-
1.
公开(公告)号:US12192243B2
公开(公告)日:2025-01-07
申请号:US17990511
申请日:2022-11-18
Applicant: Kyndryl, Inc.
Inventor: Robson Pereira , Leandro Cesar Fida , Edson Jose Montanhini , Sergio Varga , Daniele Jaqueline Marchiori
Abstract: A computer-implemented method according to one embodiment includes receiving a request to perform a security policy implementation analysis for a first deployment associated with a first client in an IT environment. IT information associated with the first deployment is collected. The method further includes applying trained machine learning models to analyze the IT information of the first client to compute a security policy for the first deployment. The security policy is computed based on a calculated uncertainty of effects that applying the security policy to the first deployment is capable of causing, and a predicted amount of resources of the first deployment that applying the security policy to the first deployment would consume. An indication of the security policy is output for display in a dashboard on a display of a user device of the first client.
-
2.
公开(公告)号:US20240171613A1
公开(公告)日:2024-05-23
申请号:US17990511
申请日:2022-11-18
Applicant: Kyndryl, Inc.
Inventor: Robson Pereira , Leandro Cesar Fida , Edson Jose Montanhini , Sergio Varga , Daniele Jaqueline Marchiori
CPC classification number: H04L63/20 , G06N20/00 , H04L63/105
Abstract: A computer-implemented method according to one embodiment includes receiving a request to perform a security policy implementation analysis for a first deployment associated with a first client in an IT environment. IT information associated with the first deployment is collected. The method further includes applying trained machine learning models to analyze the IT information of the first client to compute a security policy for the first deployment. The security policy is computed based on a calculated uncertainty of effects that applying the security policy to the first deployment is capable of causing, and a predicted amount of resources of the first deployment that applying the security policy to the first deployment would consume. An indication of the security policy is output for display in a dashboard on a display of a user device of the first client.
-