Patent classifications
G06F21/78
DEVICES, SYSTEMS, AND METHODS FOR SECURELY STORING AND MANAGING SENSITIVE INFORMATION
Devices, systems, and methods for storing and managing sensitive information in a connected environment are provided. The system comprises a master controller and a sensitive information storage device (“SIS device”). The SIS device has an island that can be activated by user interaction with the SIS device. In general, the island is deactivated by default and when the island is deactivated, sensitive information that is stored on the SIS device cannot be accessed. Only when the island is activated by user interaction can the stored sensitive information be accessed.
DEVICES, SYSTEMS, AND METHODS FOR SECURELY STORING AND MANAGING SENSITIVE INFORMATION
Devices, systems, and methods for storing and managing sensitive information in a connected environment are provided. The system comprises a master controller and a sensitive information storage device (“SIS device”). The SIS device has an island that can be activated by user interaction with the SIS device. In general, the island is deactivated by default and when the island is deactivated, sensitive information that is stored on the SIS device cannot be accessed. Only when the island is activated by user interaction can the stored sensitive information be accessed.
Data protection systems
Corporate information technology (IT) networks can protect sensitive data sent to computers located outside of the corporate IT network. For example, a computer located outside of the corporate IT network may receive a message that instructs the computer to operate in a data protection mode in which the computer reduces a frame rate of a monitor of the computer from a first frame rate to a lower second frame rate. In this example, the computer receives sensitive information that includes sensitive visual content to be displayed on the monitor and displays the sensitive visual content on the monitor configured to operate at the second frame rate.
Data protection systems
Corporate information technology (IT) networks can protect sensitive data sent to computers located outside of the corporate IT network. For example, a computer located outside of the corporate IT network may receive a message that instructs the computer to operate in a data protection mode in which the computer reduces a frame rate of a monitor of the computer from a first frame rate to a lower second frame rate. In this example, the computer receives sensitive information that includes sensitive visual content to be displayed on the monitor and displays the sensitive visual content on the monitor configured to operate at the second frame rate.
Virtualized file server
In one embodiment, a system for managing communication connections in a virtualization environment includes a plurality of host machines implementing a virtualization environment, wherein each of the host machines includes a hypervisor, at least one user virtual machine (user VM), and a distributed file server that includes file server virtual machines (FSVMs) and associated local storage devices. Each FSVM and associated local storage device are local to a corresponding one of the host machines, and the FSVMs conduct I/O transactions with their associated local storage devices based on I/O requests received from the user VMs. Each of the user VMs on each host machine sends each of its respective I/O requests to an FSVM that is selected by one or more of the FSVMs for each I/O request based on a lookup table that maps a storage item referenced by the I/O request to the selected one of the FSVMs.
Virtualized file server
In one embodiment, a system for managing communication connections in a virtualization environment includes a plurality of host machines implementing a virtualization environment, wherein each of the host machines includes a hypervisor, at least one user virtual machine (user VM), and a distributed file server that includes file server virtual machines (FSVMs) and associated local storage devices. Each FSVM and associated local storage device are local to a corresponding one of the host machines, and the FSVMs conduct I/O transactions with their associated local storage devices based on I/O requests received from the user VMs. Each of the user VMs on each host machine sends each of its respective I/O requests to an FSVM that is selected by one or more of the FSVMs for each I/O request based on a lookup table that maps a storage item referenced by the I/O request to the selected one of the FSVMs.
AUTOENCRYPTION SYSTEM FOR DATA IN A CONTAINER
A method that manages sensitive data. A computer system identifies the sensitive data for a group of application containers using configuration information for the group of application containers. The computer system encrypts the sensitive data identified for the group of application containers to form encrypted sensitive data. The computer system saves the encrypted sensitive data to a shared storage used by the group of application containers when the group of application containers is deployed.
AUTOENCRYPTION SYSTEM FOR DATA IN A CONTAINER
A method that manages sensitive data. A computer system identifies the sensitive data for a group of application containers using configuration information for the group of application containers. The computer system encrypts the sensitive data identified for the group of application containers to form encrypted sensitive data. The computer system saves the encrypted sensitive data to a shared storage used by the group of application containers when the group of application containers is deployed.
Adaptive, multi-layer enterprise data protection and resiliency platform
A system for data protection includes a first computing device comprising a security module; and a storage device coupled to the first computing device via a network interface. The security module comprises at least one of Software Root of Trust (SRoT) and Hardware Root of Trust (HRoT). The security module is further configured to: establish a trust channel between the first computing device and the storage device or storage service; monitor the first computing device and the storage device; create and enforce multi-dimensional data access control by tightly binding data access and permissions to authorized computing devices, users, applications, system services, networks, locations, and access time windows; and take over control of the storage device or storage service in response to a security risk to the system.
Method and system for information storage
The present disclosure provides a method for information storage and a system thereof, which adapts to a data storage system. A monitoring unit is configured to detecting and monitoring operations of a storage node in the data storage system to generate corresponding one and more monitoring data. A recording processor is configured to receiving the one or the plurality of monitoring data, and rendering one or a plurality of logs according to the difference of content of the one or the plurality of monitoring data. The adjustment mechanism is performed according to the stored logs, thereby the amount of large data generated during monitoring is effectively reduced.