Zscaler, Inc.
Enforcing security policies on mobile devices in a hybrid architecture

Last updated:

Abstract:

Systems and methods include intercepting traffic on a mobile device based on a set of rules; determining whether a connection associated with the traffic is allowed based on a local map associated with an application; responsive to the connection being allowed or blocked based on the local map, one of forwarding the traffic associated with the connection when allowed and generating a block of the connection at the mobile device when blocked; and, responsive to the connection not having an entry in the local map, forwarding a request for the connection to a cloud-based system for processing therein. The cloud-based system is configured to allow or block the connection based on the connection not having an entry in the local map.

Status:
Application
Type:

Utility

Filling date:

7 Jul 2020

Issue date:

22 Oct 2020