-
公开(公告)号:US11411968B1
公开(公告)日:2022-08-09
申请号:US16574755
申请日:2019-09-18
申请人: CA, INC.
发明人: Ashok Banerjee , Susan Hassall
摘要: The disclosed computer-implemented method for protecting a cloud computing device from malware may include (i) intercepting, at a computing device, a malicious attempt by the malware to (A) access sensitive information in an encrypted file stored on the computing device and (B) send the sensitive information to the cloud computing device and (ii) performing, responsive to the attempt to access the encrypted file, a security action. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US11336639B1
公开(公告)日:2022-05-17
申请号:US16576275
申请日:2019-09-19
申请人: CA, INC.
发明人: Ashok Banerjee , Leonid Belkind , Russell Daigle
IPC分类号: G06F13/00 , H04L29/06 , H04L67/10 , H04L61/4511 , H04L49/90
摘要: The disclosed computer-implemented method for managing a need-to-know domain name system may include (i) intercepting, by an agent of the computing device, network traffic received on the computing device, (ii) generating, by the agent, a one-time password based on a unique identifier of the agent of the computing device, (iii) wrapping, by the agent, the network traffic with the one-time password, and (iv) pushing, by the agent, the wrapped network traffic to a cloud server using a local domain name system (DNS) of the agent of the computing device, wherein the local DNS comprises a private domain name unpublished in a global DNS. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US11144656B1
公开(公告)日:2021-10-12
申请号:US16362987
申请日:2019-03-25
申请人: CA, INC.
发明人: Ashok Banerjee , William Porr , Sahil Hasan
摘要: The disclosed computer-implemented method for protection of storage systems using decoy data may include identifying an original file comprising sensitive content to be protected against malicious access and protecting the sensitive content. Protecting the sensitive content may include (i) processing the original file to identify a structure of the original file and the sensitive content of the original file, (ii) generating a decoy file using the structure of the original file and using substitute content in a location corresponding to the sensitive content of the original file, and (iii) storing the decoy file with the original file. Various other methods, systems, and computer-readable media are also disclosed.
-
-