CLOUD-NATIVE EXTENSIBILITY PROVIDED TO SECURITY ANALYTICS

    公开(公告)号:US20200137091A1

    公开(公告)日:2020-04-30

    申请号:US16176499

    申请日:2018-10-31

    Abstract: Techniques facilitating cloud-native extensibility provided to security analytics are provided. A system comprises a memory that stores, and a processor that executes, computer executable components. The computer executable components can comprise a security component that implements an instance of an encapsulated security application. The encapsulated security application can be embedded into a container image as an extended analytic script. The computer executable components can also comprise an execution component that applies the instance of the encapsulated security application to a simulated system state of a computing device during subsequent scanning operations that result in respective analytics for scanning operations of the subsequent scanning operations.

    COMPLIANCE AWARE SERVICE REGISTRY AND LOAD BALANCING

    公开(公告)号:US20200092358A1

    公开(公告)日:2020-03-19

    申请号:US16689322

    申请日:2019-11-20

    Abstract: Techniques facilitating compliance aware service registry and load balancing are provided. A system can comprise a memory that stores computer executable components and a processor that executes computer executable components stored in the memory. The computer executable components can comprise an extraction component that removes a service from a load balancer ring based on a first determination by a verification component that a compliance state of the service is a non-compliant state. Further, the computer executable components can comprise an insertion component that adds the service to the load balancer ring based on a second determination by the verification component that, after a defined amount of time, the compliance state of the service is a compliant state.

    Remote data protection in a networked storage computing environment

    公开(公告)号:US10229125B2

    公开(公告)日:2019-03-12

    申请号:US15352010

    申请日:2016-11-15

    Abstract: Protecting and restoring data within a networked (e.g. cloud) storage computing environment through asynchronous replication and remote backup of data and its associated metadata. Data backup and recovery functionality provides data backups by detecting incremental updates to the data and its associated metadata at specific points in time determined by policies. The policies are configurable based on user requirements. Multiple copies of the data backups can be made and stored in separate compressed files at backup/disaster recovery locations. The backups of data and its associated metadata, which includes file system configuration information can be used to restore the state of a computer file system to that of a given point-in-time. Accordingly, a data protection approach is disclosed for protecting data at both the file system level and application level.

    COOPERATIVE DECENTRALIZED CACHING
    24.
    发明申请
    COOPERATIVE DECENTRALIZED CACHING 有权
    合作分散式高速缓存

    公开(公告)号:US20150358421A1

    公开(公告)日:2015-12-10

    申请号:US14300893

    申请日:2014-06-10

    Abstract: Methods and arrangements for providing cooperative caching in a distributed system. A cache and a communicator are provided at a node in a distributed system. The communicator is used to communicate with at least one other node with respect to related data stored at the node and the at least one other node, via: communicating a status of the cache at the node and receiving notification of a status of at least one cache of at least one other node. There is updated, upon communicating with the at least one other node, at least one of: a cache replacement policy at the node and a cache pre-fetching policy at the node. Other variants and embodiments are broadly contemplated herein.

    Abstract translation: 在分布式系统中提供协同缓存的方法和安排。 在分布式系统中的节点处提供缓存和通信器。 所述通信器用于通过以下方式与存储在所述节点和所述至少一个其他节点处的相关数据的至少一个其他节点通信:在所述节点处传达高速缓存的状态并接收至少一个状态的通知 至少一个其他节点的缓存。 在与所述至少一个其他节点通信时,更新所述节点处的高速缓存替换策略和所述节点处的高速缓存预取策略中的至少一个。 本文中广泛考虑了其他变型和实施例。

    REMOTE DATA PROTECTION IN A NETWORKED STORAGE COMPUTING ENVIRONMENT
    25.
    发明申请
    REMOTE DATA PROTECTION IN A NETWORKED STORAGE COMPUTING ENVIRONMENT 有权
    网络存储计算环境中的远程数据保护

    公开(公告)号:US20140149791A1

    公开(公告)日:2014-05-29

    申请号:US14167345

    申请日:2014-01-29

    Abstract: Embodiments of the present invention provide an approach for protecting and restoring data within a networked (e.g. cloud) storage computing environment through asynchronous replication and remote backup of data and its associated metadata. Under embodiments of the present invention, data backup and recovery functionality provides data backups by detecting incremental updates to the data and its associated metadata at specific points in time determined by policies. The policies are configurable based on user requirements. Multiple copies of the data backups can be made and stored in separate compressed files at backup/disaster recovery locations. The backups of data and its associated metadata, which includes file system configuration information can be used to restore the state of a computer file system to that of a given point-in-time. Accordingly, a data protection approach is disclosed for protecting data at both the file system level and application level.

    Abstract translation: 本发明的实施例提供了一种用于通过数据及其相关联的元数据的异步复制和远程备份来保护和恢复联网(例如云)存储计算环境内的数据的方法。 在本发明的实施例中,数据备份和恢复功能通过在由策略确定的特定时间点检测数据及其相关联的元数据的增量更新来提供数据备份。 这些策略可以根据用户需求进行配置。 数据备份的多个副本可以在备份/灾难恢复位置存储在单独的压缩文件中。 数据及其关联元数据的备份(包括文件系统配置信息)可用于将计算机文件系统的状态恢复到给定时间点的状态。 因此,公开了一种用于在文件系统级和应用级保护数据的数据保护方法。

    Compliance enforcement via service discovery analytics

    公开(公告)号:US11829766B2

    公开(公告)日:2023-11-28

    申请号:US17307482

    申请日:2021-05-04

    CPC classification number: G06F9/3838 G06F8/30 G06F8/75 G06F11/3604

    Abstract: Systems and techniques that facilitate compliance enforcement via service discovery analytics are provided. In various embodiments, a system can comprise a receiver component that can access one or more declarative deployment manifests associated with a computing application. In various instances, the system can comprise a dependency component that can build a dependency topology based on the one or more declarative deployment manifests. In various cases, the dependency topology can indicate dependencies among one or more computing objects that are declared by the one or more declarative deployment manifests. In various aspects, the system can comprise a compliance component that can determine, based on the dependency topology, whether the computing application satisfies one or more compliance standards.

Patent Agency Ranking