TECHNIQUES FOR DISCOVERING AND MANAGING SECURITY OF APPLICATIONS

    公开(公告)号:US20200153855A1

    公开(公告)日:2020-05-14

    申请号:US16741501

    申请日:2020-01-13

    IPC分类号: H04L29/06

    摘要: Techniques for discovery and management of applications in a computing environment of an organization are disclosed. A security management system discovers use of applications within a computing environment to manage access to applications for minimizing security threats and risks in a computing environment of the organization. The security management system can obtain network data about network traffic to identify unique applications. The security management system performs analysis and correlation, including using one or more data sources, to determine information about an application. The system computes a measure of security for an application (“an application risk score”) and a user (“a user risk score”). The score is analyzed to determine a threat of security posed by the application based on use of the application. The security system performs one or more instructions to configure access permitted by an application, whether access is denied or restricted.

    Techniques for discovering and managing security of applications

    公开(公告)号:US10536478B2

    公开(公告)日:2020-01-14

    申请号:US15441154

    申请日:2017-02-23

    IPC分类号: H04L29/06

    摘要: Techniques for discovery and management of applications in a computing environment of an organization are disclosed. A security management system discovers use of applications within a computing environment to manage access to applications for minimizing security threats and risks in a computing environment of the organization. The security management system can obtain network data about network traffic to identify unique applications. The security management system can perform analysis and correlation, including use of one or more data sources, to determine information about an application. The system can compute a measure of security for an application (“an application risk score”) and a user (“a user risk score”). The score may be analyzed to determine a threat of security posed by the application based on use of the application. The security system can perform one or more instructions to configure access permitted by an application, whether access is denied or restricted.

    TECHNIQUES FOR DISCOVERING AND MANAGING SECURITY OF APPLICATIONS

    公开(公告)号:US20170251013A1

    公开(公告)日:2017-08-31

    申请号:US15441154

    申请日:2017-02-23

    IPC分类号: H04L29/06

    摘要: Techniques for discovery and management of applications in a computing environment of an organization are disclosed. A security management system discovers use of applications within a computing environment to manage access to applications for minimizing security threats and risks in a computing environment of the organization. The security management system can obtain network data about network traffic to identify unique applications. The security management system can perform analysis and correlation, including use of one or more data sources, to determine information about an application. The system can compute a measure of security for an application (“an application risk score”) and a user (“a user risk score”). The score may be analyzed to determine a threat of security posed by the application based on use of the application. The security system can perform one or more instructions to configure access permitted by an application, whether access is denied or restricted.

    Techniques for discovering and managing security of applications

    公开(公告)号:US11368481B2

    公开(公告)日:2022-06-21

    申请号:US16741501

    申请日:2020-01-13

    IPC分类号: H04L29/06

    摘要: Techniques for discovery and management of applications in a computing environment of an organization are disclosed. A security management system discovers use of applications within a computing environment to manage access to applications for minimizing security threats and risks in a computing environment of the organization. The security management system can obtain network data about network traffic to identify unique applications. The security management system performs analysis and correlation, including using one or more data sources, to determine information about an application. The system computes a measure of security for an application (“an application risk score”) and a user (“a user risk score”). The score is analyzed to determine a threat of security posed by the application based on use of the application. The security system performs one or more instructions to configure access permitted by an application, whether access is denied or restricted.