Palo Alto Networks, Inc.
Detection of compromised credentials as a network service

Last updated:

Abstract:

Techniques for detection of compromised credentials as a network service are disclosed. In some embodiments, a system, process, and/or computer program product for detection of compromised credentials as a network service includes monitoring a plurality of sessions at a firewall, logging a plurality of failed or timed out attempts to authenticate at the firewall in a log, analyzing the log for a pattern of failed or timed out attempts to authenticate at the firewall to identify potentially compromised credentials for authentication, and determining that a set of credentials for authentication have been compromised based on the analysis of the log.

Status:
Grant
Type:

Utility

Filling date:

30 Sep 2016

Issue date:

30 Jul 2019