MINIMIZING PRODUCTIVITY LOSS IN A COLLABORATIVE SHARING ENVIRONMENT

    公开(公告)号:US20200059498A1

    公开(公告)日:2020-02-20

    申请号:US16665162

    申请日:2019-10-28

    Abstract: According to one or more embodiments of the disclosure, a local network device establishes a communication session with a remote network device in the communication network, and designates at least one program from a plurality of programs executable by the local network device for access by the remote network device to yield a designated program. The local network device further generates a shared display object, and associates each designated program with the shared display object to permit display thereof. The local network device further instantiates one or more shared control objects associated with the shared display object, and facilitate access to each designated program for the remote network device using at least one of the one or more shared control objects.

    DELEGATED ACCESS CONTROL OF AN ENTERPRISE NETWORK

    公开(公告)号:US20190068552A1

    公开(公告)日:2019-02-28

    申请号:US16173383

    申请日:2018-10-29

    CPC classification number: H04L63/0209 H04L63/0815 H04L63/102

    Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.

    DYNAMIC CREATION OF ISOLATED SCRUBBING ENVIRONMENTS

    公开(公告)号:US20190026460A1

    公开(公告)日:2019-01-24

    申请号:US15654169

    申请日:2017-07-19

    Abstract: An application security monitors data traffic from computing devices to a remote application in a first computing environment, such as a production service chain. The application security monitor detects an anomaly in the data traffic from a computing device. Based on the anomaly, the remote application is substantially reproduced in a second computing environment, such as a scrubbing environment. The application security monitor redirects the anomalous data to the remote application in the second computing environment. The application security monitor determines whether the data traffic from the first computing device corresponds to malicious activity or legitimate activity by the computing device. Responsive to a determination that the data traffic from the first computing device corresponds to legitimate activity, the application security monitor applies to the first computing environment any changes in the second computing environment caused by the redirected traffic from the computing device.

    GRAPHICAL USER INTERFACE FOR VISUALIZING A PLURALITY OF ISSUES WITH AN INFRASTRUCTURE

    公开(公告)号:US20180143868A1

    公开(公告)日:2018-05-24

    申请号:US15358426

    申请日:2016-11-22

    CPC classification number: G06F11/0769 G06F11/0721 H04L41/069 H04L41/22

    Abstract: Disclosed are systems, methods and non-transitory computer-readable mediums for dynamically presenting and updating a directed time graph displayed in a graphical user interface. In some examples, the method can include displaying a suggested path within a graphical user interface on a computer screen, the suggested path can include outstanding issues of elements of a network. The displaying the suggested path can include determining based on one or more factors an efficient ordering of the outstanding issues and ordering the outstanding issues based on the one or more factors. The method can also include monitoring, at regular intervals, updates to the one or more outstanding issues and automatically updating the suggested path, by a processor, based on the updates to the one or more outstanding issues.

    DELEGATED ACCESS CONTROL OF AN ENTERPRISE NETWORK

    公开(公告)号:US20170149784A1

    公开(公告)日:2017-05-25

    申请号:US14950418

    申请日:2015-11-24

    CPC classification number: H04L63/0209 H04L63/0815 H04L63/102

    Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.

Patent Agency Ranking