H04L41/024

Discovery of Network Load Balancers
20220029881 · 2022-01-27 ·

A discovery application on a computing system is provided. The discovery application receives a user input, which is for discovery of resources associated with a cloud operating system of a cloud computing system. The user input includes an authentication credential and account information associated with the cloud operating system. Based on the received input, the discovery application executes a discovery pattern comprising operations for the discovery of resources. The cloud operating system includes a group of services to access such resources. At least one of the operations corresponds to an API call to an API endpoint associated with a service of the group of services. The discovery application receives a response to the API call from the cloud operating system. The response includes a payload of information associated with the resources. The discovery application updates, based on the received response, one or more configuration items in a configuration management database.

Technologies for data center multi-zone cabling

Technologies for connecting data cables in a data center are disclosed. In the illustrative embodiment, racks of the data center are grouped into different zones based on the distance from the racks in a given zone to a network switch. All of the racks in a given zone are connected to the network switch using data cables of the same length. In some embodiments, certain physical resources such as storage may be placed in racks that are in zones closer to the network switch and therefore use shorter data cables with lower latency. An orchestrator server may, in some embodiments, schedule workloads or create virtual servers based on the different zones and corresponding latency of different physical resources.

Techniques to configure physical compute resources for workloads via circuit switching

Embodiments are generally directed apparatuses, methods, techniques and so forth to select two or more processing units of the plurality of processing units to process a workload, and configure a circuit switch to link the two or more processing units to process the workload, the two or more processing units each linked to each other via paths of communication and the circuit switch.

Device connector service for device and management service integration

Disclosed are various examples of device and management service integration using a device connector service that acts as a proxy. The device connector service can receive a device identifier for a device, and an enterprise identifier, and generate a management unique device identifier (UDID) using these values. The management UDID can be used in an enrollment request that enrolls the device with the management service. Device data including a device configuration can be received from the management service, and the device configuration can be relayed to a device connector client to apply the device configuration to the device.

HOLISTIC ASSESSMENT, MONITORING, AND MANAGEMENT OF DIGITAL PRESENCE
20210360018 · 2021-11-18 · ·

An assessment query may be received and analyzed to identify relevant assessment attributes and select a set of associated assessment resources. Assessment information may be extracted from the set of associated assessment resources. The extracted information may be used to identify additional relevant assessment attributes that may be utilized to extract additional assessment information. The extracted information may be used to generate a comprehensive threat assessment report. The threat assessment report, and the threat assessment, may be updated based on user feedback.

SELECTIVE DATABASE LOGGING WITH SMART SAMPLING
20210344698 · 2021-11-04 · ·

A method by a security analysis server to generate a traffic monitoring rule. The method includes receiving, from a database agent because of a current configuration of the database agent, counts of an amount of traffic sent over a first set of one or more of the database connections being monitored by the database agent and generating a traffic monitoring rule that indicates database connections for which the database agent is to send counts of an amount of traffic, rather than all the traffic, sent over those database connections to the security analysis server because those database connections have been determined by the security analysis server to be of an application database connection type based on an analysis by the security analysis server of the counts. The method further includes applying the traffic monitoring rule by sending instructions to the database agent to alter the current configuration.

MULTI-RESULT LOOKUPS
20210344550 · 2021-11-04 ·

Methods, systems, and computer readable mediums for network hardware table management including obtaining, by a network device table manager of a network device, a first feature table entry published by a first feature; obtaining, by the network device table manager, a second feature table entry published by a second feature; making a first determination that the first feature table entry and the second table feature entry each comprise a common prefix; and based on the first determination, adding a first combined feature table entry to a combined feature table, the first combined feature table entry comprising the common prefix, a first feature action of the first feature table entry and a second feature action of the second feature table entry.

Managing multiple semantic versions of device configuration schemas

A controller device manages a plurality of network devices. The controller device includes one or more processing units implemented in circuitry and configured to maintain a graph data structure representing device level configuration schemas for the plurality of network devices, the graph data structure including trie nodes for every first device level configuration schema element for a first model of a version of network device of the plurality of network devices; obtain corresponding second device level configuration schema elements based on a path for a second model of the version of the network device; determine a deviation between the second device level configuration schema element and the first device level configuration schema; and update the trie node to add a branch to a node representing the second device level configuration schema element.

Addressing Conditions Impacting Communication Services
20230318995 · 2023-10-05 ·

A server of an on-premises data center used for a software platform identifies a condition impacting real-time communication services at a premises housing devices accessing the software platform. The server transmits, to a device of an administrator associated with the premises via a messaging application for real-time communication between two or more human-operated devices, a message indicating the condition and including one or more selectable elements each associated with a different action for addressing the condition. The server receives an indication of a selectable element selected from amongst the one or more selectable elements at the device of the administrator. The server causes performance of the action associated with the selected selectable element.

THREAT MITIGATION SYSTEM AND METHOD

A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; defining a plurality of subsystem-specific queries on a unified platform concerning the plurality of security-relevant subsystems, wherein one or more of the plurality of subsystem-specific queries has a defined execution schedule; and providing the plurality of subsystem-specific queries to the plurality of security-relevant subsystems.