosedembodiments, examples and illustrations and includes other uses of theinvention and obvious modifications and equivalents thereof. Embodimentsof the invention are described with reference to the accompanyingfigures, wherein like numerals refer to like elements throughout. Theterminology used in the description presented herein is not intended tobe interpreted in any limited or restrictive manner simply because it isbeing used in conjunction with a detailed description of certainspecific embodiments of the invention. In addition, embodiments of theinvention can comprise several novel features and no single feature issolely responsible for its desirable attributes or is essential topracticing the inventions herein described.

The detection of viruses, spyware, Trojan horses, ransomware, and likemalicious software (collectively referred to here as “malware”) oncomputer endpoints connected to an enterprise network is a large-scaleproblem for information technologists that are charged with maintainingand protecting information and software programs stored on thesesystems. The foregoing challenge is made more complicated by today'scomplex enterprise networks that are no longer just confined to hardwarepositioned behind or within a firewall and/or data access managementsystems. With the development of cloud computing storage facilities andsoftware as a service (SaaS) capabilities, and the proliferation ofmobile devices, such as smart phones, laptops, tablets and otherdevices, all of which generally sit outside the enterprise firewall, theenterprise network comprises multiple hardware devices which communicatewith the network from outside within a firewall and/or data accessmanagement systems.

Rather, the enterprise network, broadly speaking, is now an elasticnetwork as opposed to a fixed boundary network. With an elastic network,the challenge of protecting enterprise data and/or enterprise softwaresystems from malware is made more complicated because IT administratorsneed not only be concerned with protecting computing devices within thefirewall and/or data access management systems but also computingdevices interacting with the corporate network from outside the firewallperimeter and/or data access management systems. For example, a mobiledevice that is located outside the enterprise firewall and/or dataaccess management systems, and that is infected with a virus or likemalicious software can compromise enterprise data and/or the systemswithin the enterprise firewall and/or data access management systems,especially if the mobile device possesses authorization to traverse thefirewall and access systems and data within the firewall or other cloudcomputing systems connected to endpoints within the firewall.

Certain anti-virus systems merely focus on detecting known viruses,malware, ransomware, and the like, and such systems provide littleprotection from zero-day (meaning, previously unknown) malware. Many oftoday's varieties of malware are configured to continuously morphthemselves so as to, for example, create a new digital signatureassociated with their software file, to allow them to avoid detection bytraditional anti-virus systems that rely on “black listed” digitalsignatures for detection of such malware. Accordingly, there is a needfor a system that is configured to protect enterprise data and/orsoftware system from both known and unknown malware, especially incomputing environments where the enterprise network exists not justwithin a firewall and/or data access management systems but also outsidethe firewall and/or data access management systems in elastic edgenetworks or grids.

To address the foregoing challenges, this disclosure illustratessystems, methods, and devices for automatically and dynamicallycontrolling processes and/or network access of endpoint devices, whethersuch devices are positioned inside or outside the enterprise firewalland/or data access management systems. It can be advantageous to controlprocesses and/or network access of endpoints because if an endpoint isinfected, the systems disclosed herein can be configured to prevent theendpoint, and therefore also prevent the malware that is operating onthe endpoint, from accessing certain network connections and/or runningcertain processes, all of which can control the malware and/or limit thereach of the malware and/or prevent the malware from spreading to othersystems and/or manipulating enterprise data.

In other words, the systems disclosed herein can be configured to createa safe protected environment for all endpoint devices on an elasticnetwork whether or not such endpoints reside inside and outside theenterprise firewall and/or data access management systems. In certainembodiments, the system can be configured to create a safe protectedenvironment for endpoints in an elastic network based on analyzingbehavioral characteristics of all or some of the endpoints in theelastic network to determine what data access and/or network accessprivileges an endpoint should be granted. In many instances, malwarecauses endpoints to perform processes and/or to access certain networkpaths that the endpoint does not typically perform or access.Accordingly, by preventing atypical performance processes and/oratypical network accesses, the system can prevent a virus, malware,ransomware, and the like from causing damage to the endpoint deviceand/or to the enterprise systems and data.

In some embodiments, the systems, devices, and methods disclosed hereincan be designed around the concept of creating an initial “zero-trust”security architecture that can continuously collect endpoint data atvarious level of granularity within the system to persistently verifyand establish the credibility of individual endpoints and the network asa whole. Existing security models are based on point-in-timeauthentication, and thus are unable to ensure the integrity of anendpoint device or a network in between authentications. While thesystems, devices, and methods described herein can provide point-in-timeauthentication, in some embodiments, a key aspect of the design is thecontinual nature of the verification of the integrity of a network andits various endpoint devices, as well as the verification of the users'identity. In some embodiments, this verification is established throughartificial-intelligence (AI) driven analysis of individual endpoint,group, and network-wide usage patterns. In some embodiments, thisanalysis is centered on continuous monitoring and collection of datafrom endpoint devices, and the determination of a baseline usage of auser, endpoint device, group, subnetwork, network segment, or thenetwork as a whole. Once established, baseline usage can be continuouslyupdated and compared to current usage in order to authenticate users andendpoint devices on a persistent basis. In other words, the systemdescribed herein can establish an expectation of usage for variouslevels of granularity, from the network level all the way down to anindividual user and/or endpoint device, and then compare thatexpectation to a current real usage to constantly perform validation. Insome embodiments, the system is capable of separately validating theintegrity of both an endpoint device and a user utilizing the endpointdevice.

In certain embodiments, the systems disclosed herein can be configuredto install agents on endpoints. In certain embodiments, the agents canbe configured to analyze processes and/or network traffic occurring onan endpoint. In certain embodiments, the agents can be configured totransmit such analysis data to a central computing server system. Incertain embodiments, the central computing server system can beconfigured to analyze the data to determine typical network accessbehavior and/or typical processor behavior for the endpoint. In certainembodiments, the agent is configured to analyze the data to determinetypical network access behavior and/or typical processor behavior forthe endpoint, and in certain embodiments, both the agent and the centralserver are configured to perform such behavioral analysis of theendpoint. In certain embodiments, artificial intelligence (AI)techniques are employed by the agent and/or the central server toperform such behavioral analysis. Based on such behavioral analysis, theagent and/or the central server can be configured to determine and/ormodel what are the typical processes and/or network access patterns forthe endpoint.

In certain embodiments, the system comprises a plurality of agentsoperating on a plurality of endpoints within an elastic network. Incertain embodiments, the plurality of agents operating on a plurality ofendpoints is communicating with the central server and/or is performingthe same behavioral analysis disclosed above. In certain embodiments,the systems disclosed herein are configured to group and/or model asubset of the plurality of endpoints as having the same and/or similarprocessing and/or network access patterns. In certain embodiments, thesystems disclosed herein can be configured to automatically and/ordynamically assign to the various determined groupings of the pluralityof endpoints one or more rules or sets of rules for controlling certainprocesses and/or network accesses on the various determined groupings ofthe plurality of endpoints. In some embodiments, the system, throughembedded agents and/or security agents at endpoint devices, which caninclude, without limitation, other systems, servers, computers, virtualmachines, or the like, has the ability to monitor the endpoint devicesand apply policies at the individual endpoint level. In someembodiments, the embedded agents act as a continuous verification andauthentication monitor, rather than as a binary, point-in-time userauthentication tool.

In some embodiments, the system comprises a plurality of agentsinstalled on endpoint devices, wherein the agents are designed to ensuresecurity on the endpoint devices. In some embodiments, ensuring securitymay involve accessing the device at a base level, such that, forexample, an agent can monitor substantially all activity occurring onthe device. In some embodiments, uninterrupted access to endpointactivity may allow the agent to validate, over time, that the endpointdevice and/or the user utilizing the endpoint device are operatingwithin the expectations of the system and/or within the expected typicaluse or activity or processes for that endpoint and/or user. In someembodiments, an agent may validate, at each point in time, that noanomalous activity is occurring on an endpoint device. In someembodiments, the system can continuously monitor substantially allaspects of an endpoint device operating system, such that it canrecognize anomalies occurring at any point in time, and also patterns ofanomalous behavior, to determine whether an endpoint has becomecompromised or unsecure. Furthermore, in some embodiments, throughmonitoring, the system can determine whether implemented security rulesare violated, implement various controls or limitations over theendpoint functions, or do any other action defined by the system or anetwork administrator. In some embodiments, these actions and controlsare implemented at the individual endpoint level. In some embodiments,these actions or controls are implemented on a defined or undefinedgroup of endpoints or at the entire network level. In some embodiments,a centralized system can collect data from all the agents installed on anetwork to identify network-wide patterns of usage, such thatvulnerabilities and issues that may be difficult or impossible toidentify with the data from a single endpoint can be identified by thecentral system. For example, a specific use or pattern of usage on oneor more endpoints may not be identified as anomalous alone by the agentsinstalled therein, but may, when combined with data from some otherendpoints or substantially all endpoints of the network, nonetheless beidentified as anomalous by the system. In some embodiments, theagent-based system described herein can provide a layered securitysolution that provides individual endpoint security as well asnetwork-wide security.

In some embodiments, the system described herein provides low-level,cross-platform monitoring of endpoint activities. In some embodiments,the system is configured to create, define, and/or dynamically alter aset of rules that determine which endpoint activities are identified asanomalous. In some embodiments, the set of rules can be defined bymachine learning aspects, pre-determined rule sets, and/or administratormanagement.

It can be advantageous for the system to perform such behavioralanalysis because the system can reduce the work for IT administratorsand/or the system can determine such behavioral patterns better thanhuman operators. It can be advantageous for the system to automaticallyand/or dynamically assign one or more rules or sets of rules to one ormore endpoints because the system can reduce the work for ITadministrators and/or the system can better develop and/or assign suchrules to endpoints, especially in situations where the enterprisenetwork comprises, hundreds, thousands and/or millions of endpointdevices connected to the enterprise network.

In some embodiments, another central function of the system may be thecreation, generation, and implementation of access policies, which canbe based around determining a baseline usage or expectation of usage. Insome embodiments, the generated access policies provide an outline forthe endpoints, services, servers, programs, and the like, that any givenuser on any given endpoint can access at any given time. In someembodiments, the access policies are synthesized through the datacollected from the continuous monitoring of endpoints through agents andthe determination of baseline usage of users and/or endpoint devices. Insome embodiments, the aggregate of the access policies applied to eachindividual and/or endpoint device comprise a network access policy as awhole. In some embodiments, the access policies can be inferred orgenerated directly from the baseline usage of users and/or endpointdevices, and then updated manually or automatically through AI analysis.In some embodiments, because the network can be managed by individualagents installed on endpoint devices and a central server, the accesspolicies can be implemented on any and all levels of the network.

In certain embodiments, the agents are configured to assign to thevarious determined groupings of the plurality of endpoints one or morerules or sets of rules for controlling certain processes and/or networkaccesses on the various determined groupings of the plurality ofendpoints. In certain embodiments, the central server is configured toassign to the various determined groupings of the plurality of endpointsone or more rules or sets of rules for controlling certain processesand/or network accesses on the various determined groupings of theplurality of endpoints. In certain embodiments, the system is configuredto use both the agents and the central server to assign to the variousdetermined groupings of the plurality of endpoints one or more rules orsets of rules for controlling certain processes and/or network accesseson the various determined groupings of the plurality of endpoints.

In certain embodiments, the agent operating on a particular endpoint canbe configured to apply the one or more rules or sets of rules todetermine whether to allow or reject a network access path requestcoming from a program or instruction running on an endpoint. In certainembodiments, the central server can be configured to apply the one ormore rules or sets of rules to determine whether to allow or reject anetwork access path request coming from a program or instruction runningon an endpoint. In certain embodiments, it can be advantageous for theagents to determine whether to allow or reject a network access pathrequest coming from a program or instruction operating on a particularendpoint because the system acts in a distributed manner as opposed tothe central server making all determinations and potentially causing abottleneck. Additionally, a distributed system reduces network trafficover the network and the number of requests to the central server. Insome embodiments, the systems described herein comprise a machinelearning component for managing and restricting access to a network. Inother embodiments, AI management and restriction of access to thenetwork is supplemented or replaced by human administrator management.In some embodiments, human administrators may manually implement generalor specific rules or manage access on a system wide orendpoint-by-endpoint basis. In some embodiments, the rules, policies,and access rights of the system, regardless of how they are fashioned,can be designed to ensure security of the endpoints and the network by,for example, ensuring that no malware or other malicious software isintroduced, that the integrity of the certificates are not compromised,and that there are no anomalies in usage, among others.

In some embodiments, an edge network according to various embodimentsherein may comprise, and be defined by, a collection of connectedendpoints. In some embodiments, the policies or rules for managing orrestricting access to the network may be devised and effected manuallyby, for example, a network administrator. In some embodiments, the edgenetworking system can perform other functions, such as profiling inboundand outbound connections, installing agents unto network endpoints,and/or managing and regulating access to various systems within andoutside the network. In some embodiments, the systems, devices, methodsherein can identify and group one or more endpoints and manage policiesfor restricting and/or allowing access between endpoints, between anendpoint and outside services and systems, and between endpoint andinternal services or systems.

In some embodiments, the agent-based system described herein may enablenetwork management through enhanced data availability. Networkmanagement may include altering endpoint data access rights, userexclusion, and/or endpoint locking, among others. In some embodiments,the system may restrict any or certain inbound connections from one ormore sources outside the network. In some embodiments, the monitoring,rule setting, and/or network management aspects of the system can becontrolled at the individual endpoint devices, as opposed to at thenetwork level, through installed agents.

In some embodiments, an agent as described herein can be installed on anendpoint device to access and manage incoming and outgoing traffic onthe device. In some embodiments, the agent, through its access to thedevice systems and traffic, can continuously validate the identity andpermissions of a user of the device. In some embodiments, a network isdefined by endpoint devices with installed agents and the system gainsvisibility and access to all devices of the network through theinstalled agents. In some embodiments, when an agent is installed on anendpoint, substantially all communications to and from an endpointdevice can be monitored and stored by the agent, such that any networkmanagement rules (e.g. access rights) can be applied regardless of thephysical location of the endpoint. In some embodiments, the agent-basedsystem described herein can monitor and store all internalcommunications and/or external communications. For example, the systemmay be configured to monitor and store activity occurring between twoendpoints within the network. In some embodiments, the system hasvisibility to these communications through kernel-level monitoring ofendpoints with installed agents. In some embodiments, the systemutilizes the data access and network management policies, enforced atthe individual endpoints, to define a broad-level network across of aplurality of endpoints.

Another difficulty faced by existing network security, management, andcontrol systems is the transient nature of the network, particularlywith regard to new endpoint devices accessing the network and existingendpoint devices ceasing to exist on the network. In some embodiments,the systems, devices, and methods disclosed herein solve the difficultyof a constantly expanding and/or retracting network by constructing acontinuously updated mapping, visualization, and/or representation ofthe network construct, including various network segments and/orsubnetworks. In some embodiments, the system is configured to map aplurality of endpoint devices in a software-based, distributed manner.That is, the map or visualization can be assembled based on datareceived from distributed software throughout the network. In someembodiments, this distributed software comprises agents installed oneach endpoint device of a network. In some embodiments, the system canprovide a visualization or view of the network and/or varioussub-networks by aggregating data collected from the agents installed ona plurality of endpoint devices. In some embodiments, the network cancomprise various subnetworks, each subnetwork comprising one or moreendpoint devices. In some embodiments, the system can be configured toassemble a view of the network and/or various subnetworks based oninformation received from agents. In some embodiments, the map, view, orvisualization of the network, constructed using data from agentsinstalled on endpoints, can provide an overall and/or piece-by-pieceview of the network and/or various subnetworks.

A related issue to the elastic nature of modern networks discussed aboveis the existence of non-traditional network-connected devices. Thesystem described herein deals with this issue by gaining visibility ofthese devices through the distributed agent-based endpoint network andthen integrating the control and network management functionalities todirectly or indirectly supervise these non-traditional devices. In someembodiments, a network, network segments, and/or subnetworks cancomprise various endpoint devices, some of which may have an agentinstalled and some of which may have no agent installed. However, insome embodiments, by virtue of having an agent installed on one or moreendpoint devices of the network, the system may have visibility, throughscanning or discovery functionality, over all endpoint devices on thenetwork and/or subnetworks. By having visibility over endpoint deviceswithout agents installed, the system can collect data from thosedevices, including, but not limited to, the existence of the unmanageddevices (i.e. devices with no agent installed therein), the networkcommunications that the unmanaged devices have sent or received to andfrom other endpoint devices, and the existence or nonexistence ofinbound or outbound connections to the unmanaged devices. Based on thiscollected data, the endpoint-based network system can dynamicallydetermine necessary actions to take regarding the preservation ortermination of communications and connections between the unmanageddevices and the network as a whole, subnetworks, network segments,logical groups, physical groups, or even individual endpoints. In someembodiments, the system can be configured to include the unmanageddevices in grouping themselves, and thus apply any group-specific rulesdirectly to the unmanaged device and its communications with otherendpoint devices in the network. In some embodiments, the dynamicdetermination and groupings can be made by, for example, anorchestration layer as described below.

In some embodiments, the system can be configured to counter compromisedvulnerable Internet of Things (IoT) devices. Some malicious softwareuses IoT devices for use as proxies or intermediaries for Internetrequests to route malicious traffic for cyber-attacks and computernetwork exploitation. IoT devices, sometimes referred to as “smart”devices, are devices that communicate with the Internet to send orreceive data. Examples of targeted IoT devices include: routers,wireless radios links, time clocks, audio/video streaming devices,Raspberry Pis, IP cameras, DVRs, satellite antenna equipment, smartgarage door openers, and network attached storage devices. IoT proxyservers may be attractive to malicious cyber actors because they providea layer of anonymity by transmitting all Internet requests through thevictim device's IP address. In some embodiments, IoT devices may beparticularly attractive targets because they allow access to manybusiness websites that block traffic from suspicious or foreign IPaddresses. In some embodiments, malicious software can use thecompromised device's IP address to engage in intrusion activities,making it difficult to filter regular traffic from malicious traffic. Insome embodiments, malicious software can use compromised IoT devices asproxies to, for example, send spam e-mails, maintain anonymity or avoiddetection, obfuscate network traffic, mask Internet browsing, generateclick-fraud activities, buy, sell, and trade illegal images and goods,conduct credential stuffing attacks, and sell or lease IoT botnets toother cyber actors for financial gain. In some embodiments, IoT devicesmay have weak authentication, unpatched firmware or other softwarevulnerabilities, or have easily defeated default usernames andpasswords. In some embodiments, the agent-based endpoint networkdisclosed herein can combat attacks that occur through IoT devices bydetecting, monitoring, and controlling communications from these devicesinto the endpoint devices.

In some embodiments, the agent-based system may provide visibility intosubstantially all computerized devices, including those withoutinstalled agents and/or in proximity with an endpoint device with aninstalled agent. In some embodiments, the system can identify and gainvisibility of all devices in the same subnet, visible, or accessiblenetwork in proximity to an endpoint device. These devices may includeany internet or network-connected devices, such as physical devices,vehicles, home appliances, and any other items embedded withelectronics, software, sensors, actuators, and connectivity which enablethese things to connect and exchange data In some embodiments, aninstalled agent may be configured to scan a visible network, which mayinclude any sub-network, or the entire network. In some embodiments, thesystem can utilize discovery protocols to ascertain the existence andobtain data from all devices in or in proximity to a network. In someembodiments, the system can obtain data from these devices, includingthe operating system, the type of device, IP address, and MAC address,among others. In some embodiments, the system may protect theendpoint-based network from attacks that are directed through these“unmanaged” (i.e. no agent installed) devices by restricting networkcommunications between unmanaged devices and network endpoints.

In some embodiments, the system may also comprise an orchestrationfunctionality or layer, which may serve to coordinate the collection andaggregation of data from the plurality of agents. In some embodiments,this orchestration layer may increase system efficiency by directingdiscovery protocols, network scanning, data collection and aggregation,network visualization construction, and various other systemfunctionalities to reduce excessive or nonessential functions. In someembodiments, the orchestration functionality can amass the data from allof the endpoints and agents of the network, network segments, and/orsubnetworks to create one or more cohesive views, visualizations, assetinventories, lists, or the like, in order to provide a mapping, groupingor representation of the network, network segments, and/or subnetworks.In some embodiments, the data is collected from agents installed inphysical endpoints on the network, data centers, cloud services,non-traditional devices (e.g. IoT devices, printers, etc.) or any otherpart of the network.

In some embodiments, the system can be configured to utilize thecontinuously updated mapping, visualization, and/or representation toupdate the network groupings, access rules, network administration, andall other facets of the security and network management functionalities.In this way, the system can dynamically react to the expansion orretraction of the network through the addition and/or departure ofendpoint devices to and from the network. The system may also includenon-traditional endpoint devices including IoT devices into groupingssuch that group access rights and rules can be applied to those devices.In the alternative, in some embodiments, non-traditional endpointdevices on the network may not be grouped, and the system may determine,based on data aggregated from the agents installed on the endpointdevices, that one or more non-traditional endpoint devices should beable to communicate with all, some, or none of the other endpointdevices of the network. In some embodiments, this determination can bebased on a holistic behavioral analysis of the network, the variousnetwork segments, subnetworks, and/or individual endpoints. The level ofgranularity and specificity to which the system can control groupingsand therefore access rights and network communications management of theendpoint devices of the network, including non-traditional endpointdevices, is not limited. Specifically, network groupings and rules canbe applied to the network as a whole, to particular subnetworks ornetwork segments, to groups of endpoints, to individual endpoints, tonon-traditional endpoints, to third-party services, enterprise services,and the like, and to any and all communications between any of the above(e.g. between an individual endpoint and its own group or a separategroup of endpoints). There are very few limitations on the extent andspecificity of control that the system can have on grouping andcontrolling the endpoints of the network and the network as a whole, orin parts. In some embodiments, some devices on the network can becontrolled and managed, even without installing an agent therein, bylimiting the ability of those devices to communicate with other deviceson the network.

In some embodiments, the system described herein is not limited byphysical proximity to a network. Because agents can be installeddirectly on endpoints, the physical location of the endpoints does notdetermine whether the endpoint benefits from the security features ofthe flexible network system described herein.

In some embodiments, the system can be configured to access a holisticamalgamation of network connection and system activity data, including,for example, what software is being utilized at an endpoint, what datais sent and received over a network connection, the time and form ofuser authentication, and/or the time and form of endpoint validation,among others. Thus, in some embodiments, the security features of thesystem can function in connection with a complete view of endpointactivity and network communications. In some embodiments, the system canbe configured to continuously monitor endpoint activity and networkcommunications, rather than solely at the time a network connection isformed. In some embodiments, the agent-based system may be configured toensure the integrity of a network connection, in addition to the datasent and received over that connection.

In some embodiments, the system can authenticate the sender and receiverof data over a network connection such that integrity of the networkconnection is ensured. In some embodiments, the system can restrict datatransfer over a network connection if it identifies an illegitimatesender or receiver. In some embodiments, the system can perform thisauthentication and other integrity checks, through an installed agent,by parsing requests and responses sent and received by an endpoint,monitoring bandwidth usage, and/or scrutinizing contextual data (e.g.time of access), among others. In some embodiments, the agent-basedsystem may terminate illegitimate connections.

In some embodiments, the system described herein may facilitate fasterand more efficient network communications than, for example, a virtualprivate network (VPN). In some embodiments, the system may introduce nolatency into network connections. In some embodiments, the system mayperform without latency regardless of the underlying networkinfrastructure, because the system may not perform routing of networkconnections and agents are installed directly at endpoints. In someembodiments, the system is not bound by any network infrastructurelimitations or overhead caused by routing network traffic.

Certain enterprise networks can use centralized servers to identifyanomalies, such as malware, and/or to determine access restrictions.Identification and response to these anomalies can be delayed based onthe latency to and from the centralized servers. Furthermore, theseenterprise networks can be required to perform anomaly detection forhundreds of thousands of endpoints connected within its perimetersand/or connected cloud services and data centers. In some embodiments,the endpoint modeling and grouping management system disclosed hereinaddresses these shortcomings by enabling agents installed on theendpoints to detect anomalies, respond to security threats, enforcenetwork policies, regulate network access, and the like. In someembodiments, the agents can regulate network access by employing AItechniques to generate access policies for an endpoint, allowing orrestricting connection to, from, and/or of an endpoint and/or an asset,setting authentication criteria for a connection, establishing roles forendpoints, change and/or update policies at endpoints, and the like. Insome embodiments, the agents can enforce network policies, such asshutting down and/or enabling network access, setting and/or limitingnetwork bandwidth, generating an alert based on network bandwidth usage,locking an endpoint based on bandwidth usage, setting bandwidth policiesfor specified connections to particular endpoints and/or assets,controlling traffic during certain time periods such as outside ofnormal business working hours, deploying internet security for aparticular connection and/or endpoint, and the like. In someembodiments, the agents can identify anomalies and perform actionsautonomously by applying the models generated by the endpoint modelingand grouping management system.

To enable the foregoing, in certain embodiments, the endpoint modelingand grouping management system can be configured to collect data fromendpoint computer devices in a network.

Enterprise networks can collect network traffic data. However, oftentimes the network traffic data is encrypted and may not provide anyvisibility for activities occurring within an endpoint, within anenterprise network perimeter, within a cloud service, within a clouddata center, and the like. Furthermore, endpoints on traditionalenterprise networks can connect directly with a cloud service whileoutside of the enterprise network perimeter, and thus, traditionalenterprise networks may not have visibility on this type of traffic. Insome embodiments, the endpoint modeling and grouping management systemaddresses these shortcomings of enterprise network technology byenabling an agent to monitor activity at the kernel level. In someembodiments, the agents can monitor data packets before encryptionand/or after decryption. In some embodiments, the agents can monitoractivity occurring within the endpoint. In some embodiments, the agentscan monitor activity when the endpoints are outside of a traditionalenterprise network perimeter. In some embodiments, the agents canmonitor data packets enclosed in a layer of protection, such as asandbox. Thus, the endpoint modeling and grouping management system canprovide deep visibility on the activities of endpoints connected to theendpoint modeling and grouping management system.

In some embodiments, agents installed on the endpoints can collectreal-time information on the kernel level providing the system with deepvisibility to a wide range of data types, such as internal endpointactivity, encrypted data, and the like. In some embodiments, theendpoint modeling and grouping management system can identifysimilarities in behavior by employing an artificial intelligencecomponent on the data collected by the agents. In some embodiments, theendpoint modeling and grouping management system can dynamically modelgroups such as logical groups, and cluster endpoints based on thebehavioral similarities and/or differences identified among theactivities of the endpoints. In some embodiments, the endpoint modelingand grouping management system transmits the behavioral models to theagents to allow the agents to identify anomalies and/or securitythreats.

In some embodiments, the endpoint grouping and modeling systems hereincan utilize various data to determine and model endpoint groupings. Insome embodiments, the system can be configured to use an all-inclusiveapproach, wherein the system examines the data from the variousendpoints as a whole. For instance, the system may survey, for example,every IP address contacted, every service utilized, and every networkcommunication, inbound or outbound, to and from each endpoint in orderto classify and group endpoints with similar characteristics. In someembodiments, the result of this classification and grouping mechanismmay be to assemble a group of endpoints having similar baseline accessand network communication patterns. In some embodiments, the endpointgrouping may or may not coincide with user's having similar access needsbased on, for example, their job responsibilities, their location, orany other user classification. For example, software developers withinan enterprise network may utilize use-case specific services likeGitHub, Visual Studio, Python that may indicate to the system that thisendpoint or user should be grouped with other endpoints or users withsimilar usage patterns (e.g. other software developers), and that thegroup should have limited access or communication to services orendpoints that do not match the established pattern of usage of thegroup or do not pair with a system-determined purpose or intent of thegroup's users or endpoints. In some embodiments, the grouping modelingsystem's analysis extends beyond the identity of the services,resources, or endpoints to which an endpoint is accessing. In someembodiments, the system may also analyze, for example, when the accessoccurs, how frequently access occurs, the duration of each instance ofaccess, the amount of data transferred during each instance of access,the type of data transferred, bandwidth usage, identity of the useraccessing, current processes running on the endpoint device before, andduring, and after the time of access. In some embodiments, all of theabove and more may be utilized to determine groupings, to establish abaseline of usage for an endpoint device and/or a grouping, and togenerate and set access rights, security, and network communicationprotocols.

In some embodiments, the system can be configured to generate andprovide multiple unique views or visualizations of the network and itsvarious groupings and subnetworks. For example, in some embodiments, thenetwork can be viewed as a whole or in part based on, for instance,logical groupings, physical location of endpoints, subnetworks, networksegments, device types, managed devices, unmanaged devices, similaritiesin inbound and outbound connections, similarities in types ofapplications installed, time of use of endpoint device, frequency ofuse, time of use of applications, type of WiFi network used, accesspoint utilized temperature of devices, device memory usage, type ofhardware, RPM of hardware, number of CPU cycles on endpoint device,third-party organizational groupings, and any other properties availableto an agent or the central server.

In some embodiments, the systems, devices, and methods described hereincan be configured to integrate with other existing third-party services,deployment means, enterprise mobility management (EMM) tools,authentication software, and security protocols deployed alongside theendpoint-based network system. In some embodiments, the data andinformation collected by the system described herein can enableautomation of third-party solutions running alongside the system withina network. For example, the system, through the discovery and groupingprotocols described herein, may scan and discover an unmanaged devicewithin an existing grouping. Having visibility of this unmanaged devicemay allow the system to then use existing deployment tools or means,such as, for example, Active Directory, to deploy an agent unto theunmanaged device. The tools and solutions which may be integrated withthe endpoint-based network system herein is not limited, and may includeany other platform running within the network environment. Specificexamples include, for example, Active Directory, Jamf, Tanium, IBMBigfix, Kaspersky, Trend Micro, Tripwire, Carbon Black, SymantecEndpoint Protection, Ivanti Endpoint, SCCM, McAfee, CrowdStrike, TrendMicro Deep Security, Avast, Shield, Norton, and the like. In someembodiments, the system can be integrated into these third-partyplatforms such that agents can be automatically deployed to endpoints bythe existing platforms, such that specific access or network managementrules developed by the system can be deployed through the third-partyplatforms.

Traditional enterprise networks can define their network topology and/ornetwork perimeter based on hardware. FIG. 1A is a block diagramillustrating a traditional enterprise network perimeter based onhardware, a firewall and/or data access management systems. FIG. 1B is ablock diagram illustrating a traditional enterprise network perimeterbased on a firewall and/or data access management systems with externaldevices and cloud services. Endpoints (such as computing devices, datacenters, and/or servers) 104, 108, 112, 114 that connect to a network(such as via a Wi-Fi connection) can be determined to be within anenterprise network perimeter and that computer's network traffic can betransmitted through a connection tunnel, for example, VPN, between theendpoints 104, 108, 112, 114 and external computing devices 115 and/orexternal networks 120 with their own endpoints 118 outside of theenterprise network perimeter via the enterprise network firewall 102and/or data access management systems. The perimeter is often definedbased on a firewall and/or data access management systems 102 betweenendpoints (such as computing devices/servers) 104, 108, 112, 114 and theexternal network. Typically traditional enterprise networks can inspectand/or monitor inbound and outbound network traffic of the connectiontunnel (such as by using intrusion detection and prevent systems (IDS)which are a commonly used network security/threat prevention procedurethat examines network traffic flows). Traditional enterprise networkscan monitor and inspect network traffic to detect and preventvulnerability exploits coming from malicious inputs to a targetapplication or service. Attackers can input malicious input to interruptand/or gain control of an application or computing device. For example,attackers can disable an application, access all rights and permissionsavailable to the compromised application, and the like.

However, data available to traditional enterprise networks can belimited to network traffic to and from the external computing devices.Thus, these traditional enterprise networks can monitor and/or inspectnetwork traffic between endpoints 104, 108, 112, 114 that are within thetraditional enterprise network perimeter and computing devices externalto the enterprise network perimeter 115 and/or to other networks 118.Traditional enterprise networks can also monitor and/or inspect networktraffic between endpoints 104, 108, 112, 114 that are within thetraditional enterprise network perimeter and cloud computing systems(such as cloud services and/or cloud databases) 122. The traditionalenterprise network may not have access to network traffic internal tothe endpoints within the enterprise network perimeter 104, 108, 112, 114nor traffic within an external cloud computing system. This becomesproblematic in today's world where a user can be traveling from onedestination to another. For example, an individual can use his or hercellphone and/or a laptop from a different location in the world thanthe location of their desktop. Endpoints such as a desktop can beconnected to a home or work network for extended periods of time andthus, can stay within the enterprise network perimeter. However, forendpoints that are remote computing devices such as the cellphone andlaptop, the endpoints can connect and disconnect from the home or worknetwork periodically throughout the day. Thus, the endpoints can beoutside the enterprise network perimeter, and thus at certain times,communicate directly with cloud data centers and/or cloud applications.The communication channels and/or network traffic may not be restrictedwith the same network restrictions an endpoint may have when within theperimeters of the traditional enterprise network. The endpoints may alsonot be protected by the same network protections available on theenterprise network. As a result, the direct communication channel to andfrom the endpoint may not be monitored and inspected for securitythreats and/or may not have any form of access provisioning appliedbecause the endpoint can bypass these mechanisms by being outside theenterprise network perimeter.

In addition, a single user can own several endpoints, some residingwithin the enterprise network perimeter (such as a work desktop) andendpoints that may not be within the enterprise network perimeter (suchas a mobile phone or a laptop). Furthermore, a user's endpoint can alsobe continually changing, such as when a user purchases a new laptop orphone. Therefore, a user can be connected to a plurality of differentnetworks at once and change continuously. Traditional enterprisenetworks can address this by allowing new devices within the perimeterto have protections and access rights. However, a shortcoming is thatwhen malicious code connects within the enterprise network perimeter,the malicious code can have access to a large amount of data and/oroperations within the enterprise network perimeter.

Another issue with traditional enterprise networks is the rise ofencryption in network traffic. Network traffic can be encrypted beforetransmission and decrypted upon receipt at the destination computingdevice. Thus, a traditional enterprise network that monitors the inboundand/or outbound network traffic may not be able to view the contentand/or other important information available on the network data packetbeing transmitted and/or received.

Furthermore, the data available to traditional enterprise networks canoften be limited to network traffic. Accordingly, these enterprisenetworks can have limited and/or no visibility into the operations andprocesses that are occurring within the transmitting computing deviceand the receiving computing device. For example, these enterprisenetworks can monitor the incoming and outgoing network traffic of acomputing device but may not be able to monitor communication betweenapplications (such as a browser on the user's space) and the CPU. Giventhis limited visibility, the traditional enterprise networks may nothave the information necessary to effectively assess security risks,understand and assess behavior of the computing devices, and/or offercyber security solutions at the operational level of a computing device.

Moreover, traditional enterprise networks may have limited or novisibility to activities occurring external to its perimeter (such asactivity occurring on the cloud network). As mentioned herein,traditional enterprise networks have not been able to effectivelyregulate communication between corporate enterprise networks and clouddata centers/services. Given the widespread adoption of cloud networkservices by many corporations, users can access data (for example, workemail, sensitive documents) via their mobile phones that can accesscloud applications and/or cloud data centers directly. This directcommunication tunnel from the endpoint to a cloud service may notinvolve the transmission of network traffic through the enterprisenetwork, and thus may not go through the enterprise network firewalland/or data access management systems for monitoring and accessrestrictions. Accordingly, traditional enterprise networks may not beable to monitor and/or regulate such communication. Furthermore, agrowing number of data leaks and security breaches include compromise ofa large number of sensitive documents. This is at least partially due tothe fact when there is a security leak into the enterprise networkperimeter, the security breach not only includes the files that arestored within the enterprise network but can also include the files thatare stored in the cloud data centers and/or the cloud services that areaccessible by endpoints within the enterprise network. Thus, thesecurity breach can spread to machines with the perimeter and machineswithin the cloud. This is becoming a growing problem as enterprises areadding more devices and more services to their corporate enterprisenetworks, growing the enterprise network perimeter and linking theendpoints to larger cloud data centers and more cloud services, thusproviding attackers with access to more information.

Some enterprise networks tried to solve this problem of limitedvisibility by placing a secure socket layer (SSL) terminator. An SSLconnection can be used by applying a certificate for authenticationbefore sending encrypted data from an endpoint to a web server. Then,the SSL terminator can intercept the encrypted network traffic anddecrypt the network traffic on a separate computing device using thecertificate in order to access content within the network traffic. Thesetypes of solutions, however, often raise privacy concerns. For example,users may not want to make their certificates that are used to decryptthe network traffic available to third parties.

Various embodiments described herein address one or more shortcomings oftraditional enterprise networks. In some embodiments, the endpointmodeling and grouping management system can achieve deep visibility ofactivity on the network and in the endpoint, both encrypted andnon-encrypted communications, via agents installed at the endpoints.FIG. 1C is a block diagram illustrating a network perimeter using anendpoint modeling and grouping management system and agents installed onendpoints according to some embodiments. In some embodiments, anenterprise network perimeter can comprise one or more endpoints withapplied network configurations. An enterprise network perimeter cancomprise applying access restrictions to the one or more endpointswithin the network perimeter. An enterprise network perimeter cancomprise security assessment of inbound and outbound traffic to thenetwork perimeter. In some embodiments, the endpoint modeling andgrouping management system 140 can access and analyze the networktraffic and/or activity data generated by the agents 145A, 145B, 145C,145D, 145E, 145F, 145I, 145J (collectively referred to herein as agents145). In some embodiments, the endpoint modeling and grouping managementsystem 140 can model and cluster groups such as logical groups ofendpoints based on the network traffic and/or activity data. FIG. 1D isa block diagram illustrating a grouping of endpoints with installedagents according to some embodiments. The endpoint modeling and groupingmanagement system can determine a grouping such as a logical grouping126 that encompasses endpoints 104, 108, 112, 114, 115, and 118. Theendpoint modeling and grouping management system can assess other typesof data, such as active directory information to model and clustergroups such as logical groups of endpoints. In some embodiments, theendpoint modeling and grouping management system 140 can transmit themodel (or the artificial intelligence software) to end points and/oragents 145 in a group such as logical group. The models can be used toassess activity on the endpoints in order to identify anomalies. In someembodiments, the endpoint modeling and grouping management system 140can determine enforcement and data control path policies based on themodeling of groups. In some embodiments, the endpoint modeling andgrouping management system can employ artificial intelligence to modeland cluster groups such as logical groups and/or determine enforcementand data control path policies. In some embodiments, the endpointmodeling and grouping management system 140 can be a cloud-based system.In some embodiments, the endpoint modeling and grouping managementsystem 140 can be a system within and/or external to the enterprisenetwork perimeter.

In some embodiments, the endpoint modeling and grouping managementsystem can employ edge computing by optimizing cloud computing systemsto perform data processing at the edges of the network, near the sourceof the data. In some embodiments, the endpoint modeling and groupingmanagement system can identify similarities and/or differences among thedata collected from agents installed on various endpoint computerdevices. In some embodiments, based on the comparison of the datacollected via the agents, the endpoints can be grouped or clustered intogroups such as logical groups. The models for the groups such as logicalgroups can be transmitted to the end points and/or the agents. In someembodiments, the models can provide an indication of baseline activity.Agents and/or endpoints can receive the models, identify baselineactivity, and autonomously assess endpoint activity and/or networktraffic for anomalies. Anomalies can be used to flag behavior that canindicate a security breach, such as malware or a computer virus. Thus,the agents can identify potential security breaches and react fasterthan traditional enterprise networks, where data can be transmitted to acloud server for the cloud server to identify anomalies.

In some embodiments, the endpoint modeling and grouping managementsystem can calculate similarities and/or differences between endpointdevices. In some embodiments, the similarities can be identified using asimilarity measure and/or function (such as the distance betweendevices, or certain data packet types transmitted and received). In someembodiments, the similarities can include perimeters and/or data pointsindicative of behaviors of the endpoints. For example, similarities canbe identified based on an assessment of the inbound and outbound networktraffic, the network connections of the endpoints, the types of devicesthat the endpoints are associated with, the amount of network traffic ona certain network connection, and the like. The groups such as logicalgroups can be dynamically and automatically created based on behavioralactivity in order to create network representations of the groups suchas logical groups. In some embodiments, the endpoint modeling andgrouping management system can continually add and remove endpoints tothe groups such as logical groups based on behavioral activity analysis.The endpoint modeling and grouping management system can continuallychange the membership of the groups such as logical groups, making thegroups such as logical groups an elastic grid. In some embodiments, theendpoint modeling and grouping management system can define anenterprise network perimeter based on the grouping. Thus, the endpointmodeling and grouping management system can create an elastic perimeterthat can virtually encompass endpoints. In some embodiments, theendpoint modeling and grouping management system can define theenterprise network perimeter by grouping endpoints with similarbehaviors. In some embodiments, the endpoint modeling and groupingmanagement system can create the enterprise network perimeter based onan installed agent such that each endpoint with the installed agent canbe determined to be within the enterprise network perimeter regardlessof the current location of the endpoint. The groups such as logicalgroups can be defined behaviorally, beyond the boundaries of hardware,network, endpoint, cloud, physical, or virtual datacenters. Thus, theendpoint modeling and grouping management system can address one or moreshortcomings of traditional enterprise networks where the perimeters canbe defined by hardware connections. These traditional enterprisenetworks may not provide protection, access restrictions, and the liketo endpoints that are outside of the enterprise network perimeterwhereas the endpoint modeling and grouping management system can defineits perimeter based on the installed agents, and thus can provide accessrestrictions, protection, and the like regardless of the location of theendpoints.

In some embodiments, the endpoint modeling and grouping managementsystem can set policies based on groupings such as logical groupings. Insome embodiments, the policies can regulate network access of theendpoints. For example, for a particular group such as logical group,the endpoint modeling and grouping management system can apply certainpolicies to certain groups such as logical groups. For example, a groupsuch as logical group can access certain datacenters, only accesscertain endpoints via virtual private network (VPN), or allow access tocloud application/servers. For example, the finance logical group canhave access to certain datacenters that the engineering logical groupmay not have access to.

FIG. 1E is a block diagram illustrating a grouping by an endpointmodeling and grouping management system, which can be configured toapply access restrictions to the grouping. The agents 145 can beinstalled on endpoints 115, 104, 112, 108, 114, and 118 to create agrouping such as a logical grouping 126. The endpoint modeling andgrouping management system 140 and/or the agents 145 can employ accessrestrictions for the group 126, such as allowing access to an endpoint121 outside the logical group, allowing access to cloud computingsystems 122 and denying access to different cloud computing system 124(such as a cloud service or a cloud database), and/or denying access toanother external network 125 comprising one or more endpoints 123.

In some embodiments, the endpoint modeling and grouping managementsystem can be configured to allow a user to adjust a threshold settingto control the resolution and/or granularity of the logical groupings.In some embodiments, the threshold level can be set to a higher level toencompass a smaller population of endpoints for each group such aslogical group.

FIG. 1F is a block diagram illustrating various groupings according tosome embodiments. If the threshold level is set low, in other words tobe more inclusive, the group can encompass endpoints 104, 112, 108, 114to form logical group 126. If the threshold is set higher, in otherwords to be less inclusive requiring endpoints to have more behavioralattributes in common, the groupings can encompass a smaller number ofendpoints, such as a first grouping 128 with endpoints 104 and endpoints108 and/or a second grouping 130 with endpoints 112 and endpoints 114.If the threshold is set even higher, in other words to be the mostrestrictive requiring endpoints to have essentially the same behavioralattributes, the groupings can encompass a smaller number of endpoints,such as a first grouping 132 with endpoints 104, a second grouping 134with endpoints 108, a third grouping 136 with endpoints 112, and/or afourth grouping 138 with endpoints 114.

FIG. 1G is a block diagram illustrating various groupings ofin-perimeter (i.e. inside the corporate network firewall) andout-perimeter endpoints according to some embodiments. Endpoints 104 and112 can be within a traditional enterprise network perimeter 102. Thegroupings such as logical groupings can include one or more endpointsinside of the perimeter and one or more endpoints outside of theperimeter. The endpoints 104, 112 within a single perimeter can begrouped into separate groupings such as logical groupings. A firstlogical grouping 128 can include in-perimeter endpoints 104 andout-perimeter endpoints 108. A second logical grouping 130 can includein-perimeter endpoints 112 and out-perimeter endpoints 114. For example,endpoints 104 can be desktops within a firewall 102 and endpoints 108can be laptops outside the firewall 102. The desktop endpoints 104 andlaptop endpoints 108 can be associated with a logical group 128, and canonly access an email cloud service but be denied access to an accountingdatabase. As such, the logical grouping 128 can comprise the desktopendpoints 104 that sit within the firewall 102 and laptop endpoints 108that sit outside the firewall 102.

FIG. 1H is a block diagram illustrating various groupings with differingaccess restrictions according to some embodiments. The endpoint modelingand grouping management system and/or the agents 145 can restrict accessof the endpoints 104, 108, 112, 114. A first group 128 of endpoints 104,108 can have access to certain cloud computing systems 122 but may bedenied access to other cloud computing systems 124, whereas a secondgroup 130 of endpoints 112, 114 can be denied access to both cloudcomputing systems 122 and 124.

In some embodiments, an agent installed on one or more endpoint computerdevices can be configured to collect data associated with and/or fromthe endpoints. In some embodiments, the agent can comprise software thatcollects data about activity occurring at an endpoint or nearby theendpoint. For example, an agent can collect data at an endpoint byintercepting and/or analyzing executed processes on the endpoint and/ormonitoring network traffic to and from the endpoint. In someembodiments, the agents can monitor inbound and outbound operations andevents at the kernel level. In some embodiments, the agents can monitorencrypted and/or unencrypted data, as will be described in furtherdetail below. In some embodiments, the agents can analyze local, system,and/or operating system activities within the endpoints. The collectionof data via an agent can be performed on a periodic basis (for example,each microsecond, each millisecond, each second, each minute, each hour,each day, each month, each year, and/or the like), continuously, and/orcan be performed in response to an activity (for example, networktraffic, operating system activity, an application, and/or the like).The agents can be installed on computing devices within the perimetersof an enterprise network. In some embodiments, the agents can beinstalled on cloud data servers and/or cloud services. In someembodiments, the agents can be installed on computing devices outside ofthe perimeter of a company enterprise network. In some embodiments, theagents can be installed on remote computing devices (such as a mobilephone or laptop) that can move in and out of a company enterprisenetwork perimeter. Thus, the network can be an elastic grid of endpointsthat can identify abnormal behavior and/or provide access restrictionsinside and outside a company enterprise network perimeter.

FIG. 1I is a block diagram illustrating identification of abnormalbehavior according to some embodiments. In some embodiments, theendpoint modeling and grouping management system and/or agents canidentify baseline behavior for the endpoint. An agent 145 can determinethat an endpoint 104 comprises baseline behavior of obtaining a certainamount of data from a cloud computing system 112. An abnormal behaviorcan be a large amount of data and/or a small amount of data as comparedto the baseline amount of expected data. The agent 145B or 145C candetermine that endpoints 108 or 114 comprises baseline behavior ofsending or receiving certain data packets of a particular type, depictedas a triangle, and/or not sending or receiving other data packets ofanother type, depicted as a star. The agent 145D can determine that anendpoint 112 comprises baseline behavior of performing certain types ofinternal processes, depicted as a semi-circle, and/or to not performother types of internal processes, depicted as three straight lines.

In some embodiments, the endpoint modeling and grouping managementsystem and/or the agents can map, determine, and/or identify the networktopology of the groups, such as logical groups. The endpoint modelingand grouping management system and/or the agents can use the mapping ofthe network topology to derive a network map representing one or moreendpoints/devices connected to a network. In some embodiments, theendpoint modeling and grouping management system can determine a modelfor the endpoints on the network map. The models can be used toestablish a baseline of behavior for activity and/or access restrictionsfor one or more groups. In some embodiments, the models can be used toidentify access restrictions for the groups. In some embodiments, theendpoint modeling and grouping management system can transmit the modelto the endpoints and/or the agents. In some embodiments, the endpointsand/or agents can assess future activity on the endpoint autonomously toidentify anomalies in activity based on the baseline. In someembodiments, the endpoints can enforce the access restrictions receivedfrom the endpoint modeling and grouping management system.

In some embodiments, the mapping can comprise one or more endpointdevices that may not have agents installed. In some embodiments, theendpoint modeling and grouping management system and/or the agents candetermine a mapping of the network to discover one or more endpointdevices. In some embodiments, the endpoint modeling and groupingmanagement system and/or agent can identify endpoints that may or maynot have agents installed as part of the mapping. In some embodiments,an agent can be configured to map the network around the agent todiscover endpoints and/or devices near the agents. In certainembodiments, the agent can be configured to analyze the mapped networkaround the agent to discover managed (an endpoint having at least oneagent installed on the endpoint) and/or unmanaged (an endpoint having noagent installed on the endpoint) devices. FIG. 1J is a block diagramillustrating deployment of an agent to an unmanaged endpoint accordingto some embodiments. In some embodiments, the endpoint modeling andgrouping management system 140 and/or the agents 145 can determine oneor more endpoint devices 116 for installing agents 145K on in order tocollect data from the endpoints 116 that do not have agents currentlyinstalled. The endpoint modeling and grouping management system 140and/or the agents 145 can identify the network topology and/or thedeployment of agents in response to data collected from one or moreagents and/or the creation/updating of the groups, such as logicalgroups, and vice versa. In some embodiments, the endpoint modeling andgrouping management system 140 and/or the agents 145 can determine,based on the collected data, to augment unmanaged devices 116 that arewithin the perimeter of the elastic network. In certain embodiments, theendpoint modeling and grouping management system 140 can be configuredto collect network data via a network device to augment unmanagedin-perimeter devices 116. In certain embodiments, network devices cancomprise a switch, a router, a hub, a modem a bridge, a repeater, and/orthe like. The endpoint modeling and grouping management system 140and/or the agents 145 can expand the collection of data from endpointswithin the perimeter of the elastic network by installing agents 145 kon unmanaged devices 116. In some embodiments, the endpoint modeling andgrouping management system 140 can generate and/or update the model forthe network perimeter based on the newly collected data from thepreviously unmanaged devices 116 now having an agent 145K installed onthe devices 116 and/or block access for these devices 116 if the devices116 do not have an agent 145K installed.

In some embodiments, the endpoint modeling and grouping managementsystem can continually assess similarities and/or differences of one ormore endpoints. In some embodiments, the endpoint modeling and groupingmanagement system can update the network topology based on newlycollected data from the recently deployed agents onto the endpoints thatpreviously did not have agents installed. The endpoint modeling andgrouping management system can create an elastic edge grid that cancontinually and automatically change.

In some embodiments, the endpoint modeling and grouping managementsystem can parse and/or index the collected data from the agents. Theendpoint modeling and grouping management system can store the data intoa searchable format. The data received from the agents can benormalized.

In some embodiments, the endpoint modeling and grouping managementsystem can be configured to operate on one or more endpoints, where oneor more of the endpoints can perform certain steps of the endpointmodeling and grouping management system.

The endpoint modeling and grouping management system can create a group,such as logical group, of endpoints. In some embodiments, the group cancomprise one or more endpoints that are located on different networksand protected by different firewalls. The endpoints can comprise usercomputing devices such as a mobile phone, a desktop computer, a tabloid,a laptop, and/or the like. In some embodiments, the endpoints cancomprise servers that connect other devices, such as user computingdevices. The endpoints can comprise cloud storage and/or cloudapplications. In some embodiments, the endpoints can be used to performcertain steps, such as data collection, which can provide the endpointmodeling and grouping management system with deep visibility. Forexample, the endpoints can collect data at the kernel level, instead ofrelying on network inbound and outbound traffic. The endpoints candetect security concerns such as malware injecting itself into a programbefore going to the kernel. Because of endpoint processing, the endpointmodeling and grouping management system can also assess connectionattempts. The endpoint modeling and grouping management system candisallow connection attempts from a current endpoint to another systemand/or from another system to the endpoint.

FIG. 2 is a diagram of edge networks using artificial intelligence (AI)according to some embodiments. Artificial intelligence can be used toidentify security threats in real-time or substantially real-time on adevice. In some embodiments, the AI component can identify groups, suchas logical groups, of endpoints based on similarities and/or differencesidentified from the collected data from agents. The AI component canidentify groups of endpoints by running various forms of statisticalanalysis on accumulated endpoint data (such as network traffic, endpointoperating system events, kernel monitoring). In some embodiments, the AIcomponent can develop models for groups. The endpoint grouping andmanagement system can transmit the models to agents. The agents canidentify baseline behavior from the models generated by the AI componentto identify anomalies in activity and/or behavior at the endpoint. Forexample, in some embodiments, the agents can assess future activity atthe endpoint to determine if the activity is within the baselinebehavior and/or if the activity is a potential security threat. In someembodiments, the agents can identify anomalies autonomously by assessingactivity based on baseline behavior of the model. In some embodiments,the agents can assess activity in real-time or substantially real-timewithout having to communicate with the cloud to identify securitythreats. The AI component of the system can make prevention, detection,and/or treatment of a security threat autonomous (or semi-autonomous).In some embodiments, the AI component can generate a model for the agentto restrict or allow access to and from an endpoint, and/or preventaccess to certain assets and/or certain modules within an asset. In someembodiments, the AI component can generate a model for the agent thatcan enforce specific usage policies, such as setting and/or limitingnetwork bandwidth, generating an alert based on network bandwidth usage,locking an endpoint based on bandwidth usage, setting bandwidth policiesfor specified connections to particular endpoints and/or assets, controltraffic during certain time periods such as outside of normal businessworking hours, deploying internet security for a particular connectionand/or endpoint, and/or the like. The endpoint modeling and groupingmanagement system can employ edge computing by optimizing cloudcomputing systems to perform data processing at the edges of thenetwork, near the source of the data. In some embodiments, edgecomputing is a method of optimizing cloud computing systems byperforming data processing at the edges of the network, near the sourceof the data. In some embodiments, the system can fuse multilayeredprotection into one AI driven core to proactively protect from allvectors of attack. In some embodiments the system can enable adistributed security approach utilizing deep real-time visibility of thenetwork endpoints.

FIG. 3 is a diagram of edge networks in a fully elastic edge gridaccording to some embodiments. In some embodiments, the system can beconfigured to map the network topology based on similarities amongendpoints, thereby making the network topology an elastic edge grid. Insome embodiments, the endpoint modeling and grouping management systemcan add and remove endpoints based on continual, dynamic, and/orperiodic assessment of data from the agents. In some embodiments, thesystem redefines the concept of a perimeter by transforming the networkas a fully elastic edge grid for every asset, from every asset, from theendpoints to the cloud. In some embodiments, the system and/or agentsgain full visibility into every data access operation includingencrypted traffic, without decrypting it. In some embodiments, thesystem comprises AI driven data access control, based on real-timeautonomous data paths baselining and enforcement. In some embodiments,the system can define any logical network beyond the boundaries ofhardware, network, endpoint, cloud, physical or virtual datacenters. Insome embodiments, the system can identify data access anomalies thatstem from abnormal data consumption, with monitoring every asset (DLP2.0).

In some embodiments, performing the mapping of the network topologyenables the system to gain visibility into unmanaged devices that areconnected to the network.

The endpoint modeling and grouping management system can perform thesteps described in this disclosure via artificial intelligence,statistical analysis, and/or machine learning. The endpoint modeling andgrouping management system can identify and/or determine similaritiesbetween one or more endpoint devices using machine learning techniques,such as artificial intelligence, statistical analysis, and/or trainedmodeling. For example, the endpoint modeling and grouping managementsystem can be configured to use computational statistics toautomatically or semi-automatically create baseline behavioral profilesand find meaningful anomalies. In some embodiments, such baselines canbe used to identify similarities between one or more endpoint devices toinclude in a grouping such as a logical grouping. Anomalies can be usedto identify differences between endpoint devices to remove the endpointdevice in a grouping. In some embodiments, the machine learningtechniques can employ computational tasks that learn from and makepredictions based on the collected data. For example, neural networkscan be trained using pre-existing training data to look for certainpatterns and apply certain rules or patterns to a new set of data tomake a recommendation and/or create a grouping such as a logicalgrouping. Data access abnormalities can be assessed based on abnormalbehavior from the baseline, such as abnormal data consumption. Theabnormalities can be identified by monitoring one or more assets.

In some embodiments, groups such as logical groups can be identifiedbased on an assessment of the activities collected from the agents. Thegroups can be determined based on behavior of the activity on theendpoints. The groups can be defined behaviorally, beyond the boundariesof hardware, network, endpoint, cloud, physical, or virtual datacenters.

In some embodiments, the system completes a behavioral assessment ofendpoints using artificial intelligence. In some embodiments, artificialintelligence can be used on preexisting datasets of actual datacollected from agents previously, whereby the endpoints are known to beassociated with one or more particular characteristic indicative of agroup such as logical group. In some embodiments, the endpoint modelingand grouping management system can train the AI component to identifythese characteristics to create groups based on new data collected fromthe agents. The datasets can comprise generated data associated with oneor more characteristics and/or activities. In some embodiments, thesystem AI runs at the core or central server and/or at the agents, anddelivers protection from malware, exploits, file-less attacks, scriptbased attacks and even live attackers, all with one, fully autonomouslow-footprint agent and a simple deployment process. In someembodiments, the endpoint software comprises a single, holistic agentfor multi-vector protection. In some embodiments, the system providesfull coverage or protection during pre-execution, execution, and/orpost-execution of endpoint processes. In some embodiments, the systemprovides automatic remediation of security threats or breaches. In someembodiments, the system may provide a rollback feature, allowing thesystem to restore one or more endpoints to a pre-infection condition. Insome embodiments, the system is configured to function on any platform,for example, MacOS, Windows, VDI, and Linux. In some embodiments, thesystem provides deep visibility into endpoints, including encryptedtraffic.

In some embodiments, the groups can be used to determine the type ofprotection required to protect from malware, exploits, file-lessattacks, script based attacks, live attacks, and/or the like. In someembodiments, a single agent can be used for multiple types ofprotection, such as multi-vector protection. The types of protection canvary based on the groups, for example ranging from prevention,detection, treatment measures, and/or the like. In some embodiments, theagents can automatically remediate affected files and/or endpoints. Forexample, the endpoint modeling and grouping management system can beconfigured to roll back at least a portion of the software, operatingsystem, and the like to a previous version and/or to a software versioninstalled on another endpoint. In some embodiments, the endpointmodeling and grouping management system can be configured to disconnectthe endpoint from the network and solve the issue before reconnectingthe endpoint to the network.

Endpoint Modeling and Grouping Management System

FIG. 4 is a schematic diagram illustrating an endpoint modeling andgrouping management system according to some embodiments. In someembodiments, a main server system 402 can be comprised of an endpointmodeling and grouping management system 404, an agent management system411, an artificial intelligence system 413, a remediation system 419, anendpoint modeling and grouping database 412, an artificial intelligencedatabase 414, a grouping database 416, an agent database 417, and/or anendpoint database 418. The main server system can be connected to anetwork 420. The network can be configured to connect the main server toan endpoint without installed agent 430 and and/or one or more agents424.

In some embodiments, the endpoint modeling and grouping managementsystem 404 can be configured to identify groups, deploy agents, and/orthe like.

In some embodiments, the processes of the main server system 402 can beoffloaded to the agents located at the endpoints. For example, in someembodiments, one or more agents can determine whether a particularendpoint can access a particular data path, thereby eliminating the needand bottleneck of requesting permission from the main sever system 402.In some embodiments, the agent can be configured to store computations,results, and input to the agents in addition to the main server system.In some embodiments, offloading certain processing to agents can reducenetwork traffic to the main server system and/or speed up enforcement oftopologies.

In some embodiments, the artificial intelligence database 414 cancomprise a collection of various artificial intelligence algorithmsand/or systems. In some embodiments, the grouping database 416 cancomprise a collection of various groupings such as logical groupings. Insome embodiments, the endpoint modeling and grouping management system404 can use the artificial intelligence system 413 to identify groups ofendpoints.

In some embodiments, the agent management system 411 can be configuredto collect and analyze data generated and/or collected by the agents424.

In some embodiments, the agent database 417 can provide a collection ofdata received by the agents installed on the endpoints. In someembodiments, the agent database 417 can comprise information on theagent, such as a version number of the agent software. In someembodiments, the endpoint database 418 can provide a collection of datarelated to the endpoints. For example, the endpoint database 418 caninclude information on the type of device, an IP address, and/or thelike.

In some embodiments, the endpoint modeling and grouping managementsystem 404 can provide users with an administrator user interface toaccess and/or communicate with the main server system, and to utilizethe functional aspects of the system. In some embodiments, the endpointmodeling and grouping management system 404 can comprise a userinterface 425 to display functions, statistics, and/or other data to theuser and to allow users to enter commands. In some embodiments, theendpoint modeling and grouping management system 404 can comprise userdata 426 that can be stored with the user profile.

In some embodiments, the endpoint modeling and grouping managementsystem 404 can communicate with endpoints without installed agents 430.The endpoint modeling and grouping management system 404 can deployand/or install agents to the endpoints without any agents.

Computer System

In some embodiments, the systems, processes, and methods describedherein are implemented using a computing system, such as the oneillustrated in FIG. 5. The example computer system 502 is incommunication with one or more computing systems 520 and/or one or moredata sources 522 via one or more networks 518. While FIG. 5 illustratesan embodiment of a computing system 502, it is recognized that thefunctionality provided for in the components and systems of computersystem 502 can be combined into fewer components and systems, or furtherseparated into additional components and systems.

Computing System Components

The computer system 502 can comprise endpoint modeling and groupingmanagement system 514 that carries out the functions, methods, acts,and/or processes described herein. The computer system 502 can compriseendpoint modeling and grouping management system 514 is executed on thecomputer system 502 by a central processing unit 506 discussed furtherbelow.

In general the word “system,” as used herein, refers to logic embodiedin hardware or firmware or to a collection of software instructions,having entry and exit points. Systems are written in a program language,such as JAVA, C, or C++, or the like. Software systems can be compiledor linked into an executable program, installed in a dynamic linklibrary, or can be written in an interpreted language such as BASIC,PERL, LAU, PHP or Python and any such languages. Software systems can becalled from other systems or from themselves, and/or can be invoked inresponse to detected events or interruptions. Systems implemented inhardware include connected logic units such as gates and flip-flops,and/or can comprise programmable units, such as programmable gate arraysor processors.

Generally, the systems described herein refer to logical systems thatcan be combined with other systems or divided into sub-systems despitetheir physical organization or storage. The systems are executed by oneor more computing systems, and can be stored on or within any suitablecomputer readable medium, or implemented in-whole or in-part withinspecial designed hardware or firmware. Not all calculations, analysis,and/or optimization require the use of computer systems, though any ofthe above-described methods, calculations, processes, or analyses can befacilitated through the use of computers. Further, in some embodiments,process blocks described herein can be altered, rearranged, combined,and/or omitted.

The computer system 502 includes one or more processing units (CPU) 506,which can comprise a microprocessor. The computer system 502 furtherincludes a physical memory 510, such as random access memory (RAM) fortemporary storage of information, a read only memory (ROM) for permanentstorage of information, and a mass storage device 504, such as a backingstore, hard drive, rotating magnetic disks, solid state disks (SSD),flash memory, phase-change memory (PCM), 3D XPoint memory, diskette, oroptical media storage device. Alternatively, the mass storage device canbe implemented in an array of servers. Typically, the components of thecomputer system 502 are connected to the computer using a standardsbased bus system. The bus system can be implemented using variousprotocols, such as Peripheral Component Interconnect (PCI), MicroChannel, SCSI, Industrial Standard Architecture (ISA) and Extended ISA(EISA) architectures.

The computer system 502 includes one or more input/output (I/O) devicesand interfaces 512, such as a keyboard, mouse, touch pad, and printer.The I/O devices and interfaces 512 can comprise one or more displaydevices, such as a monitor, that allows the visual presentation of datato a user. More particularly, a display device provides for thepresentation of GUIs as application software data, and multi-mediapresentations, for example. The I/O devices and interfaces 512 can alsoprovide a communications interface to various external devices. Thecomputer system 502 can comprise one or more multi-media devices 508,such as speakers, video cards, graphics accelerators, and microphones,for example.

Computing System Device/Operating System

FIG. 5 is a block diagram depicting an embodiment of a computer hardwaresystem configured to run software for implementing one or moreembodiments of an endpoint modeling and grouping management system.

The computer system 502 can run on a variety of computing devices, suchas a server, a Windows server, a Structure Query Language server, a UnixServer, a personal computer, a laptop computer, and so forth. In otherembodiments, the computer system 502 can run on a cluster computersystem, a mainframe computer system and/or other computing systemsuitable for controlling and/or communicating with large databases,performing high volume transaction processing, and generating reportsfrom large databases. The computing system 502 is generally controlledand coordinated by operating system software, such as z/OS, Windows,Linux, UNIX, BSD, PHP, SunOS, Solaris, MacOS, ICloud services or othercompatible operating systems, including proprietary operating systems.Operating systems control and schedule computer processes for execution,perform memory management, provide file system, networking, and I/Oservices, and provide a user interface, such as a graphical userinterface (GUI), among other things.

Network

The computer system 502 illustrated in FIG. 5 is coupled to a network518, such as a LAN, WAN, or the Internet via a communication link 516(wired, wireless, or a combination thereof). Network 518 communicateswith various computing devices and/or other electronic devices. Network518 is communicating with one or more computing systems 520 and one ormore data sources 522. The computer system 502 can comprise an endpointmodeling and grouping management system 514 can access or can beaccessed by computing systems 520 and/or data sources 522 through aweb-enabled user access point. Connections can be a direct physicalconnection, a virtual connection, and other connection type. Theweb-enabled user access point can comprise a browser system that usestext, graphics, audio, video, and other media to present data and toallow interaction with data via the network 518.

The output system can be implemented as a combination of an all-pointsaddressable display such as a cathode ray tube (CRT), a liquid crystaldisplay (LCD), a plasma display, or other types and/or combinations ofdisplays. The output system can be implemented to communicate with inputdevices and/or interfaces 512 and they also include software with theappropriate interfaces which allow a user to access data through the useof stylized screen elements, such as menus, windows, dialogue boxes,tool bars, and controls (for example, radio buttons, check boxes,sliding scales, and so forth). Furthermore, the output system cancommunicate with a set of input and output devices to receive signalsfrom the user.

Other Systems

The computing system 502 can comprise one or more internal and/orexternal data sources (for example, data sources 522). In someembodiments, one or more of the data repositories and the data sourcesdescribed above can be implemented using a relational database, such asDB2, Sybase, Oracle, CodeBase, and Microsoft® SQL Server as well asother types of databases such as a flat-file database, an entityrelationship database, and object-oriented database, and/or arecord-based database.

The computer system 502 can also access one or more data sources 522.The data sources 522 can be stored in a database or data repository. Thecomputer system 502 can access the one or more data sources 522 througha network 518 or can directly access the database or data repositorythrough I/O devices and interfaces 512. The data repository storing theone or more data sources 522 can reside within the computer system 502.

Deep Visibility

In some embodiments, one or more agents can be installed on one or moreendpoints to collect data in real-time and/or substantially real-time.The agents can be installed to collect network activity, kernel-basedmonitoring of operations and processes, and encrypted and non-encrypteddata, thereby providing the system with deep visibility into theendpoints. In some embodiments, such deep visibility allows the endpointmodeling and grouping management system to monitor and/or assesssubstantially all, if not all, traffic data and provide functionality onthis data set (such as a full indicator of compromise (IOC), analyze allor substantially all endpoints and network activities, provide a richerdata set for security threat and risk assessment, provide the ability toperform containment actions on the endpoints, establish baselinebehavior based on a fuller dataset, and/or the like).

In some embodiments, the agents can collect traffic without the need todecrypt the network traffic. Thus, the certificates may not be needed toidentify encrypted network traffic. Furthermore, the agents can collectdata before being encrypted for transmission to an externalcommunication channel and/or collect data after decryption fromtransmission from an external communication channel. As such, theendpoint modeling and grouping management system can address ashortcoming of traditional enterprise networks that can be limited tomonitoring encrypted network traffic at the firewall.

FIG. 6 is a block diagram illustrating one or more agents collectingdata from an endpoint according to some embodiments. In someembodiments, an agent 604 can be installed on the endpoint. For example,the agent 604 can be installed using a driver that monitors activity onthe kernel 610. Thus, the endpoint modeling and grouping managementsystem can access not only network traffic, but network traffic afterthe data packets are decrypted for inbound transmission and/or beforethe data packets are encrypted for outbound transmission. The endpointmodeling and grouping management system can also access and/or monitorall activity on the kernel level, such as activity internal to theendpoint, further addressing another shortcoming of traditionalenterprise networks that may be limited to inbound or outbound networktraffic.

In some embodiments, the user space 602 can comprise one or moreprograms 606 that are running on the endpoint, such as a browserapplication. One or more data packets 608 can be transmitted and/orreceived from the user space 602 to a kernel 610. In some embodiments,the kernel can translate the data packets to be transmitted to the CPU612 for processing. In some embodiments, the data packets 608 can besent directly from the user space 602 to the kernel 610 for translationfor the CPU 612. In some embodiments, the data packets 609 can betransmitted and/or requested via an API call 611, which can betransmitted to the kernel 610 for translation for the CPU 612.

In some embodiments, one or more programs 606 can use their own (and/ora third party) layer of protection 614 for transmitting and/or receivingdata packets 618, such as a sandbox to package the data packet 618 tosend directly to the kernel 610. The additional layer of protection canprevent malicious injection of security threats into data packets 618 asthe data packet 618 is transmitted to and from the user space 602 andthe kernel 610. The endpoint modeling and grouping management system canobtain visibility by placing an agent component 616 onto the layer ofprotection 614, such as via a plugin that is placed within the layer ofprotection 614 where the data packet 618 is also placed. The agentcomponent 616 can identify and collect the data traffic once the program606 removes the layer of protection 614 upon receipt from the kernel 610and/or before adding the layer of protection 614 when transmitting tothe kernel 610.

In some embodiments, one or more programs 606 on the user space 602 canbe configured to communicate to the external network 624. One or moredata packets can pass through data access management system 620. In someembodiments, the data access management system 620 and/or other devicecan encrypt the one or more data packets 622 to be sent to the externalnetwork 624, and/or can decrypt one or more encrypted data packets 622received from the external network 624. In some embodiments, in order tosend a data packet to the external network 624, a program 606 canrequest data from a library 626 (for example, data to enable the abilityto send and receive port control protocol (PCP)). In some embodiments,the traffic to this library 626 is passed to the kernel 610 and to theCPU 612 before being transmitted to an external computing device outsideof the network perimeter. Thus, the agent 604 can be configured tocollect this data passing through the library 626 before the data istransmitted to the external computing device. In some embodiments, theagent 604 can be installed on the library 626 and/or on a driver thatcollects data from the library 626.

The agent 605 can be installed on a program 606 of the user space 602and/or can be a driver that collects data from a program 606 on the userspace 602. In some embodiments, the endpoint modeling and groupingmanagement system can install an agent 605 on the user space 602 and/orinstall an agent 604 on the kernel layer 610, which can enable detectionof abnormal behavior when abnormal activity occurs between the userspace 606 and the kernel layer 610 (such as when malicious code isinjected in a data packet traveling between the user space 606 and akernel layer 610). Accordingly, the endpoint modeling and groupingmanagement system can detect abnormalities and/or security threats whena virus or malware is injected before a data packet 608 is processed bythe CPU 612 and/or affects the programs 606 on the user space 602.

In some embodiments, because one or more agents are installed on one ormore endpoints and can monitor and collect data at the kernel level, theendpoint modeling and grouping management system can obtain access to awide range of data types that may not be available in certain enterprisenetworks. FIG. 7 is a graphical user interface illustrating some of thetypes of data the agent can collect according to certain embodiments. Asnon-limiting examples, the types of data that can be collected by one ormore agents can comprise: full disk file monitoring, including thefilename, full path, time created, time modified, SHA1, SHA256, MD5;live process monitoring including process name, process ID, timecreated; originating executable including filename, full path, timecreated, time modified, SHA1, SHA256, MD5; process events includingnetwork activity, file creation/modification, timestamp; and livenetwork monitoring including IP/TCPv4 connections (including attempts),DNS queries, URLs (for HTTP and HTTPS connections), headers (for HTTPand HTTPS connections), and timestamps.

In some embodiments, one or more agents can be configured to collectdata available at the PCP (for example, the uniform resource locators(URLs)). In some embodiments, the agents and/or the endpoint modelingand grouping management system can parse and/or assess collected data.For example, the endpoint modeling and grouping management system canparse the URL to identify the host name of the URL and/or the https metaheader. In some embodiments, one or more agents can collect cookieinformation, guest parameters, host parameters, and/or http parametersfrom endpoint activity. In some embodiments, the endpoint modeling andgrouping management system can monitor browsing history of one or moreendpoints and determine behavioral patterns of the one or more endpointsbased on the browsing history.

In some embodiments, the endpoint modeling and grouping managementsystem can identify matches in certain types of collected data todetermine groups. In some embodiments, the endpoint modeling andgrouping management system can create policies and/or enforcement datain accordance with the type of data collected. In some embodiments, theendpoint modeling and grouping management system can allow for a searchon the collected data generated by the agents installed at variousendpoints within the elastic network (for example, analyzing for aspecific indicator of compromise (IOC)). In some embodiments, theendpoint modeling and grouping management system can analyze and/ormatch files and/or header data. Further, in some embodiments, theendpoint modeling and grouping management system can be configured tomatch endpoints visiting a particular website at a particular time anddate, identify endpoints with activity in a certain geographical region,and the like.

Elastic Grid and Autonomous Anomaly Identification

In some embodiments, the endpoint modeling and grouping managementsystem can define an enterprise network perimeter based on one or moregroupings. Thus, the endpoint modeling and grouping management systemcan create an elastic perimeter that virtually encompasses endpoints. Insome embodiments, the endpoint modeling and grouping management systemcan define the enterprise network perimeter by grouping endpoints withsimilar behaviors. For example, an AI component of the endpoint modelingand grouping management system can identify similarities in behaviors ofendpoints. In some embodiments, the endpoint modeling and groupingmanagement system can identify each endpoint installed with an agent aspart of the enterprise network perimeter.

FIG. 8 is a flow diagram illustrating transmission of behavioral modelsto one or more agents based on analysis of data collected from theagents according to some embodiments of an endpoint modeling andgrouping management system transmitting.

At block 802, the endpoint modeling and grouping management system canidentify endpoints to which agents can be deployed. For example, thesystem can determine that one or more agents need to be deployed to acomputer within an enterprise network perimeter, a computer outside anenterprise network perimeter, an in-perimeter datacenter, a datacenteroutside of a perimeter, and/or a cloud datacenter. In some embodiments,at block 804, the endpoint modeling and grouping management system candeploy the agents to one or more identified, detected, and/or determinedendpoints.

At block 806, each of the endpoints that received agents can beconfigured to install the received agent. In some embodiments, each orsome of the endpoints can comprise computing devices and/or memorylocated on an enterprise network, on a cloud system, on a remotecomputing device, and/or the like. For example, Endpoint 1 can be anendpoint on a computer within an enterprise network perimeter. Endpoint2 can be an endpoint on a computer outside of an enterprise networkperimeter. Endpoint 3 can be an endpoint on an in-perimeter datacenter.Endpoint 4 can be an endpoint on a datacenter outside of the perimeter,and endpoint 5 and endpoint 6 can be endpoints on cloud datacenters 1and 2. In some embodiments, one of the endpoints in FIG. 8 can be acloud service, such as Salesforce, Office 365, Dropbox, Box, GitHub,and/or the like, wherein the system does not deploy an agent at thecloud service endpoint, but rather regulates network access to and/orfrom the cloud service endpoint.

At blocks 808, the agents can collect and transmit endpoint data. Forexample, the agents can collect data at the kernel level, identifyinginternal activities of the endpoints, encrypted and non-encrypted data,inbound/outbound network traffic data, network usage, application usage,processor usage, time period usage, geographic location of theendpoints, corporate department, and/or the like.

At block 810, the endpoint modeling and grouping management system canidentify one or more additional endpoints without an agent installed anddeploy an agent to those endpoints. In some embodiments, the endpointmodeling and grouping management system can identify an endpoint withoutan agent on the same computing platform as another endpoint. Forexample, an endpoint can have an agent installed, which can be used toidentify another endpoint without an agent installed that is part of thesame cloud datacenter, in-perimeter data center, out-perimeterdatacenter, in-perimeter computer, and/or out-perimeter computer.

At block 806, the endpoint can install the agent at additionalendpoints, and at block 808, the agent can collect endpoint data fromthe endpoints and transmit the data to the endpoint modeling andgrouping management system. Accordingly, when an endpoint is added tothe network via the agent, the endpoint modeling and grouping managementsystem can gain visibility to processing and/or activity of thatendpoint by receiving data collected by the agent installed on theendpoint. Thus, the network enterprise perimeter can be defined based atleast in part on the data collected by the agents that are installed onthe one or more endpoints. This can improve shortcomings of certainenterprise network regimes that are configured to providesoftware-defined or pre-defined perimeters on a central server, avirtual router, a cloud server, or the like. This can also furtherimprove inefficiency of some enterprise network regimes arising fromhaving to route all traffic to a central server and have the centralserver respond with its assessment (for example, transmitting accessregulations for each data packet). Furthermore, some enterprise networkregimes can have limited visibility on encrypted network packetstraveling through the network, whereas certain embodiments hereinprovide visibility to activity or processing at one or more endpoints asdescribed above.

At block 812, the endpoint modeling and grouping management systemassesses the data collected by the agents and identifies or determinessimilarities in the received endpoint data across one or more endpoints.For example, the system can determine that one or more endpoints aresimilar based on network usage, application usage, processor usage, timeperiod usage, geographic location of the endpoints, corporatedepartment, and/or the like. Further, at block 812, the endpointmodeling and grouping management system can have visibility of activitywithin the endpoints that have agents installed, such as network usage,application usage, processor usage, time period usage, geographiclocation of the endpoints, corporate department, and/or the like. Forexample, the endpoint modeling and grouping management system can havevisibility of substantially all endpoints with agents installed therein.

At block 814, the endpoint modeling and grouping management system candetermine groups, such as logical groups, based on identifiedsimilarities and/or differences. For example, the identified ordetermined similarities and/or differences can be based on similaritiesand/or differences in network usage, application usage, processor usage,time period usage, geographic location of the endpoints, corporatedepartment, and/or the like. Each of the groups can comprise one or moreendpoints, one or more computer systems, one or more data centers, oneor more cloud services, one or more cloud data centers, and/or the like.

At block 816, the endpoint modeling and grouping management system cangenerate a model for each grouping. For example, the model can be abaseline model that indicates a baseline behavior for endpoints in thegroup. In some embodiments, the endpoint modeling and groupingmanagement system can identify matches in certain types of collecteddata to determine groups. In some embodiments, the endpoint modeling andgrouping management system can match files and/or header data. Forexample, the endpoint modeling and grouping management system can matchendpoints visiting a particular website at a particular time and date,identify activity in a certain common geographical region, and the like.

In some embodiments, the endpoint modeling and grouping managementsystem can determine a model for groups based on one or morecharacteristics. For example, the endpoint modeling and groupingmanagement system can create a model according to traffic at the kernel,browsing history, all access data, inbound and outbound connection in acommunication protocol (including encrypted traffic), operations on theoperating system, device type, processes that are running on the userspace and/or other systems of the computing device, network traffic,input from a user, data storage activity, real-time processing, batchprocessing, multitasking, interactive processing, multiprogramming,transaction processing, multi-access operations, timesharing operations,active directory, access control lists, packet information, protocolinformation, port number information, packet state information,application information, VPN information, data usage, bandwidth usage,proxy usage, other types of information translated by the kernel forprocessing in the CPU, a subset and/or all characteristics, and thelike.

In some embodiments, the endpoint modeling and grouping managementsystem can generate a model to establish network access regulations. Atblock 818, the endpoint modeling and grouping management system candetermine network access rights for one or more groups of endpoints. Theendpoint modeling and grouping management system can regulate thenetwork access restrictions of the endpoints within a particular group.For example, the endpoint modeling and grouping management system canrestrict and/or allow network access to a particular cloud data center,a cloud service, a part of the enterprise network, database server,network application, or other devices or services. The endpoint modelingand grouping management system can dynamically identify groups and/orautomatically set access restrictions for the groups. Instead oftraditional enterprise networks where IT staff are required to identifyaccess regulations for networks with hundreds, thousands, and/ormillions of endpoints connected to servers, data centers, and cloudservices, the endpoint modeling and grouping management system canautomatically identify logical networks and generate accessrestrictions. The endpoint modeling and grouping management system canidentify access regulations based on similarities among endpoints, forexample, similarities in network usage, application usage, processorusage, time period usage, geographic location of the endpoints,corporate department, and/or the like.

At block 820, the endpoints receive the models generated by the endpointmodeling and grouping management system and, for example, at blocks 822and 824, identify baseline behavior based on the models for each group.For example, some can be assigned to logical group 1, and other can beassigned to logical group 2.

In some embodiments, certain endpoints in a group typically accesscertain network resources, use a certain amount of bandwidth, or thelike at a particular time periods (for example, a time of the day, week,month, year). In some embodiments, the system can be configured to usethis information to model a baseline behavior. Based on the baselinebehavior data, the system can be configured to identify a suddenincrease in network data usage and/or odd time periods when networkpaths are being accessed from an endpoint within the elastic network.For example, the system can be configured to identify when an endpointis utilizing abnormal network data bandwidth in order to upload and/ordownload data from a cloud service, wherein such usage represents a bigspike above the normal baseline use, and upon identification of suchabnormal network usage patterns, the system can be configured to flagthe endpoint to a user as a concern and/or automatically and/orimmediately restrict network usage for the endpoint acting abnormally.The endpoint modeling and grouping management system can perform suchanalysis to identify data leaks. Such an approach overcomes theshortcomings of traditional data leak prevention products that can befocused on identifying fixed strings on a network and/or can be focusedon device control (such as preventing a device from accessing or copyinga file). Focusing on fixed strings and/or device control cannoteffectively be applied to an elastic enterprise network withconnectivity to mobile devices and to cloud services located outside thefirewall.

In some embodiments, the baseline behavior for each group such aslogical group can be used to identify abnormal behavior. For example,identifying abnormal behavior can include behavior at a certain timeperiod, types of data packets, an amount of data, encryption techniquesused, inbound/outbound network traffic, connection attempts to and fromcertain external devices, and the like. At block 826, the agents cancollect endpoint data, and at blocks 828 the agents can identifyabnormal behavior from the baseline identified in the models. Thus, themodels that were sent by the endpoint modeling and grouping managementsystem can enable the endpoints to act autonomously and identifyabnormal behavior on its own. In some embodiments, the agents canidentify abnormal behavior without having to send data to the endpointmodeling and grouping management system and/or other central server,cloud server, network server, or the like. Because the identification ofthe abnormal behavior can occur on the endpoints via the agent, theresponse can be quicker before the security attack can take furtheraction without having to send a notice to a central server and wait fora response. Furthermore, performing the assessment and/or theenforcement at the agent, the required communications back and forthwith the endpoint modeling and grouping management system (and/or acentral server) is reduced. This becomes important in today's enterprisenetworks where over a million endpoints can be connected to a cloudsystem with access controls for each endpoint. Thus, the endpointmodeling and grouping management system in the present disclosure can bescalable, whereas a centralized server performing the identification ofabnormal behavior may not be scalable. Another benefit is that theenforcement policies can occur in real-time as processes are sent and/orreceived at the kernel level. Connection attempts from the endpoint toan external device and/or connection attempts from an external device tothe endpoint can be detected before the connection is established. Thus,the agents can restrict these connections in real-time before securitybreaches occur.

Once abnormal behavior is identified, the agents can autonomously takecertain action, such as initiating forensics analysis, mitigation and/orremediation techniques, containment mechanisms, rolling backcapabilities, file and machine quarantine, external threat feedingestion, restricting and/or terminating network path access, and thelike.

At block 830, the endpoint modeling and grouping management system canreceive the identified abnormal behavior and perform further securityrisk assessment. At block 816, the endpoint modeling and groupingmanagement system can update the model based on the identified abnormalbehavior, and transmit the updated model to endpoints of the group suchas logical group.

In some embodiments, the endpoint modeling and grouping managementsystem can identify endpoints that appear to belong to a particulargroup such as logical group, but can create exceptions for the endpoint.In some embodiments, the endpoint modeling and grouping managementsystem can create customizations to groups that are created, such aschanging access restrictions. The customizations can be applied to theentire group and/or to individual endpoints. In some embodiments, theendpoint modeling and grouping management system can create exceptionsfor super-users to allow access to certain cloud data centers that otherend points in similar groups may not be able to access.

In some embodiments, the endpoint modeling and grouping managementsystem can allow for a search on the collected information generated bythe agents installed at various endpoints within the elastic network(for example, analyzing for a specific indicator of compromise (IOC)).In some embodiments, the collected endpoint data can be parsed andindexed in a database. In some embodiments, in response to a receiving arequest to search the endpoint data, the endpoint modeling and groupingmanagement system can perform a search on the indexed database andtransmit matches to keywords, threshold levels, and/or indicators ofcompromise in the search inquiry. In some embodiments, the endpointmodeling and grouping management system provides an indicator ofcomprise (IOC) search on all endpoints within the elastic network and/oron network activities occurring within the elastic network. Thecollected information generated by the agents installed at variousendpoints can provide a rich database for threat hunting and data miningfor identifying network activity that could be indicative of malware orother harmful software operating on an endpoint within the elasticnetwork. In an embodiment, the system comprises filters and/or othermechanisms for identifying network behavior suggestive of a malwareattack, and in some embodiments, the system can be configured to respondto such malware attacks by taking containment actions and/or restrictingnetwork access for particular affected endpoints in order to protect therest of the elastic network.

The endpoint modeling and grouping management system can adjust thegranularity threshold for identifying groups. If the granularitythreshold is set high, there may be too many endpoints in a group. Insome embodiments, having too many endpoints in a group may make itchallenging to assign network access path privileges. In someembodiments, the granularity of the threshold can be adjusted forlogical grouping and/or modeling. In some embodiments, the endpointmodeling and grouping management system can determine groups such aslogical groups based on the updated threshold and deploy updated modeldata to the agents. In some embodiments, the endpoints can identifybaseline behavior for the associated groups such as logical groups basedon the updated model data. For example, in response to changing thegranularity threshold for the groups such as logical groups, someendpoints can remain in group 1 but some endpoints can be regrouped intogroup 3, and some endpoints can remain in group 2. The endpoint modelingand grouping management system can update the models for the new logicalgroupings that can be used to determine new baseline behaviors for eachof the new logical groupings. These models can be deployed to theagents, such that the agents can identify abnormal behavior for theupdated baseline behavior associated with the new logical groupings. Insome embodiments, the agents can set access policies to regulate inboundand outbound data to and from the endpoints. These access policies canbe determined based on the models updated for each new group such aslogical group.

In some embodiments, the endpoint modeling and grouping managementsystem can assess violations of a group. In some embodiments, aviolation can comprise when an endpoint attempts to access a networkpath that is restricted based on the privileges assigned to endpoint,and/or the group that the endpoint is a part of, by the endpointmodeling and grouping management system. The endpoint modeling andgrouping management system can assess violations to dynamically and/orautomatically change the granularity threshold for the groupings, inother words, change the group in which the endpoint is a part of. Insome embodiments, the endpoint modeling and grouping management systemcan assess violations to dynamically and/or automatically change thenetwork access path privileges assigned to the endpoint and/or the groupin which the endpoint is a part of. In some embodiments, violations canbe the identification of an incorrect access restriction. Users canindicate an incorrect access restriction to the endpoint modeling andgrouping management system. In some embodiments, based on a numberand/or percentage of violations, the endpoint modeling and groupingmanagement system can increase and/or decrease the granularitythreshold. In some embodiments, the endpoint modeling and groupingmanagement system can adjust the granularity threshold based on a numberof groups.

In some embodiments, the endpoint modeling and grouping managementsystem comprises an antivirus system that is configured to search forknown viruses and can be combined with a system configured to restrictnetwork access control for endpoints.

FIG. 9 is a graphical user interface of a group view according to someembodiments. In some embodiments, the endpoint modeling and groupingmanagement system can provide a dashboard of a group such as logicalgroup in a graphical user interface. In some embodiments, the endpointmodeling and grouping management system can be configured to generatedata for causing the display of a dashboard on a remote user's computerscreen. In some embodiments, the graphical user interface can display agroup and characteristics of the group. In some embodiments, the groupcan be named “West Coast” indicating employees located on the West Coastof the United States. The graphical user interface can indicate thenumber of endpoints associated with the group, such as 2,083 end points.The group, such as logical group, can include subgroups within thegroup, such as one group having 73 subgroups. In some embodiments, thegraphical user interface can be configured to display the number ofviolations for groups, such as 43% of endpoints reporting violations forthe “west coast” group. The graphical user interface can display theaccess regulations to other endpoints, such as local and/or remoteapplications, protocols, cloud services, data centers, and the like. Forexample, in some embodiments, the “West Coast” group can be connected toa local application, a USB protocol and several data centers, whilebeing restricted access to a cloud application. In some embodiments, thegraphical user interface can display various subgroups of the west coastand/or endpoints of the group such as logical group. In someembodiments, the graphical user interface can display a list ofviolations for particular endpoints. In some embodiments, the graphicaluser interface can display the number and/or percentage of violationsover a period of time. In some embodiments, the graphical user interfacecan display an amount of data downloaded and/or uploaded to and fromendpoints and/or a group of endpoints. In some embodiments, thegraphical user interface can display an amount of data downloaded and/oruploaded to and from endpoints and/or a group of endpoints, and comparesuch data to historical data. In some embodiments, the system can beconfigured to generate a flag and/or an alert and/or terminate or reducenetwork access for an endpoint and/or group of endpoints if thecomparison of the amount of data downloaded and/or uploaded withhistorical data exceeds a threshold level.

In some embodiments, the endpoint modeling and grouping managementsystem can provide a graphical user interface of available groups, datacenters, and/or services. In an embodiment, the endpoint modeling andgrouping management system can provide a graphical display showing amapping of endpoints in the elastic network, wherein the endpointmodeling and grouping management system can be configured for automatic,semi-automatic, manual, and/or a combinational determination of accessrestrictions for the endpoints. FIGS. 10 and 11 are illustrations ofgraphical user interfaces according to some embodiments of a dashboardlisting groups as well as servers, storage devices, data centers,cloud-based services and storage, and other network services thatendpoints in the elastic network may access. In the embodiments of FIGS.10 and 11, the endpoint modeling and grouping management system candisplay a list of groups, such as logical groups, and/or sub-groups. Theendpoint modeling and grouping management system can display availablecloud data centers, cloud services, local and/or remote servers, localand/or remote applications, local and/or remote databases, protocols,and the like.

In some embodiments, the endpoint modeling and grouping managementsystem can display access of a particular group to cloud data centers,cloud services and/or applications, local servers or servers, localapplications or applications, protocols, network access privileges, andthe like. FIGS. 12 and 13 are a graphical user interfaces according tosome embodiments. In the embodiment of FIG. 12, the graphical userinterface displays a group with access to a server and two cloud-basedservices. In the embodiment of FIG. 12, a subgroup with a certain numberof endpoints and subgroups is selected and shown to have access to twocloud services and one local data center, and/or access restrictions ona cloud service, a local server, and two local data centers. In theembodiment of FIG. 13, the graphical user interface displays a group,such as logical group, with access controls to a server, two cloud-basedservices, and a local database file storage. In some embodiments, theendpoint modeling and grouping management system can automaticallydetermine and/or display access restrictions on a graphical userinterface. In some embodiments, the endpoint modeling and groupingmanagement system can allow manual determination and/or modification ofaccess restrictions on a graphical user interface.

In some embodiments, the endpoint modeling and grouping managementsystem can display a list of groups with associated characteristics.FIG. 14 is a graphical user interface according to some embodiments of alisting of groups such as logical groups and associated characteristics.In some embodiments, the graphical user interface can display the numberof end points and/or sub-groups for each group. In some embodiments, thegraphical user interface can display the number of access allowancesand/or restrictions to protocols, data centers, cloud applications andcloud resources, local applications and/or data, and the like for eachgroup. In some embodiments, the graphical user interface can display thenumber of violations for each group.

URLs and Cookies

In some embodiments, one or more features of the systems, methods, anddevices described herein can utilize a URL and/or cookies, for examplefor storing and/or transmitting data or user information. A UniformResource Locator (URL) can comprise a web address and/or a reference toa web resource that is stored on a database and/or a server. The URL canspecify the location of the resource on a computer and/or a computernetwork. The URL can comprise a mechanism to retrieve the networkresource. The source of the network resource can receive a URL, identifythe location of the web resource, and transmit the web resource back tothe requestor. A URL can be converted to an IP address, and a Doman NameSystem (DNS) can look up the URL and its corresponding IP address. URLscan be references to web pages, file transfers, emails, databaseaccesses, and other applications. The URLs can comprise a sequence ofcharacters that identify a path, domain name, a file extension, a hostname, a query, a fragment, scheme, a protocol identifier, a port number,a username, a password, a flag, an object, a resource name and/or thelike. The systems disclosed herein can generate, receive, transmit,apply, parse, serialize, render, and/or perform an action on a URL.

A cookie, also referred to as an HTTP cookie, a web cookie, an internetcookie, and a browser cookie, can comprise data sent from a websiteand/or stored on a user's computer. This data can be stored by a user'sweb browser while the user is browsing. The cookies can comprise usefulinformation for websites to remember prior browsing information, such asa shopping cart on an online store, clicking of buttons, logininformation, and/or records of web pages or network resources visited inthe past. Cookies can also comprise information that the user enters,such as names, addresses, passwords, credit card information, etc.Cookies can also perform computer functions. For example, authenticationcookies can be used by applications (for example, a web browser) toidentify whether the user is already logged in (for example, to a website). The cookie data can be encrypted to provide security for theconsumer. Tracking cookies can be used to compile historical browsinghistories of individuals. Systems disclosed herein can generate and usecookies to access data of an individual. Systems can also generate anduse JSON web tokens to store authenticity information, HTTPauthentication as authentication protocols, IP addresses to tracksession or identity information, URLs, and the like.

Alternative Embodiments

Although this invention has been disclosed in the context of certainembodiments and examples, it will be understood by those skilled in theart that the invention extends beyond the specifically disclosedembodiments to other alternative embodiments and/or uses of theinvention and obvious modifications and equivalents thereof. Inaddition, while several variations of the embodiments of the inventionhave been shown and described in detail, other modifications, which arewithin the scope of this invention, will be readily apparent to those ofskill in the art based upon this disclosure. It is also contemplatedthat various combinations or sub-combinations of the specific featuresand aspects of the embodiments can be made and still fall within thescope of the invention. It should be understood that various featuresand aspects of the disclosed embodiments can be combined with, orsubstituted for, one another in order to form varying modes of theembodiments of the disclosed invention. Any methods disclosed hereinneed not be performed in the order recited. Thus, it is intended thatthe scope of the invention herein disclosed should not be limited by theparticular embodiments described above.

Conditional language, such as, among others, “can,” “could,” “might,” or“may,” unless specifically stated otherwise, or otherwise understoodwithin the context as used, is generally intended to convey that certainembodiments include, while other embodiments do not include, certainfeatures, elements and/or blocks. Thus, such conditional language is notgenerally intended to imply that features, elements and/or blocks are inany way required for one or more embodiments or that one or moreembodiments necessarily include logic for deciding, with or without userinput or prompting, whether these features, elements and/or blocks areincluded or are to be performed in any particular embodiment. Theheadings used herein are for the convenience of the reader only and arenot meant to limit the scope of the inventions or claims.

Further, while the methods and devices described herein may besusceptible to various modifications and alternative forms, specificexamples thereof have been shown in the drawings and are hereindescribed in detail. It should be understood, however, that theinvention is not to be limited to the particular forms or methodsdisclosed, but, to the contrary, the invention is to cover allmodifications, equivalents, and alternatives falling within the spiritand scope of the various implementations described and the appendedclaims. Further, the disclosure herein of any particular feature,aspect, method, property, characteristic, quality, attribute, element,or the like in connection with an implementation or embodiment can beused in all other implementations or embodiments set forth herein. Anymethods disclosed herein need not be performed in the order recited. Themethods disclosed herein may include certain actions taken by apractitioner; however, the methods can also include any third-partyinstruction of those actions, either expressly or by implication. Theranges disclosed herein also encompass any and all overlap, sub-ranges,and combinations thereof. Language such as “up to,” “at least,” “greaterthan,” “less than,” “between,” and the like includes the number recited.Numbers preceded by a term such as “about” or “approximately” includethe recited numbers and should be interpreted based on the circumstances(for example, as accurate as reasonably possible under thecircumstances, for example ±5%, ±10%, ±15%, etc.). For example, “about3.5 seconds” includes “3.5 seconds.” Phrases preceded by a term such as“substantially” include the recited phrase and should be interpretedbased on the circumstances (for example, as much as reasonably possibleunder the circumstances). For example, “substantially constant” includes“constant.” Unless stated otherwise, all measurements are at standardconditions including temperature and pressure.

What is claimed is:
 1. A computer-implemented method for protectingsecurity and integrity of an elastic computer network, the methodcomprising: monitoring, by each autonomous software agent of a pluralityof autonomous software agents installed on each of a plurality ofendpoint devices forming the elastic computer network, one or moreoperating system processes and network communications of a correspondingendpoint device to obtain endpoint data; transmitting, by eachautonomous software agent, the endpoint data to a central server;identifying, by an autonomous software agent using one or more securityrules stored on each of the plurality of autonomous software agents, oneor more anomalous indicators on the corresponding endpoint device basedat least in part on the endpoint data, wherein each of the one or moresecurity rules is based in part on a baseline usage pattern unique toeach corresponding endpoint device; and responding, by one or moreautonomous software agents, to the one or more anomalous indicators onan endpoint-level based at least in part on the security rules, whereinresponding comprises limiting one or more operating system processes ornetwork communications of the corresponding endpoint device, whereineach of the plurality of autonomous agents is capable of identifying andresponding to the one or more anomalous indicators of the correspondingendpoint device independently of the central server.
 2. Thecomputer-implemented method of claim 1, wherein the responding by theautonomous software agent is performed without receiving a commandinstruction from the central server.
 3. The computer-implemented methodof claim 1, wherein monitoring the one or more operating systemprocesses or the network communications of the corresponding endpointdevice comprises continuously verifying and authenticating thecorresponding endpoint device activities.
 4. The computer-implementedmethod of claim 1, wherein the plurality of endpoint devices compriseone or more cellphones, servers, virtual machines, laptops, tablets,desktop computers, Internet of Things (IoT) devices, landline phones,wearable devices, or smart home devices.
 5. The computer-implementedmethod of claim 1, wherein at least one endpoint device of the pluralityof endpoint devices is located outside of a computer network firewall.6. The computer-implemented method of claim 1, wherein the plurality ofendpoint devices are grouped into endpoint clusters, and wherein one ormore endpoint devices of each endpoint cluster comprise one or moresimilar processing or network access patterns.
 7. Thecomputer-implemented method of claim 1, wherein each of the plurality ofautonomous software agents is further configured to perform apoint-in-time validation of the corresponding endpoint device,
 8. Thecomputer-implemented method of claim 7, wherein the point-in-timevalidation comprises a verification that no anomalous indicators arepresent on the corresponding endpoint device.
 9. Thecomputer-implemented method of claim 1, wherein each of the plurality ofautonomous software agents is further configured to scan the elasticnetwork to identify devices in or in proximity to the elastic network.10. The computer-implemented method of claim 9, wherein the scancomprises utilizing discovery protocols to identify the devices in or inproximity to the network and obtain data therefrom.
 11. An edgenetworking system, the system comprising: a plurality of autonomousagents, wherein each of the plurality of autonomous agents is operatingon a corresponding endpoint device of a plurality of endpoint devicesforming an elastic computer network, and wherein each of the pluralityof autonomous agents is configured to: monitor one or more operatingsystem processes and network communications of a corresponding endpointdevice to obtain endpoint data; transmit the endpoint data to a centralserver; identify one or more anomalous indicators on the correspondingendpoint device based at least in part on the endpoint data, whereineach of the one or more security rules is based in part on a baselineusage pattern unique to each corresponding endpoint device; and respondto the one or more anomalous indicators on an endpoint-level based atleast in part on the security rules, wherein responding compriseslimiting one or more operating system processes or networkcommunications of the corresponding endpoint device, wherein each of theplurality of autonomous agents is capable of identifying and respondingto the one or more anomalous indicators of the corresponding endpointdevice independently of the central server.
 12. The edge networkingsystem of claim 11, wherein the responding by the autonomous softwareagent is performed without receiving a command instruction from thecentral server.
 13. The edge networking system of claim 11, whereinmonitoring the one or more operating system processes or the networkcommunications of the corresponding endpoint device comprisescontinuously verifying and authenticating the corresponding endpointdevice activities.
 14. The edge networking system of claim 11, whereinthe plurality of endpoint devices comprise one or more cellphones,servers, virtual machines, laptops, tablets, desktop computers, Internetof Things (IoT) devices, landline phones, wearable devices, or smarthome devices.
 15. The edge networking system of claim 11, wherein atleast one endpoint device of the plurality of endpoint devices islocated outside of a computer network firewall.
 16. The edge networkingsystem of claim 11, wherein the plurality of endpoint devices aregrouped into endpoint clusters, and wherein one or more endpoint devicesof each endpoint cluster comprise one or more similar processing ornetwork access patterns.
 17. The edge networking system of claim 11,wherein each of the plurality of autonomous software agents is furtherconfigured to perform a point-in-time validation of the correspondingendpoint device,
 18. The edge networking system of claim 17, wherein thepoint-in-time validation comprises a verification that no anomalousindicators are present on the corresponding endpoint device.
 19. Theedge networking system of claim 11, wherein each of the plurality ofautonomous software agents is further configured to scan the elasticnetwork to identify devices in or in proximity to the elastic network.20. The edge networking system of claim 19, wherein the scan comprisesutilizing discovery protocols to identify the devices in or in proximityto the network and obtain data therefrom.