-
公开(公告)号:US20220086190A1
公开(公告)日:2022-03-17
申请号:US17248347
申请日:2021-01-21
Applicant: salesforce.com, inc.
Inventor: Toan Van Nguyen
Abstract: Disclosed are examples of systems, apparatus, methods and computer program products for correlating security policy inputs and outputs. A server system can obtain a system input comprising two versions of a policy input and corresponding versions of a policy output. The system can compute differences between the versions of the policy input and the versions of the policy output. The system can then correlate input differences to output differences. The system can generate and store a database record identifying the correlation.
-
公开(公告)号:US20220086193A1
公开(公告)日:2022-03-17
申请号:US17248529
申请日:2021-01-28
Applicant: salesforce.com, inc.
Inventor: Toan Van Nguyen , Qiyuan Zheng , Santhosh Ram Vetrinadar Manohar , Varun Kulkarni Somashekhar , Prabhat Singh
IPC: H04L29/06
Abstract: Disclosed are examples of systems, apparatus, methods and computer program products for automation of network security policy analysis and deployment. A server system can obtain a system input comprising two versions of a policy output. The system can generate a severity characteristic that indicates a severity of deploying the second version of the policy output. The system can then determine whether to deploy the second version of the policy output based on the severity characteristic. The system can then, in response to determining that the second version of the policy output is to be deployed, deploy the second version of the policy output to one of a plurality of clouds.
-
公开(公告)号:US20220086189A1
公开(公告)日:2022-03-17
申请号:US16948399
申请日:2020-09-16
Applicant: salesforce.com, inc.
Inventor: Toan Van Nguyen , Sriram Srinivasan , Syed Abdullah Shah , Santhosh Ram Vetrinadar Manohar , Varun Kulkarni Somashekhar , Prabhat Singh , Bogdan Florin Romanescu
IPC: H04L29/06
Abstract: Disclosed are examples of systems, apparatus, methods and computer program products providing network security orchestration and management across different clouds. In some implementations, network security information includes a set of security policies indicating permitted communications between or among computing resources. The network security information is converted to a cloud-independent representation. From the cloud-independent representation, policy sets can be generated, where each policy set is specific to a different cloud.
-
公开(公告)号:US20250047719A1
公开(公告)日:2025-02-06
申请号:US18923050
申请日:2024-10-22
Applicant: salesforce.com, inc.
Inventor: Toan Van Nguyen , Sriram Srinivasan , Syed Abdullah Shah , Santhosh Ram Vetrinadar Manohar , Varun Kulkarni Somashekhar , Prabhat Singh , Bogdan Florin Romanescu
IPC: H04L9/40
Abstract: Disclosed are examples of systems, apparatus, methods and computer program products providing network security orchestration and management across different clouds. In some implementations, network security information includes a set of security policies indicating permitted communications between or among computing resources. The network security information is converted to a cloud-independent representation. From the cloud-independent representation, policy sets can be generated, where each policy set is specific to a different cloud.
-
公开(公告)号:US12170693B2
公开(公告)日:2024-12-17
申请号:US17248347
申请日:2021-01-21
Applicant: salesforce.com, inc.
Inventor: Toan Van Nguyen
Abstract: Disclosed are examples of systems, apparatus, methods and computer program products for correlating security policy inputs and outputs. A server system can obtain a system input comprising two versions of a policy input and corresponding versions of a policy output. The system can compute differences between the versions of the policy input and the versions of the policy output. The system can then correlate input differences to output differences. The system can generate and store a database record identifying the correlation.
-
公开(公告)号:US12170692B2
公开(公告)日:2024-12-17
申请号:US16948399
申请日:2020-09-16
Applicant: salesforce.com, inc.
Inventor: Toan Van Nguyen , Sriram Srinivasan , Syed Abdullah Shah , Santhosh Ram Vetrinadar Manohar , Varun Kulkarni Somashekhar , Prabhat Singh , Bogdan Florin Romanescu
IPC: H04L9/40
Abstract: Disclosed are examples of systems, apparatus, methods and computer program products providing network security orchestration and management across different clouds. In some implementations, network security information includes a set of security policies indicating permitted communications between or among computing resources. The network security information is converted to a cloud-independent representation. From the cloud-independent representation, policy sets can be generated, where each policy set is specific to a different cloud.
-
-
-
-
-