-
公开(公告)号:US20210073383A1
公开(公告)日:2021-03-11
申请号:US15751614
申请日:2015-08-12
Applicant: ENTIT SOFTWARE LLC
Inventor: Michael Jason Schmitt , Guy Wiener , Emil Kiner , Tomer Priel
Abstract: A technique includes receiving data representing an output of a security scan of an application and an audit of the security scan by a human auditor. The output represents a security issue with the application, which is identified by the security scan, and the audit represents an analysis of the security issue by the human auditor. The technique includes training a security scan classifier to learn a classification preference of the human auditor. Training the security scan classifier includes, processing the data in a processor-based machine to, based at least in part on the output of the security scan and the analysis of the security scan by the human auditor, learn the classification preference of the human auditor to the issue to build a classification model for the issue.
-
公开(公告)号:US10915383B2
公开(公告)日:2021-02-09
申请号:US15327599
申请日:2014-07-31
Applicant: ENTIT SOFTWARE LLC
Inventor: Rotem Steuer , Alon Kolet , Sergey Pastukhov , Dmitriy Danilov , Yuriy Tsurkan
Abstract: A virtual desktop infrastructure (VDI) server is to receive a request from a client device to access an application on an application server, establish a session between the VDI server and the application server to allow the client device to access the application on the application server via the VDI server, obtain a process identifier of the session, obtain identity information of a user of the client device associated with a communication of the session based on the process identifier, and provide identity details of the user of the client device associated with the communication of the session to a monitor device that monitors access to the application on the application server.
-
公开(公告)号:US10896259B2
公开(公告)日:2021-01-19
申请号:US15763253
申请日:2015-09-28
Applicant: ENTIT Software LLC
Inventor: Tomas Sander , Brian Frederik Hosea Che Hein , Nadav Cohen , Ted Ross
Abstract: In one example in accordance with the present disclosure, a method for threat score determination includes detecting a change in malicious activity for a security object. The method also includes identifying an indicator that provides contextual information for the security object and determining a linked resource that is associated with a database record of the security object. The method also includes determining a first threat score associated with the security object and determining a relationship between the linked resource and the security object. The method also includes determining a second threat score associated with the linked resource based on the indicator, the threat score of the linked object and the relationship between the linked resource and the security object.
-
公开(公告)号:US10437910B2
公开(公告)日:2019-10-08
申请号:US15564910
申请日:2015-04-29
Applicant: ENTIT Software LLC
Inventor: Liron Tzabari , Elad Benedict , Doron Levi
Abstract: Examples disclosed herein relate, among other things, to determining a trend correlation. In one aspect, a method is disclosed. The method may include, for example, receiving a first data set associated with a first parameter of an electronic device and a second data set associated with a second parameter of the electronic device. The method may also include generating a first trend set based on the first data set, and generating a second trend set based on the second data set. The method may further include detecting, based on the first trend set and the second trend set, a trend correlation between the first parameter of the electronic device and the second parameter of the electronic device, and providing for display correlation information describing the trend correlation.
-
公开(公告)号:US10430424B2
公开(公告)日:2019-10-01
申请号:US15033174
申请日:2013-10-30
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Fernando Vizer , Eran Samuni , Alon Sade
Abstract: A non-transitory, computer readable storage device includes software that, while being executed by a processor, causes the processor to choose, based on user activity, a plurality of candidate parameters to be monitored from a plurality of event messages. Further, the processor executes the software to estimate a level of similarity between the chosen plurality of candidate parameters by computing a similarity score for at least two of the chosen candidate parameters. Still further, the processor executes the software to determine a plurality of parameters from the chosen candidate parameters if the similarity score for the plurality of parameters is greater than a threshold.
-
公开(公告)号:US10430316B2
公开(公告)日:2019-10-01
申请号:US15573967
申请日:2015-05-21
Applicant: ENTIT Software LLC
Inventor: Hana Giat , Michael Seldin
Abstract: Examples herein involve designating a first dimension of a thread visualization based on timing of a duration of a user action, the user action corresponding to a user interaction with an application; designating a second dimension of the thread visualization based on a number of threads of the application utilized for running tasks in response to the user action, the second dimension comprising a number of parallel timelines corresponding to the number of threads; determining locations for representations of the tasks within the appropriate parallel timelines of the thread visualization based on the timing of the tasks and the threads running the tasks; and rendering the thread visualization on a display.
-
公开(公告)号:US10423624B2
公开(公告)日:2019-09-24
申请号:US15511940
申请日:2014-09-23
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Yonatan Ben Simhon , Ira Cohen , Eran Samuni
IPC: G06F11/07 , G06F16/2455 , G06F17/27
Abstract: Method and systems for analyzing event log elements are provided. In one example, a method includes receiving an event log element in a computer. A similarity index is calculated between the event log element and a text element. A threshold of similarity is calculated. The similarity index is compared to the threshold. If the similarity index is greater than the threshold, the event log element is grouped into a cluster with the text element to create a file of cluster assignments.
-
公开(公告)号:US10410269B2
公开(公告)日:2019-09-10
申请号:US14898548
申请日:2013-07-31
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Shubhada Palasamudram , Dilip Dalton , Steve Berube , Lakshminarayana Mandaleeka , Serdar Badem
IPC: G06Q30/00 , G06Q30/06 , G06F16/951 , G06F16/242 , G06Q10/00 , H04L12/58 , H04L29/08
Abstract: Providing subscriber options can include receiving a message including a selected service design option from a subscriber device, identifying the subscriber based on the message, fetching data pertinent to the selected service design option and the identified subscriber, and providing a set of service design options, dependent to the selected service design option, to the subscriber device based on the data.
-
公开(公告)号:US10404551B2
公开(公告)日:2019-09-03
申请号:US14373780
申请日:2012-04-30
Applicant: Jeffery Darrel Thomas , Jeffrey Lee Weiss
Inventor: Jeffery Darrel Thomas , Jeffrey Lee Weiss
IPC: G06F15/173 , H04L12/24 , G06F9/455 , H04L12/26
Abstract: Automating servicing of event managements within a cloud network. Such automation includes: identifying and receiving controlled instructions from clients and monitoring and aggregating data related to employing the resources, for correlation of data to pattern of events. Events can then be mapped to standard prescriptive actions and/or remedial measure—or alternatively the clients are enabled to determine the actions required.
-
公开(公告)号:US20190266140A1
公开(公告)日:2019-08-29
申请号:US15564272
申请日:2015-04-30
Applicant: ENTIT Software LLC
Inventor: Eli Revach , Mordechai Lehrer , Amos Nesher , Elad Levi
IPC: G06F16/22 , G06F16/245 , G06F16/242
Abstract: A database having multiple data columns is disclosed. Whether metadata for the multiple data columns resides in multiple different metadata columns may be determined. If so, the metadata may be consolidated into a single consolidated metadata column.
-
-
-
-
-
-
-
-
-