US 12,443,704 B2
Network security probe
John Neystadt, Kfar-Saba (IL); Shay Azulay, Rishon le-Zion (IL); Amit Cohen, Kfar Saba (IL); and Lior Chen, Tel Mond (IL)
Assigned to VARONIS SYSTEMS, INC., New York, NY (US)
Filed by VARONIS SYSTEMS, INC., New York, NY (US)
Filed on Oct. 3, 2022, as Appl. No. 17/958,804.
Prior Publication US 2024/0111858 A1, Apr. 4, 2024
Int. Cl. G06F 21/55 (2013.01); G06F 21/62 (2013.01)
CPC G06F 21/552 (2013.01) [G06F 21/6245 (2013.01); G06F 2221/034 (2013.01)] 13 Claims
OG exemplary drawing
 
1. A system for automatically monitoring efficacy of security controls relating to access control in a computer network, comprising:
a probe engine configurable with at least one set of rules relating to access permissions to data in said computer network;
at least one security probe forming part of said probe engine and operative to automatically:
place, at at least one storage location within said computer network, simulated data corresponding to said data in said computer network, said simulated data having associated therewith access permissions defining allowed access to said simulated data, said access permissions associated with said simulated data being non-compliant with said at least one set of rules; and
attempt to access said simulated data following the placement thereof, using access privileges satisfying said non-compliant access permissions associated with said simulated data, but not satisfying said at least one set of rules, and
a security monitoring and reporting module operative to provide a user sensible output indicating at least whether said attempt to access said simulated data was successful and, responsive to said attempt to access said simulated data being successful, reporting mitigating activities by said security controls in response to said successful attempt.