Abstract:
Techniques for identifying a trusted SSID for a wireless network are disclosed. Prior to establishing a connection with a wireless network, a first network message is received from a first access point (AP) identifying a first service set identifier (SSID) associated with a first wireless network, a second network message is received from a second AP identifying a second SSID associated with a second wireless network, and a visual similarity is determined between a first visual representation of the first SSID and a second visual representation of the second SSID. The second SSID is designated as suspicious based on the determined visual similarity.
Abstract:
Techniques for dynamic prioritization of presenting devices in wireless deployments are provided. Data relating to a transmission between a first device and a second device is received, and the first device is classified as a presenting device for the transmission based on the data relating to the transmission. An access point (AP) providing connectivity to the first device is identified, and the AP is configured to prioritize traffic transmitted from the first device responsive to classifying the first device as the presenting device.
Abstract:
A system is provided to run new code modules safely in a duplicative, protected environment without affecting the code modules that are already trusted to be on the system. The system receives a new code module that validates operational data of a computing device, and instantiates a new, parallel execution engine to run the new code module on the operational data in parallel with another execution engine running the trusted/verified code modules that also validate the same operational data. The new engine runs the new code module with the operational data to produce new code module results. The production engine runs the trusted/verified code modules with the operational data to produce verified code module results. The new code module results are combined with the verified code module results to produce combined results describing the operational status of the computing device.
Abstract:
Techniques are presented herein to visually display who is speaking when an online conference session is established involving participants at multiple locations. When it is determined that there are multiple participants of the online conference session at a first location at which one or more microphones can detect audio from the multiple participants, a visual indicator of the first location is generated for display to the participants in the online conference session. In addition, in a predetermined relationship with the visual indicator of the first location, identifiers of the multiple participants at the first location are generated that can also be displayed to the participants in the online conference session.
Abstract:
A computer executed process for mimicking human dialog, referred to herein as a “humanoid” or “humanoid system,” can be configured to provide automated customer support. The humanoid can identify a support issue for a customer, as well as a customer support campaign corresponding to the support issue. The humanoid can identify at least one machine learning model associated with the customer support campaign and can communicate with the customer using the at least one machine learning model. The humanoid can execute a support action to resolve the support issue.
Abstract:
Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.
Abstract:
An application security monitors data traffic from computing devices to a remote application in a first computing environment, such as a production service chain. The application security monitor detects an anomaly in the data traffic from a computing device. Based on the anomaly, the remote application is substantially reproduced in a second computing environment, such as a scrubbing environment. The application security monitor redirects the anomalous data to the remote application in the second computing environment. The application security monitor determines whether the data traffic from the first computing device corresponds to malicious activity or legitimate activity by the computing device. Responsive to a determination that the data traffic from the first computing device corresponds to legitimate activity, the application security monitor applies to the first computing environment any changes in the second computing environment caused by the redirected traffic from the computing device.
Abstract:
Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.
Abstract:
A computer executed process for mimicking human dialog, referred to herein as a “humanoid” or “humanoid system,” can be configured to provide automated customer support. The humanoid can identify a support issue for a customer, as well as a customer support campaign corresponding to the support issue. The humanoid can identify at least one machine learning model associated with the customer support campaign and can communicate with the customer using the at least one machine learning model. The humanoid can execute a support action to resolve the support issue.
Abstract:
Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.