摘要:
Systems and method are implemented by one or more servers associated with a cloud-based security system, for determining security risks of entities including users or groups of users associated with the cloud-based security system and optimizing remediation based thereon. The method includes maintaining logs of transactions through the cloud-based security system; obtaining a plurality of attributes from the transactions while excluding impossible comparison items from the transactions; performing empirical scoring on normalizing the plurality of attributes for ranking risky entities; identifying the risky entities based on one of the empirical scoring and analytics; and updating policies and/or monitoring in the cloud-based system based on the identifying. The cloud-based security system is multi-tenant system supporting a plurality of users, companies, and/or enterprises and the empirical scoring provides a deterministic comparison between the plurality of users, companies, and/or enterprises in the multi-tenant system.
摘要:
Systems and method are implemented by one or more servers associated with a cloud-based security system, for determining security risks of entities including users or groups of users associated with the cloud-based security system and optimizing remediation based thereon. The method includes maintaining logs of transactions through the cloud-based security system; obtaining a plurality of attributes from the transactions while excluding impossible comparison items from the transactions; performing empirical scoring on normalizing the plurality of attributes for ranking risky entities; identifying the risky entities based on one of the empirical scoring and analytics; and updating policies and/or monitoring in the cloud-based system based on the identifying. The cloud-based security system is multi-tenant system supporting a plurality of users, companies, and/or enterprises and the empirical scoring provides a deterministic comparison between the plurality of users, companies, and/or enterprises in the multi-tenant system.
摘要:
A cloud-based secure Web gateway, a cloud-based secure Web method, and a network deliver a secure Web gateway (SWG) as a cloud-based service to organizations and provide dynamic user identification and policy enforcement therein. As a cloud-based service, the SWG systems and methods provide scalability and capability of accommodating multiple organizations therein with proper isolation therebetween. There are two basic requirements for the cloud-based SWG: (i) Having some means of forwarding traffic from the organization or its users to the SWG nodes, and (ii) Being able to authenticate the organization and users for policy enforcement and access logging. The SWG systems and methods dynamically associate traffic to users regardless of the source (device, location, encryption, application type, etc.), and once traffic is tagged to a user/organization, various polices can be enforced and audit logs of user access can be maintained.
摘要:
A computer implemented method and system are provided for implementing a longevity bond management system for managing hedging of longevity of beneficiaries. The method may include issuing, through a special purpose vehicle, using computer processing components, a longevity bond having returns following a longevity index defined for a reference population of a pre-selected cohort of beneficiaries. The method may additionally include receiving from investors a payment amount for investment in the longevity bond, investing the payment amount in a collateral pool held by a custodian, and receiving cash flows from the investment in the collateral pool. The method may further include entering into a swap to exchange the cash flows from the investment for an amount equal to the difference between an actual and best-estimate longevity index amount and calculating, using computer processing components, based on the longevity index, a periodic payment to the investors based on the longevity performance of the pre-selected cohort of beneficiaries, such that the periodic payment increases when longevity exceeds expectations and decreases when longevity falls short of expectations.
摘要:
A bone screw, for drawing first and second bone fragments together, includes a shaft having a distal section and a proximal section. The distal section has a first external male screw thread and a minor diameter. The proximal section has a second external male screw thread. A major diameter of the distal section is larger than a major diameter of the proximal section. The bone screw includes a sleeve that has an internal female screw thread configured to mate with the second male screw thread. A distal portion of the sleeve has an outer diameter. The outer diameter is equal to or smaller than the minor diameter of the distal section of the shaft.
摘要:
Methods and systems for disrupting potential attacks on a wireless network through transmission of random data are disclosed. Specifically, this disclosure relates to systems and methods for disrupting the breaking of the secret key or passphrase by an adversary or rogue device for Wi-Fi networks using wired equivalent privacy (WEP) and Wi-Fi protected access (WPA).
摘要:
A technique for storing binary large objects (BLObs) in a distributed key-value storage system is disclosed. In an embodiment, the storage of BLObs involves dividing the BLObs into smaller “BLOb chunks” and storing the BLOb chunks in storage nodes of the distributed key-value storage system. A BLOb is first associated with a key, referred to as a “BLOb key,” and each subsequent BLOb chunk is associated with a different unique key, referred to as a “BLOb chunk key.” A list of the BLOb chunks keys is maintained and all of the BLOb chunks of the BLOb can be retrieved from the distributed key-value storage system using the BLOb chunks key list.
摘要:
Data access is controlled using metadata in the data being stored. As consistent with various example embodiments, data is stored on behalf of one or more of a multitude of disparate users and/or applications using the data, based upon metadata in the data itself and storage rules for the metadata. In one implementation, a rules-based storage and access system retrieves storage rules based upon metadata in received data, and executes the storage rules to select a file system in which to store the received data, from a plurality of file systems having different data retrieval characteristics such as speed, security and quality.
摘要:
A flow distribution technique associates probabilistic data structure with each processor of a multi-processor system that is used to determine whether a received packet is included in a flow assigned to the associated processor. A set of tuples of a received packet is processed by multiple hash functions to generate a set of values utilized as indices to search for hits of the probabilistic data structures. Only those flows having hashed indices that hit more than one probabilistic data structure are saved in a collision flow table. The probabilistic data structure require much less memory space than a flow table and can be designed so that the frequency of collisions is very low thereby requiring a small amount of memory for the collision flow table.
摘要:
The present disclosure relates to cloud based mobile device management (MDM) systems and methods to use the “cloud” to pervasively manage mobile devices. The cloud based MDM systems and methods provide an ability to manage mobile devices with or without MDM clients while no requiring an MDM appliance or service at the enterprise. This provides a “no hardware, no software” deployment. In an exemplary embodiment, a client-less implementation leverages the ActiveSync protocol proxied through distributed cloud nodes to enforce mobile policies. In another exemplary embodiment, a client-based implementation uses a platform specific application and associated application programming interfaces (API) to connect managed mobile devices and provide MDM features through the cloud. Advantageously, the cloud based MDM systems and methods provide reliability and resiliency, elasticity, lower cost, mobility, integration of management and security, and agility over conventional MDM based solutions.