-
公开(公告)号:US12182288B2
公开(公告)日:2024-12-31
申请号:US17490344
申请日:2021-09-30
Applicant: Cisco Technology, Inc.
Inventor: Allison Renner Walton , Ana Andrijic , Jazzmine Marie White , David C. White, Jr.
IPC: G06F21/62
Abstract: Techniques are provided herein for remediating storage of sensitive data on a hardware device. In one example, a request to remediate storage of sensitive data on a hardware device is obtained. In response to the request, a database is automatically searched. The database correlates the hardware device with an indication of how to remediate the storage of the sensitive data on the hardware device. Based on the database, the storage of the sensitive data on the hardware device is remediated.
-
公开(公告)号:US20230101945A1
公开(公告)日:2023-03-30
申请号:US17490344
申请日:2021-09-30
Applicant: Cisco Technology, Inc.
Inventor: Allison Renner Walton , Ana Andrijic , Jazzmine Marie White , David C. White, JR.
IPC: G06F21/62
Abstract: Techniques are provided herein for remediating storage of sensitive data on a hardware device. In one example, a request to remediate storage of sensitive data on a hardware device is obtained. In response to the request, a database is automatically searched. The database correlates the hardware device with an indication of how to remediate the storage of the sensitive data on the hardware device. Based on the database, the storage of the sensitive data on the hardware device is remediated.
-
公开(公告)号:US20240073192A1
公开(公告)日:2024-02-29
申请号:US17896066
申请日:2022-08-25
Applicant: Cisco Technology, Inc.
Inventor: Ana Andrijic , Srilatha Vemula , David C. White , Arati Shimikeri , Poorna Rajaraman
CPC classification number: H04L63/0435 , H04L45/38 , H04L63/107 , H04L63/20
Abstract: This disclosure describes techniques for data path monitoring and visibility in communications among network devices. The techniques include determining that personally identifiable information (PII) is included in a data traffic flow intended for delivery to a destination endpoint. A probe may be sent from a source endpoint to identify an intended data path of the data traffic flow to the destination endpoint. The techniques include validating the intended data path of the data traffic flow against a policy related to data routing. Based at least in part on a result of the validation, the techniques may include allowing or dropping the data traffic flow, or various other actions.
-
-