TECHNIQUES FOR DISCOVERING AND MANAGING SECURITY OF APPLICATIONS

Techniques for discovery and management of applications in a computing environment of an organization are disclosed. A security management system discovers use of applications within a computing environment to manage access to applications for minimizing security threats and risks in a computing env...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: PERERA, Sumedha, Nalin, BISWAS, Kamalendu, KIRTI, Ganesh, SIMU, Adina, Florina
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator PERERA, Sumedha, Nalin
BISWAS, Kamalendu
KIRTI, Ganesh
SIMU, Adina, Florina
description Techniques for discovery and management of applications in a computing environment of an organization are disclosed. A security management system discovers use of applications within a computing environment to manage access to applications for minimizing security threats and risks in a computing environment of the organization. The security management system can obtain network data about network traffic to identify unique applications. The security management system performs analysis and correlation, including using one or more data sources, to determine information about an application. The system computes a measure of security for an application ("an application risk score") and a user ("a user risk score"). The score is analyzed to determine a threat of security posed by the application based on use of the application. The security system performs one or more instructions to configure access permitted by an application, whether access is denied or restricted.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP3420701B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP3420701B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP3420701B13</originalsourceid><addsrcrecordid>eNrjZHAIcXX28PMMDHUNVnDzD1Jw8Qx29g9zDfL0c1dw9HNR8HX0c3QHcYJdnUODPEMiFfzdFBwDAnw8nR1DPP39gnkYWNMSc4pTeaE0N4OCm2uIs4duakF-fGpxQWJyal5qSbxrgLGJkYG5gaGToTERSgBqCipZ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>TECHNIQUES FOR DISCOVERING AND MANAGING SECURITY OF APPLICATIONS</title><source>esp@cenet</source><creator>PERERA, Sumedha, Nalin ; BISWAS, Kamalendu ; KIRTI, Ganesh ; SIMU, Adina, Florina</creator><creatorcontrib>PERERA, Sumedha, Nalin ; BISWAS, Kamalendu ; KIRTI, Ganesh ; SIMU, Adina, Florina</creatorcontrib><description>Techniques for discovery and management of applications in a computing environment of an organization are disclosed. A security management system discovers use of applications within a computing environment to manage access to applications for minimizing security threats and risks in a computing environment of the organization. The security management system can obtain network data about network traffic to identify unique applications. The security management system performs analysis and correlation, including using one or more data sources, to determine information about an application. The system computes a measure of security for an application ("an application risk score") and a user ("a user risk score"). The score is analyzed to determine a threat of security posed by the application based on use of the application. The security system performs one or more instructions to configure access permitted by an application, whether access is denied or restricted.</description><language>eng ; fre ; ger</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2021</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20210623&amp;DB=EPODOC&amp;CC=EP&amp;NR=3420701B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76419</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20210623&amp;DB=EPODOC&amp;CC=EP&amp;NR=3420701B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>PERERA, Sumedha, Nalin</creatorcontrib><creatorcontrib>BISWAS, Kamalendu</creatorcontrib><creatorcontrib>KIRTI, Ganesh</creatorcontrib><creatorcontrib>SIMU, Adina, Florina</creatorcontrib><title>TECHNIQUES FOR DISCOVERING AND MANAGING SECURITY OF APPLICATIONS</title><description>Techniques for discovery and management of applications in a computing environment of an organization are disclosed. A security management system discovers use of applications within a computing environment to manage access to applications for minimizing security threats and risks in a computing environment of the organization. The security management system can obtain network data about network traffic to identify unique applications. The security management system performs analysis and correlation, including using one or more data sources, to determine information about an application. The system computes a measure of security for an application ("an application risk score") and a user ("a user risk score"). The score is analyzed to determine a threat of security posed by the application based on use of the application. The security system performs one or more instructions to configure access permitted by an application, whether access is denied or restricted.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2021</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZHAIcXX28PMMDHUNVnDzD1Jw8Qx29g9zDfL0c1dw9HNR8HX0c3QHcYJdnUODPEMiFfzdFBwDAnw8nR1DPP39gnkYWNMSc4pTeaE0N4OCm2uIs4duakF-fGpxQWJyal5qSbxrgLGJkYG5gaGToTERSgBqCipZ</recordid><startdate>20210623</startdate><enddate>20210623</enddate><creator>PERERA, Sumedha, Nalin</creator><creator>BISWAS, Kamalendu</creator><creator>KIRTI, Ganesh</creator><creator>SIMU, Adina, Florina</creator><scope>EVB</scope></search><sort><creationdate>20210623</creationdate><title>TECHNIQUES FOR DISCOVERING AND MANAGING SECURITY OF APPLICATIONS</title><author>PERERA, Sumedha, Nalin ; BISWAS, Kamalendu ; KIRTI, Ganesh ; SIMU, Adina, Florina</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP3420701B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2021</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>PERERA, Sumedha, Nalin</creatorcontrib><creatorcontrib>BISWAS, Kamalendu</creatorcontrib><creatorcontrib>KIRTI, Ganesh</creatorcontrib><creatorcontrib>SIMU, Adina, Florina</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>PERERA, Sumedha, Nalin</au><au>BISWAS, Kamalendu</au><au>KIRTI, Ganesh</au><au>SIMU, Adina, Florina</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>TECHNIQUES FOR DISCOVERING AND MANAGING SECURITY OF APPLICATIONS</title><date>2021-06-23</date><risdate>2021</risdate><abstract>Techniques for discovery and management of applications in a computing environment of an organization are disclosed. A security management system discovers use of applications within a computing environment to manage access to applications for minimizing security threats and risks in a computing environment of the organization. The security management system can obtain network data about network traffic to identify unique applications. The security management system performs analysis and correlation, including using one or more data sources, to determine information about an application. The system computes a measure of security for an application ("an application risk score") and a user ("a user risk score"). The score is analyzed to determine a threat of security posed by the application based on use of the application. The security system performs one or more instructions to configure access permitted by an application, whether access is denied or restricted.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre ; ger
recordid cdi_epo_espacenet_EP3420701B1
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title TECHNIQUES FOR DISCOVERING AND MANAGING SECURITY OF APPLICATIONS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T22%3A01%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=PERERA,%20Sumedha,%20Nalin&rft.date=2021-06-23&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP3420701B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true