首页>
外国专利>
OPTIMIZATION OF REDUNDANT USAGE PATTERNS BASED ON HISTORICAL DATA AND SECURITY CONSTRAINTS
OPTIMIZATION OF REDUNDANT USAGE PATTERNS BASED ON HISTORICAL DATA AND SECURITY CONSTRAINTS
展开▼
机译:基于历史数据和安全约束的冗余用法模式优化
展开▼
页面导航
摘要
著录项
相似文献
摘要
Typically, a business desires to track and monitor all applications run on its servers. Nonetheless, one or more unauthorized applications may be running on the business's servers, exposing the business to potential regulatory liability and security breaches. Apparatus and methods are provided for isolating and disabling one or more unauthorized applications running on a server. The apparatus may comprise a system including a content-filtering web proxy server configured to filter outgoing requests and data associated with the requests. The system may also include a remediation framework configured to monitor request data in a proxy log stored by the proxy server. The remediation framework may be triggered to perform remedial action when the remediation framework determines that a request and associated data, as stored in the proxy log, meets predetermined conditions. The remediation framework, when triggered, may execute steps to truncate functionality of the unauthorized applications.
展开▼