摘要:
A system, method, and computer-readable medium for performing an analytics workflow generation operation. The analytics workflow generation operation enables generation of targeted analytics workflows (e.g., via a data scientist (i.e., an expert in data modeling)) that are then published to a workflow storage repository so that the targeted analytics workflows can be used by domain experts and self-service business end-users to solve specific classes of analytics operations.
摘要:
In one embodiment, a method is performed by a computer system. The method includes receiving a request from a user to access particular content. The method further includes determining a trust measure of the user, wherein the trust measure is based, at least in part, on an analysis of logged user-initiated communication events of the user on a plurality of communications platforms. In addition, the method includes accessing a self-service access policy applicable to the particular content. Further, the method includes ascertaining, from the self-service access policy, a trust threshold applicable to the particular content. Moreover, the method includes, responsive to a determination that the trust measure fails to satisfy the trust threshold, automatically denying access by the user to the particular content.
摘要:
In one embodiment, a method is performed by a computer system comprising computer hardware. The method includes monitoring a file system for risk-assessment events. The method further includes, responsive to a real-time determination of at least one risk-assessment event, determining a content-independent risk of exposure for a file-system object associated with the risk-assessment event. The determining of the content-independent risk of exposure is based, at least in part, on a depth of the file-system object in the file system and a set of users who can access the file-system object.
摘要:
A management system sends a first request for first data associated with multiple network entities. If the first request times out, the first request is split to create multiple smaller requests and the multiple smaller requests sent, requesting data from a subset of the multiple network entities. Based on responses to the multiple smaller requests, the management system identifies a particular network entity that caused the first request to time out and adds the particular network entity to a set of problematic entities. The management system sends a second request that requests second data from a portion of the multiple network entities that excludes the particular network entity. The multiple network entities may include one or more of a virtual machine (VM), a host node (to host VMs), a storage device, a network link, another type of network entity, or any combination thereof.
摘要:
A privileged account management system can maintain a database that defines a normal amount of data that should be transferred over a remote session and/or a normal rate at which the data should be transferred when performing a particular task. Using a reason code used to obtain a remote session and possibly a combination of various different characteristics of the remote session, the system can access the database to identify the appropriate normal amount and/or normal rate. The system can then compare the amount and/or rate of data transferred over the remote session to the appropriate normal amount and/or normal rate to detect when an abnormal amount and/or abnormal rate is being transferred. In cases where abnormal behavior is detected, the system can determine that the remote session is likely being used in an improper manner, and can take action to mitigate any potential harm to the server.
摘要:
A privileged account management system can detect when credentials used to access one or more servers have been shared or otherwise compromised. This detection can occur through analysis of simultaneous actions that are performed via multiple sessions associated with the same administrator. When two or more sessions associated with the same administrator are opened, the interactions performed over each of the sessions can be monitored to identify whether such interactions could be performed by a single administrator. If it is determined that the interactions over the multiple sessions could not reasonably be performed by a single administrator, various actions can be taken to address the possible breach to the security of the one or more servers.
摘要:
In one embodiment, a method is performed by a computer system. The method includes discovering content in a user environment. The method further includes generating one or more content fingerprints on a per-content basis. The method also includes providing information sufficient to identify the one or more content fingerprints to a central computer system. Further, the method includes receiving a user selection of particular content stored in the user environment. In addition, the method includes requesting, from the central computer system, information related to a level of exposure of the particular content across a plurality of platforms and a plurality of users. Moreover, the method includes receiving exposure information for the particular content in response to the request. Additionally, the method includes publishing the exposure information to a user associated with the user environment.
摘要:
A system and method are disclosed for classifying a message. The method includes receiving the message, identifying in the message a distinguishing property; generating a signature using the distinguishing property; and comparing the signature to a database of signatures generated by previously classified messages.
摘要:
Detecting infectious messages comprises performing an individual characteristic analysis of a message to determine whether the message is suspicious, determining whether a similar message has been noted previously in the event that the message is determined to be suspicious, classifying the message according to its individual characteristics and its similarity to the noted message in the event that a similar message has been noted previously.
摘要:
Techniques and mechanisms described herein facilitate the encryption of content using content-based encryption keys. According to various embodiments, data stream may include one or more data chunks. A client machine may apply a hash function to a data chunk to determine a fingerprint value. A cryptographic protocol shared with a remote server may be applied to the fingerprint value to determine a data chunk encryption key. The data chunk encryption key may be used to encrypt the data chunk, and the encrypted data chunk may be sent to the remote server for storage.