-
公开(公告)号:US12010124B2
公开(公告)日:2024-06-11
申请号:US17335932
申请日:2021-06-01
申请人: Supreeth Hosur Nagesh Rao , Navindra Yadav , Ravi Sankuratri , Alok Lalit Wadhwa , Aria Rahadian , Bharathwaj Sankara Viswanathan , Brady Schulman , Matthew Finn , Ravi Shanker Prasad , Vasil Dochkov Yordanov , Yiwei Wang , Zhiwen Zhang
发明人: Supreeth Hosur Nagesh Rao , Navindra Yadav , Ravi Sankuratri , Alok Lalit Wadhwa , Aria Rahadian , Bharathwaj Sankara Viswanathan , Brady Schulman , Matthew Finn , Ravi Shanker Prasad , Vasil Dochkov Yordanov , Yiwei Wang , Zhiwen Zhang
CPC分类号: H04L63/1416 , G06F9/541 , G06F16/2379 , G06F21/577 , G06F21/604 , G06F21/6245 , H04L63/0209 , H04L63/1425 , H04L63/1466 , H04L63/20 , G06F2221/034
摘要: In one aspect, a computerized method for automatically identifying and solving for vendor data abuse in an enterprise network, includes the step of implementing a vendor detection at one or more gateways of the enterprise network. The method includes the step of mapping a set of data along with any associated data attributes of the set of data that are being shared with a vendor via the one or more gateways. The method includes the step of detecting and identifying an access anomaly with respect to the set of data associated with a vendor access. The method includes the step of implementing a specified data minimization process to the access anomaly.
-
公开(公告)号:US20220269815A1
公开(公告)日:2022-08-25
申请号:US17335932
申请日:2021-06-01
申请人: SUPREETH HOSUR NAGESH RAO , Navindra Yadav , Ravi Sankuratri , Alok Lalit Wadhwa , Aria Rahadian , Bharathwaj Sankara Viswanathan , Brady Schulman , Matthew Finn , Ravi Shanker Prasad , Vasil Dochkov Yordanov , Yiwei Wang , Zhiwen Zhang
发明人: SUPREETH HOSUR NAGESH RAO , Navindra Yadav , Ravi Sankuratri , Alok Lalit Wadhwa , Aria Rahadian , Bharathwaj Sankara Viswanathan , Brady Schulman , Matthew Finn , Ravi Shanker Prasad , Vasil Dochkov Yordanov , Yiwei Wang , Zhiwen Zhang
摘要: In one aspect, a computerized method for automatically identifying and solving for vendor data abuse in an enterprise network, includes the step of implementing a vendor detection at one or more gateways of the enterprise network. The method includes the step of mapping a set of data along with any associated data attributes of the set of data that are being shared with a vendor via the one or more gateways. The method includes the step of detecting and identifying an access anomaly with respect to the set of data associated with a vendor access. The method includes the step of implementing a specified data minimization process to the access anomaly.
-