Check Point Software Technologies Ltd.
Account take over prevention

Last updated:

Abstract:

A method for monitoring access of users to Internet SaaS applications includes the CISO (company Internet security office) in the configuration and operation of the method, instead of relying only on whatever security the SaaS application implements. Certificates, not accessible to users, are pushed to a user's client. When an access request is received from a client by an application, a gateway requests from the client the certificate. After a notification and approval process with the user, a received certificate is verified, user access to the application is allowed or denied, and the CISO notified of the attempted access.

Status:
Grant
Type:

Utility

Filling date:

28 Mar 2017

Issue date:

5 May 2020