Abstract:
An information security application responds to a request by generating a context vector and performing a lookup in a configuration structure to identify a configurable action to be taken. The context vector includes current values of environment variables. The configuration structure stores configuration objects having an environment field storing configured values of the environment variables to specify a context for use of an action value in an action field. A wildcard value indicates that the context for use is independent of a given environment variable. The lookup results in a set of configuration objects whose configured values of the environment variables either are wildcards or match respective values in the context vector. The set of action values is resolved to a resolved action value specifying the configurable action, and a response is returned to the client computer based on a result of the configurable action.
Abstract:
In one example, a method includes generating an enhanced copy, which includes application data generated from using an application, the application, a configuration of the application and runtime settings to run the application. The method also includes restoring at least one of the application, the configuration of the application and the runtime settings using the enhanced copy.
Abstract:
Techniques of detecting malicious events involve generating a relational graph of event data describing events that occur within a specified, limited time window. Along these lines, a malicious event detection computer receives event data describing interactions between entities such as users, devices, and network domains from various servers that occur within a specified time window. In response, the malicious event detection computer generates a relational graph that has graph structures (e.g., nodes and edges) representing these interactions. Analysis of patterns within the resulting relational graph indicates whether there is a malicious event occurring.
Abstract:
In one aspect, a method includes migrating a database object from a source database to a target database, updating a storage of the location of the DB object to be the target database, directly accessing one of the target database and the source database during the migrating and executing, during the migrating, a database command by retrieving the DB object from the other one of the target database and the source database.
Abstract:
Disclosed are techniques for use in authentication. In one embodiment, the techniques comprise a method. The method comprises the step of receiving a request comprising a plurality of attributes. The method also comprises determining whether to grant authentication or to perform an assessment of at least some of the attributes. The said determination is dependent on whether one of the attributes corresponds with a predictor.
Abstract:
A computer implemented method, system, and computer program product comprising intercepting an interaction with a data storage capability at the abstraction layer enabled to intercept data interactions for different types of data storage capabilities; wherein the interaction changes data on the data storage capability; sending a copy of the interaction to a replication data storage capability; and sending the interaction to the data storage capability.
Abstract:
According to one embodiment, a request is received for estimating migrating a first dataset from a first cloud system to a second cloud system. A migration cost estimation module determines a network bandwidth required to migrate the first dataset from the first cloud system to the second cloud system, determines a duplicated data time period during migration that the first dataset has to be maintained by both the first cloud system and the second cloud system for service continuity, and determines a total cost of migrating the first dataset from the first cloud system to the second cloud system based on the required network bandwidth and the duplicated data time period. It is then determined whether to migrate the first dataset from the first cloud system to the second cloud system based on the total cost.
Abstract:
In general, the invention relates to a method and system for migrating tables in databases. The method may include calculating a first plurality of migration factors for a first set of tables in a source database using a plurality of pre-calculated factors and a first plurality of dynamically-calculated factor, where each of the first plurality of migration factors is associated with one of the first set of tables. The method may further include selecting a first table from the first set of tables to migrate based on the first plurality of migration factors; and migrating the first table to a target database.
Abstract:
Methods, apparatus and articles of manufacture for modifying queries and rules for profile fetching and risk calculation are provided herein. A method includes comparing at least one aspect of a query submitted to access a data store to rule sets associated with the data store to determine a potential access path within the data store for responding to the query, comparing information pertaining to an entity identified via the query to risk information pertaining to entities to determine a level of risk associated with the entity identified via the query, generating a modified version of the query based on information derived from the potential access path within the data store for responding to the query, and calculating a risk score associated with the modified version of the query based on the aspect of the query and the level of risk associated with the entity identified via the query.