-
公开(公告)号:US20220116216A1
公开(公告)日:2022-04-14
申请号:US17069436
申请日:2020-10-13
Applicant: EMC IP Holding Company LLC
Inventor: Kfir Wolfson , Jehuda Shemer , Stav Sapir , Naor Radami
Abstract: A secure approval chain for runtime protection is disclosed. As an application or pod is developed in a pipeline, an approval engine ensures that the pod is approved by all approvers. The approval engine generates a deployment token that is added to the configuration data of the pod and that can be used at deployment to perform various security operations including pod verification, runtime environment control and enforcement, and pod or application verification.
-
公开(公告)号:US11275658B2
公开(公告)日:2022-03-15
申请号:US16802795
申请日:2020-02-27
Applicant: EMC IP Holding Company LLC
Inventor: Jehuda Shemer , Saar Cohen , Kfir Wolfson , Itay Azaria
Abstract: A data protection system configured to replicate data may generate rescue packages that allow the system to recover when communication between a splitter or source of the production data being replicated and an appliance that stores the replicated data is disrupted. The rescue package is stored on a datastore and is then retrieved by the data protection system or another splitter. After processing the rescue package, which may contain IOs that the data protection is unaware of due to the communication disruption, replication may resume normally.
-
公开(公告)号:US20210406133A1
公开(公告)日:2021-12-30
申请号:US16910393
申请日:2020-06-24
Applicant: EMC IP Holding Company LLC
Inventor: Jehuda Shemer , Kfir Wolfson , Tomer Kushnir , Jawad Said
Abstract: On-the-fly point-in-time recovery operations are disclosed. During a recovery operation, the PiT being restored can be changed on-the-fly or during the existing recovery operation without restarting the recovery process from the beginning. In one example, this improves recovery time operation (RTO) and prevents aspects of the recovery operation to be avoided when changing to a different PiT.
-
公开(公告)号:US20210365336A1
公开(公告)日:2021-11-25
申请号:US16878297
申请日:2020-05-19
Applicant: EMC IP Holding Company LLC
Inventor: Bing Liu , Jehuda Shemer , Kfir Wolfson , Jawad Said
Abstract: Data protection operations including replication operations are disclosed. Virtual machines, applications, and/or application data are replicated according to at least one strategy. The replication strategy can improve performance of the recovery operation.
-
公开(公告)号:US20210349776A1
公开(公告)日:2021-11-11
申请号:US17382065
申请日:2021-07-21
Applicant: EMC IP Holding Company LLC
Inventor: Kfir Wolfson , Jehuda Shemer , Assaf Natanzon
Abstract: One example method includes performing a machine learning process that involves performing an assessment of a state of a computing system, and the assessment includes analyzing information generated by an IoT edge sensor in response to a sensed physical condition in the computing system, and identifying an entity in the computing system potentially impacted by an event associated with the physical condition. The example method further includes identifying a preemptive recovery action and associating the preemptive recovery action with an entity, and the preemptive recovery action, when performed, reduces or eliminates an impact of the event on the entity, determining a cost associated with implementation of the preemptive recovery action, evaluating the cost associated with the preemptive recovery actions and identifying the preemptive recovery action with the lowest associated cost, implementing the preemptive recovery action with the lowest associated cost, and repeating part of the machine learning process.
-
公开(公告)号:US20210271503A1
公开(公告)日:2021-09-02
申请号:US16803626
申请日:2020-02-27
Applicant: EMC IP Holding Company LLC
Inventor: Kfir Wolfson , ltay Azaria , Jehuda Shemer , Saar Cohen
Abstract: One example method includes intercepting an IO issued by an application of a VM, the IO including IO data and IO metadata, storing the IO data in an IO buffer, writing the IO metadata and a pointer, but not the IO data, to a splitter journal in memory, wherein the pointer points to the IO data in the IO buffer, forwarding the IO to storage, and asynchronous with operations occurring along an IO path between the application and storage, evacuating the splitter journal by sending the IO data and the IO metadata from the splitter journal to a replication site.
-
公开(公告)号:US10929389B2
公开(公告)日:2021-02-23
申请号:US16170229
申请日:2018-10-25
Applicant: EMC IP Holding Company LLC
Inventor: Kfir Wolfson , Jehuda Shemer , Assaf Natanzon
IPC: G06F16/23 , G06F16/901
Abstract: Data provenance techniques are provided using distributed ledgers. An exemplary method comprises obtaining an indication of a data operation that operates on a data item, wherein the data operation comprises an operation type; creating an operation transaction in a first data ledger for the data operation, wherein the operation transaction comprises an identifier of the operation type, an identifier of an operator entity that performs the data operation; an identifier of the data item, and a timestamp of the data operation; and maintaining a provenance graph comprising a provenance graph transaction for a plurality of data operations in the first data ledger and/or a second data ledger, wherein a given provenance graph transaction comprises an identifier of source data items used to create the data item associated with the given provenance graph transaction and sources of the source data items, wherein the first data ledger and/or the second data ledger are used to determine an origin and/or recipients of one or more data items.
-
公开(公告)号:US10715554B2
公开(公告)日:2020-07-14
申请号:US16143250
申请日:2018-09-26
Applicant: EMC IP Holding Company LLC
Inventor: Oron Golan , Kfir Wolfson , Amos Zamir , Aviram Fireberger , Udi Shemer
IPC: H04L29/06
Abstract: Existing policies enforced at or above an operating system (OS) layer of a device are obtained. Translation rules are stored that include data structure descriptions of conditions, corresponding actions performed when the conditions are satisfied, and attributes specified in the existing policies, and attributes of one or more layers below the OS layer that are relevant to policy enforcement in the one or more layers below the OS layer. The existing policies are parsed using the data structure descriptions to identify the conditions, corresponding actions, and attributes specified in the existing policies. New policies are generated that are consistent with the existing policies. The new policies include the identified attributes specified in the existing policies and the attributes relevant to policy enforcement in the one or more layers below the OS layer. The new policies are enforced in the one or more layers below the OS layer.
-
19.
公开(公告)号:US20200028863A1
公开(公告)日:2020-01-23
申请号:US16039503
申请日:2018-07-19
Applicant: EMC IP Holding Company LLC
Inventor: Kfir Wolfson , Jehuda Shemer , Aviram Fireberger , Amos Zamir , Oron Golan
Abstract: A tracing mechanism is provided for analyzing session-based attacks. An exemplary method comprises: detecting a potential attack associated with a session from a potential attacker based on predefined anomaly detection criteria; adding a tracing flag identifier to a response packet; sending a notification to a cloud provider of the potential attack, wherein the notification comprises the tracing flag identifier; and sending the response packet to the potential attacker, wherein, in response to receiving the response packet with the tracing flag identifier, the cloud provider: determines a source of the potential attack based on a destination of the response packet; forwards the response packet to the potential attacker based on the destination of the response packet; and monitors the determined source to evaluate the potential attack. The response packet is optionally delayed by a predefined time duration and/or until the cloud provider has acknowledged receipt of the notification.
-
公开(公告)号:US20200019470A1
公开(公告)日:2020-01-16
申请号:US16035221
申请日:2018-07-13
Applicant: EMC IP Holding Company LLC
Inventor: Kfir Wolfson , Assaf Natanzon , Jehuda Shemer
IPC: G06F11/14
Abstract: A data protection system configured to backup a time series database is provided. The data protection system may be integrated with or have access to consolidation policies of the time series database. The backup policy and backup retention policy are set by monitoring the consolidation policy and adjusting the backup policy to ensure that the data in the time series database is protected prior to being downscaled, discarded or otherwise consolidated.
-
-
-
-
-
-
-
-
-