Netskope, Inc. (20240346137). DATA LOSS PREVENTION OF ENTERPRISE INFORMATION STORED ON A CLOUD COMPUTING SERVICE (CCS) simplified abstract

From WikiPatents
Jump to navigation Jump to search

DATA LOSS PREVENTION OF ENTERPRISE INFORMATION STORED ON A CLOUD COMPUTING SERVICE (CCS)

Organization Name

Netskope, Inc.

Inventor(s)

Krishna Narayanaswamy of Saratoga CA (US)

Ravi Ithal of Los Altos CA (US)

Steve Malmskog of San Jose CA (US)

Shankaran Gnanashanmugam of Sunnyvale CA (US)

Arjun Sambamoorthy of San Jose CA (US)

Chetan Anand of San Francisco CA (US)

Prashanth Arun of San Jose CA (US)

DATA LOSS PREVENTION OF ENTERPRISE INFORMATION STORED ON A CLOUD COMPUTING SERVICE (CCS) - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240346137 titled 'DATA LOSS PREVENTION OF ENTERPRISE INFORMATION STORED ON A CLOUD COMPUTING SERVICE (CCS)

The abstract describes a computer-implemented method for monitoring and controlling enterprise information stored on a cloud computing service (CCS). The method involves using a cross-application monitor to detect a CCS application programming interface (API) in use and the function or activity being performed via the CCS API. It also includes determining the function or activity being performed by parsing a data stream based on the CCS API and identifying content being transmitted to the CCS. Additionally, the method applies a content inspection rule to find strings and interrelated strings in the content that are subject to content control, triggering a security action in response to finding these strings in the parsed stream.

  • The method involves monitoring and controlling enterprise information on a cloud computing service.
  • It uses a cross-application monitor to detect the CCS API in use and the function or activity being performed.
  • Content is parsed based on the CCS API to identify and inspect transmitted content.
  • A content inspection rule is applied to find strings subject to content control.
  • Security actions are triggered in response to finding these strings in the parsed stream.

Potential Applications: - Data security and compliance monitoring in cloud computing environments - Real-time detection and prevention of unauthorized data access or transmission - Enhancing data governance and risk management practices in enterprises

Problems Solved: - Ensuring data security and compliance in cloud computing environments - Detecting and preventing unauthorized access or transmission of sensitive information - Improving overall data governance and risk management practices

Benefits: - Enhanced data security and compliance monitoring capabilities - Real-time detection and prevention of data breaches or unauthorized activities - Strengthened data governance and risk management frameworks

Commercial Applications: Title: Cloud Computing Security and Compliance Monitoring System This technology can be used by cloud service providers, enterprises, and regulatory bodies to enhance data security and compliance monitoring in cloud environments. It can also be integrated into existing cybersecurity solutions to provide real-time threat detection and prevention capabilities.

Questions about Cloud Computing Security and Compliance Monitoring System: 1. How does this technology improve data security in cloud computing environments? 2. What are the potential implications of this system for regulatory compliance in different industries?


Original Abstract Submitted

a computer-implemented method is described to monitor and control enterprise information stored on a cloud computing service (ccs). the method includes using a cross-application monitor to detect a cloud computing service (ccs) application programming interface (api) in use and a function or an activity being performed via the ccs api. the method also includes determining the function or the activity being performed via the ccs api by parsing a data stream based on the ccs api and identifying content being transmitted to the ccs. the method further includes applying a content inspection rule to find strings and interrelated strings in the content that are subject to content control and triggering a security action responsive to finding the strings and interrelated strings subject to content control in the parsed stream.