-
公开(公告)号:US20220086189A1
公开(公告)日:2022-03-17
申请号:US16948399
申请日:2020-09-16
Applicant: salesforce.com, inc.
Inventor: Toan Van Nguyen , Sriram Srinivasan , Syed Abdullah Shah , Santhosh Ram Vetrinadar Manohar , Varun Kulkarni Somashekhar , Prabhat Singh , Bogdan Florin Romanescu
IPC: H04L29/06
Abstract: Disclosed are examples of systems, apparatus, methods and computer program products providing network security orchestration and management across different clouds. In some implementations, network security information includes a set of security policies indicating permitted communications between or among computing resources. The network security information is converted to a cloud-independent representation. From the cloud-independent representation, policy sets can be generated, where each policy set is specific to a different cloud.
-
公开(公告)号:US20250047719A1
公开(公告)日:2025-02-06
申请号:US18923050
申请日:2024-10-22
Applicant: salesforce.com, inc.
Inventor: Toan Van Nguyen , Sriram Srinivasan , Syed Abdullah Shah , Santhosh Ram Vetrinadar Manohar , Varun Kulkarni Somashekhar , Prabhat Singh , Bogdan Florin Romanescu
IPC: H04L9/40
Abstract: Disclosed are examples of systems, apparatus, methods and computer program products providing network security orchestration and management across different clouds. In some implementations, network security information includes a set of security policies indicating permitted communications between or among computing resources. The network security information is converted to a cloud-independent representation. From the cloud-independent representation, policy sets can be generated, where each policy set is specific to a different cloud.
-
公开(公告)号:US12170692B2
公开(公告)日:2024-12-17
申请号:US16948399
申请日:2020-09-16
Applicant: salesforce.com, inc.
Inventor: Toan Van Nguyen , Sriram Srinivasan , Syed Abdullah Shah , Santhosh Ram Vetrinadar Manohar , Varun Kulkarni Somashekhar , Prabhat Singh , Bogdan Florin Romanescu
IPC: H04L9/40
Abstract: Disclosed are examples of systems, apparatus, methods and computer program products providing network security orchestration and management across different clouds. In some implementations, network security information includes a set of security policies indicating permitted communications between or among computing resources. The network security information is converted to a cloud-independent representation. From the cloud-independent representation, policy sets can be generated, where each policy set is specific to a different cloud.
-
-