TECHNIQUES FOR DISCOVERING AND MANAGING SECURITY OF APPLICATIONS

Techniques for discovery and management of applications in a computing environment of an organization are disclosed. A security management system discovers use of applications within a computing environment to manage access to applications for minimizing security threats and risks in a computing env...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Biswas, Kamalendu, Perera, Sumedha Nalin, Simu, Adina Florina, Kirti, Ganesh
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Biswas, Kamalendu
Perera, Sumedha Nalin
Simu, Adina Florina
Kirti, Ganesh
description Techniques for discovery and management of applications in a computing environment of an organization are disclosed. A security management system discovers use of applications within a computing environment to manage access to applications for minimizing security threats and risks in a computing environment of the organization. The security management system can obtain network data about network traffic to identify unique applications. The security management system performs analysis and correlation, including using one or more data sources, to determine information about an application. The system computes a measure of security for an application ("an application risk score") and a user ("a user risk score"). The score is analyzed to determine a threat of security posed by the application based on use of the application. The security system performs one or more instructions to configure access permitted by an application, whether access is denied or restricted.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2020153855A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2020153855A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2020153855A13</originalsourceid><addsrcrecordid>eNrjZHAIcXX28PMMDHUNVnDzD1Jw8Qx29g9zDfL0c1dw9HNR8HX0c3QHcYJdnUODPEMiFfzdFBwDAnw8nR1DPP39gnkYWNMSc4pTeaE0N4Oym2uIs4duakF-fGpxQWJyal5qSXxosJGBkYGhqbGFqamjoTFxqgBpeyu_</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>TECHNIQUES FOR DISCOVERING AND MANAGING SECURITY OF APPLICATIONS</title><source>esp@cenet</source><creator>Biswas, Kamalendu ; Perera, Sumedha Nalin ; Simu, Adina Florina ; Kirti, Ganesh</creator><creatorcontrib>Biswas, Kamalendu ; Perera, Sumedha Nalin ; Simu, Adina Florina ; Kirti, Ganesh</creatorcontrib><description>Techniques for discovery and management of applications in a computing environment of an organization are disclosed. A security management system discovers use of applications within a computing environment to manage access to applications for minimizing security threats and risks in a computing environment of the organization. The security management system can obtain network data about network traffic to identify unique applications. The security management system performs analysis and correlation, including using one or more data sources, to determine information about an application. The system computes a measure of security for an application ("an application risk score") and a user ("a user risk score"). The score is analyzed to determine a threat of security posed by the application based on use of the application. The security system performs one or more instructions to configure access permitted by an application, whether access is denied or restricted.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200514&amp;DB=EPODOC&amp;CC=US&amp;NR=2020153855A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76294</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200514&amp;DB=EPODOC&amp;CC=US&amp;NR=2020153855A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Biswas, Kamalendu</creatorcontrib><creatorcontrib>Perera, Sumedha Nalin</creatorcontrib><creatorcontrib>Simu, Adina Florina</creatorcontrib><creatorcontrib>Kirti, Ganesh</creatorcontrib><title>TECHNIQUES FOR DISCOVERING AND MANAGING SECURITY OF APPLICATIONS</title><description>Techniques for discovery and management of applications in a computing environment of an organization are disclosed. A security management system discovers use of applications within a computing environment to manage access to applications for minimizing security threats and risks in a computing environment of the organization. The security management system can obtain network data about network traffic to identify unique applications. The security management system performs analysis and correlation, including using one or more data sources, to determine information about an application. The system computes a measure of security for an application ("an application risk score") and a user ("a user risk score"). The score is analyzed to determine a threat of security posed by the application based on use of the application. The security system performs one or more instructions to configure access permitted by an application, whether access is denied or restricted.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZHAIcXX28PMMDHUNVnDzD1Jw8Qx29g9zDfL0c1dw9HNR8HX0c3QHcYJdnUODPEMiFfzdFBwDAnw8nR1DPP39gnkYWNMSc4pTeaE0N4Oym2uIs4duakF-fGpxQWJyal5qSXxosJGBkYGhqbGFqamjoTFxqgBpeyu_</recordid><startdate>20200514</startdate><enddate>20200514</enddate><creator>Biswas, Kamalendu</creator><creator>Perera, Sumedha Nalin</creator><creator>Simu, Adina Florina</creator><creator>Kirti, Ganesh</creator><scope>EVB</scope></search><sort><creationdate>20200514</creationdate><title>TECHNIQUES FOR DISCOVERING AND MANAGING SECURITY OF APPLICATIONS</title><author>Biswas, Kamalendu ; Perera, Sumedha Nalin ; Simu, Adina Florina ; Kirti, Ganesh</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2020153855A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2020</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Biswas, Kamalendu</creatorcontrib><creatorcontrib>Perera, Sumedha Nalin</creatorcontrib><creatorcontrib>Simu, Adina Florina</creatorcontrib><creatorcontrib>Kirti, Ganesh</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Biswas, Kamalendu</au><au>Perera, Sumedha Nalin</au><au>Simu, Adina Florina</au><au>Kirti, Ganesh</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>TECHNIQUES FOR DISCOVERING AND MANAGING SECURITY OF APPLICATIONS</title><date>2020-05-14</date><risdate>2020</risdate><abstract>Techniques for discovery and management of applications in a computing environment of an organization are disclosed. A security management system discovers use of applications within a computing environment to manage access to applications for minimizing security threats and risks in a computing environment of the organization. The security management system can obtain network data about network traffic to identify unique applications. The security management system performs analysis and correlation, including using one or more data sources, to determine information about an application. The system computes a measure of security for an application ("an application risk score") and a user ("a user risk score"). The score is analyzed to determine a threat of security posed by the application based on use of the application. The security system performs one or more instructions to configure access permitted by an application, whether access is denied or restricted.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2020153855A1
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title TECHNIQUES FOR DISCOVERING AND MANAGING SECURITY OF APPLICATIONS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T17%3A45%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Biswas,%20Kamalendu&rft.date=2020-05-14&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2020153855A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true