摘要:
Systems and methods of applying security measures to data services are disclosed. In one embodiment, a processor determines when more than one data service is used by or is accessible to a subscriber device and applies a security measure to at least one data service.
摘要:
Methods and systems for problem detection related to received Internet data, video data, and voice data are disclosed. A method may include monitoring, at a set top box device, Internet data to detect a first problem related to the Internet data. The method may further include monitoring, at the set top box device, video data to detect a second problem related to the video data. The method may include automatically taking a first action upon detecting the first problem and automatically taking a second action upon detecting the second problem.
摘要:
A method for problem detection related to received data includes monitoring data to detect a first problem and a second problem related to the data. The first problem may be related to a first data type and the second problem may be related to a second data type. The first data type and the second data type may be distinct from each other. The method includes determining a first remedial action in response to detecting the first problem and a second remedial action in response to detecting the second problem. The method includes determining a priority order for the first remedial action and the second remedial action.
摘要:
Methods and systems for problem detection related to received Internet data, video data, and voice data are disclosed. A method may include monitoring, at a set top box device, Internet data to detect a first problem related to the Internet data. The method may further include monitoring, at the set top box device, video data to detect a second problem related to the video data. The method may include automatically taking a first action upon detecting the first problem and automatically taking a second action upon detecting the second problem.
摘要:
A method for problem detection related to received data includes monitoring data to detect a first problem and a second problem related to the data. The first problem may be related to a first data type and the second problem may be related to a second data type. The first data type and the second data type may be distinct from each other. The method includes determining a first remedial action in response to detecting the first problem and a second remedial action in response to detecting the second problem. The method includes determining a priority order for the first remedial action and the second remedial action.
摘要:
Systems and methods of applying security measures to data services are disclosed. In one embodiment, a processor determines when more than one data service is used by or is accessible to a subscriber device and applies a security measure to at least one data service.
摘要:
A content delivery system includes an upload module, a content delivery module, and a monitoring module. The upload module is configured to receive content from a content provider, detect content containing malicious software or proprietary information, and provide information about the content to a monitoring module. The content delivery module is configured to detect content containing malicious software or unauthorized changes, detect operational changes to the content delivery module, provide information about the content and the operational changes to the monitoring module, receive a request for the content from a client system, and provide the content to the client system. The monitoring module is configured to monitor a network for potentially malicious traffic, receive information from the content delivery module and the upload module, correlate the information and the potentially malicious traffic to identify a security event, and trigger a response to the security event.
摘要:
A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, and managing communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy. The method also includes managing communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy.
摘要:
A content delivery system includes an upload module, a content delivery module, and a monitoring module. The upload module is configured to receive content from a content provider, detect content containing malicious software or proprietary information, and provide information about the content to a monitoring module. The content delivery module is configured to detect content containing malicious software or unauthorized changes, detect operational changes to the content delivery module, provide information about the content and the operational changes to the monitoring module, receive a request for the content from a client system, and provide the content to the client system. The monitoring module is configured to monitor a network for potentially malicious traffic, receive information from the content delivery module and the upload module, correlate the information and the potentially malicious traffic to identify a security event, and trigger a response to the security event.
摘要:
A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, and managing communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy. The method also includes managing communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy.