Abstract:
Methods, systems, and computer-readable media for transferring hosted web browser sessions between browser servers are described herein. In various embodiments, a broker service may create a browser server pool from a plurality of browser servers. The broker service may connect a client agent with a first web browser session in a first browser server in the browser server pool. The broker service, responsive to a determination that the first web browser session needs to be transferred to a second browser server in the browser server pool, may request and receive a session context from the first web browser session, launch a second web browser session in the second browser server, initialize the second web browser session with the session context from the first web browser session, transfer the client agent from the first web browser session to the second web browser session, and terminate the first web browser session.
Abstract:
Methods, systems, and computer-readable media for transferring hosted web browser sessions between browser servers are described herein. In various embodiments, a broker service may create a browser server pool from a plurality of browser servers. The broker service may connect a client agent with a first web browser session in a first browser server in the browser server pool. The broker service, responsive to a determination that the first web browser session needs to be transferred to a second browser server in the browser server pool, may request and receive a session context from the first web browser session, launch a second web browser session in the second browser server, initialize the second web browser session with the session context from the first web browser session, transfer the client agent from the first web browser session to the second web browser session, and terminate the first web browser session.
Abstract:
Methods, systems, and computer-readable media for redirecting a web browser application for secure web browsing are described herein. In various embodiments, a user web browser application executing within a secure network may request the content of a website outside of the secure network. In response to the request, an address translation service may redirect the user web browser application to a redirector service to respond to the request. In response to the request, the redirector service may request a hosted web browser application that may be able to navigate to the requested website. In further response to the request, the redirector service may send, to the user web browser application, a client agent which may display the output generated by a hosted web browser application within the user web browser application
Abstract:
A computer system is provided. The computer system includes a memory, a network interface, and at least one processor coupled to the memory and the network interface. The processor is configured to receive, via the network interface, a request for a computing session; determine a security score for the computing session; identify a virtual resource designated to support computing sessions having the security score; and establish the computing session with the virtual resource.
Abstract:
Methods, systems, and computer-readable media for creating and managing cloud servers and services using a multi-tenant multi-session catalog with machine-level isolation are described herein. In one or more embodiments, a cloud service provider may receive requests from one or more tenants for predefined numbers of servers. The cloud service provider may initialize a plurality of servers, wherein the plurality of servers is less than a sum of the totality of server requests, and create a catalog of unassigned servers of the plurality of servers. Responsive to a logon request from a user of a tenant, the cloud service provider may assign a server from the catalog of unassigned servers to the tenant, remove the server from the catalog of unassigned servers, broker the user of the tenant to connect to the server, and limit access to the server to only users of the tenant.
Abstract:
A computing system includes an enterprise server providing an application, a mobile computing device having sensor capabilities registered with the enterprise server, and a client computing device operated by a user to access the application. The user is to request a capability of the application. The enterprise server is configured to compare the requested capability of the application to the registered sensor capabilities of the mobile computing device. If the requested capability of the application can be performed by the mobile computing device, then the enterprise server is configured to provide a notification to the mobile computing device requesting permission for the mobile computing device to provide access to the sensor capability corresponding to the requested capability of the application. The mobile computing device performs the requested capability of the application after permission is granted.
Abstract:
Systems and methods for classification of log data at the source into sets of critical and non-critical data. Critical data may be indexed and processed normally, while non-critical data may be provided to and stored by the cloud-based log aggregation system without indexing, at significantly lower cost in terms of processing and storage. In the event that non-critical data is required for troubleshooting or analysis, the non-critical data may be indexed dynamically on request. Because the non-critical data is stored at the cloud-based log aggregation system, it may be quickly indexed and added to the critical data, without additional consumption of bandwidth or delays due to transmission. Dynamic selection and classification of critical and non-critical data may thus allow an enterprise to balance costs and availability of indexed data.
Abstract:
A method for identifying modified sections of a drawing region and selecting at least one modified drawing region section to transmit to a remote computer. A local computer can execute a prioritization module that can identify a first modified drawing region section and a second modified drawing region section. Each of the first and second modified drawing region section can have a corresponding priority. The prioritization module can determine whether the first priority of the first section is greater than the second priority of the second section and can select the greater priority. The local computer can then transmit the selected modified drawing region section that has the greatest priority to a remote computer that communicates with the local computer over a virtual channel.
Abstract:
Described embodiments provide systems and methods for providing data loss prevention via an embedded browser. An interprocess communication (IPC) manager may interface with an embedded browser to control the transfer of data from a first application to a second application in accordance with a policy. The IPC manager may detect a command to store data accessed on the first application via the embedded browser and store the data onto a secure container. The secure container may be dedicated to the embedded browser. The IPC manager may subsequently detect a command to retrieve data from the secure container and to replicate the data onto the second application. The IPC manager may determine a policy to apply to the data. The policy may specify whether the data from the first application is permitted to be replicated onto the second application. The IPC manager may subsequently replicate the data on the second application.
Abstract:
Described embodiments provide systems and methods for providing data loss prevention via an embedded browser. An interprocess communication (IPC) manager may interface with an embedded browser to control the transfer of data from a first application to a second application in accordance with a policy. The IPC manager may detect a command to store data accessed on the first application via the embedded browser and store the data onto a secure container. The secure container may be dedicated to the embedded browser. The IPC manager may subsequently detect a command to retrieve data from the secure container and to replicate the data onto the second application. The IPC manager may determine a policy to apply to the data. The policy may specify whether the data from the first application is permitted to be replicated onto the second application. The IPC manager may subsequently replicate the data on the second application.