Abstract:
A method of policy management in a Data Loss Prevention (DLP) system uses a policy model that associates a user with one or more DLP endpoints. When an endpoint is added to the system, a set of policies for that endpoint are determined using an identity of the user that is associated with the endpoint and a list of roles or groups for that user. At policy distribution time, the method determines a set of endpoints to which the policy is to be distributed.
Abstract:
A user provisioning system is extended to enable account reconciliation to occur in conjunction with a provisioning request. In response to a user provisioning request, a determination is made whether the user provisioning request is to be extended by including a reconciliation request. If so, the reconciliation request is piggy-backed on top of the provisioning request. This approach enables the reconciliation operation to be scoped to just the particular user account that is the subject to the provisioning operation, and it enables reconciliation to be carried out much more frequently as compared to the periodic, batch-oriented approach of prior techniques.
Abstract:
A security analytics system receives incident data (from an incident management system) and security policy information (from a security policy management system). The security analytics system evaluates these data sets against one another, preferably using a rules-based analysis engine. As a result, the security analytics system determines whether a particular security policy configuration (as established by the security policy management system) needs to be (or should be) changed, e.g., to reduce the number of incidents caused by a misconfiguration, to increase its effectiveness in some manner, or the like. As a result of the evaluation, the security analytics system may cause a policy to be updated automatically, notify an administrator of the need for the change (and the recommendation), or take some other action to evolve one or more security policies being enforced by the security policy management system.
Abstract:
In accordance with an illustrative embodiment of the present invention, a computer implemented method for dynamic management of resource utilization is provided. The computer implemented method monitors data flows of a reverse proxy web server, and determines whether a resource utilization of the reverse proxy web server exceeds a first threshold. The computer implemented method further, responsive to a determination that the resource utilization does not exceed a first threshold, determines whether the resource utilization exceeds a second threshold, responsive to a determination that the resource utilization does exceed a second threshold, filters pre-fetch directives inversely by frequency.
Abstract:
An approach is provided to access resources at legacy systems. In this approach, a resource request destined to a legacy system is receiving from a requestor with the resource request including an access token and being on behalf of a resource owner. A validation process is performed on the access token. If the access token is valid, the approach identifies the resource owner and one or more legacy access tokens used to access the legacy system. Another request is formed with the new request including the legacy access tokens. The new request is transmitted to the legacy system and a response is received back from the legacy system. The response received from the legacy system is transmitted back to the requestor.
Abstract:
An authorization method is implemented in an authorization engine external to an authorization server. The authorization server includes a cache. The external authorization engine comprises an authorization decision engine, and a policy analytics engine. The method begins when the authorization decision engine receives a request for an authorization decision. The request is generated (at the authorization server) following receipt of a client request for which an authorization decision is not then available at the server. The authorization decision engine determines an authorization policy to apply to the client request, applies the policy, and generates an authorization decision. The authorization decision is then provided to the policy analytics engine, which stores previously-generated potential cache directives that may be applied to the authorization decision. Preferably, the cache directives are generated in an off-line manner (e.g., during initialization) by examining each security policy and extracting one or more cache dimensions associated with each such policy. The policy analytics engine determines an applicable cache directive, and the decision is augmented to include that cache directive. The decision (including the cache directive) is then returned to the authorization server, where the decision is applied to process the client request. The cache directive is then cached for re-use at the authorization server.
Abstract:
An approach is provided to gather items of usage data that pertain a number of instrumented software modules that are included in a software offering. The usage data is gathered from a number of customer installations of the software offering. Usage statistics are computed for the software modules and are used to determine support levels for the instrumented software modules. In another aspect, an approach is provided that detects execution of the software modules included in a software offering. Usage statistics are recorded in a local data store. One of the usage statistics is a module identifier that the software module that was executed. In addition, the usage statistics track the number of times each of the software modules was executed. The usage statistics are periodically transmitting a computer network to a software provider that develops and maintains the software offering.
Abstract:
A security policy management solution (such as a Data Loss Prevention (DLP) system) is augmented to enable a user to model and visualize how changes in a security policy may impact (positively or negatively) the effectiveness of a policy configuration as well as the risk associated with its deployment. This technique enables a user (e.g., a security policy administrator) to evolve enterprise information technology (IT) security policies and, in particular, to generate and display “what-if” scenarios by which the user can determine trade-offs between, on the one hand, the effectiveness of a proposed change to a policy, and on the other hand, the risk associated with the proposed change.
Abstract:
A method for automatically removing a user from an e-mail thread is provided. An e-mail client receives a reply e-mail message. Responsive to a determination that the reply e-mail message is a message to opt-out of an e-mail thread, the e-mail address of a sender of the reply e-mail message is associated with the e-mail thread to form a listed e-mail address. The listed e-mail address is stored. When a new e-mail message is generated that is part of the e-mail thread, the listed e-mail address is automatically excluded from a list of recipients of the new e-mail.
Abstract:
In accordance with an illustrative embodiment of the present invention, a computer implemented method for dynamic management of resource utilization is provided. The computer implemented method monitors data flows of a reverse proxy web server, and determines whether a resource utilization of the reverse proxy web server exceeds a first threshold. The computer implemented method further, responsive to a determination that the resource utilization does not exceed a first threshold, determines whether the resource utilization exceeds a second threshold, responsive to a determination that the resource utilization does exceed a second threshold, filters pre-fetch directives inversely by frequency.