Security policy selection based on calculated uncertainty and predicted resource consumption

    公开(公告)号:US12192243B2

    公开(公告)日:2025-01-07

    申请号:US17990511

    申请日:2022-11-18

    Applicant: Kyndryl, Inc.

    Abstract: A computer-implemented method according to one embodiment includes receiving a request to perform a security policy implementation analysis for a first deployment associated with a first client in an IT environment. IT information associated with the first deployment is collected. The method further includes applying trained machine learning models to analyze the IT information of the first client to compute a security policy for the first deployment. The security policy is computed based on a calculated uncertainty of effects that applying the security policy to the first deployment is capable of causing, and a predicted amount of resources of the first deployment that applying the security policy to the first deployment would consume. An indication of the security policy is output for display in a dashboard on a display of a user device of the first client.

    SECURITY POLICY SELECTION BASED ON CALCULATED UNCERTAINTY AND PREDICTED RESOURCE CONSUMPTION

    公开(公告)号:US20240171613A1

    公开(公告)日:2024-05-23

    申请号:US17990511

    申请日:2022-11-18

    Applicant: Kyndryl, Inc.

    CPC classification number: H04L63/20 G06N20/00 H04L63/105

    Abstract: A computer-implemented method according to one embodiment includes receiving a request to perform a security policy implementation analysis for a first deployment associated with a first client in an IT environment. IT information associated with the first deployment is collected. The method further includes applying trained machine learning models to analyze the IT information of the first client to compute a security policy for the first deployment. The security policy is computed based on a calculated uncertainty of effects that applying the security policy to the first deployment is capable of causing, and a predicted amount of resources of the first deployment that applying the security policy to the first deployment would consume. An indication of the security policy is output for display in a dashboard on a display of a user device of the first client.

Patent Agency Ranking