System and method of utilizing a dedicated computer security service

System und verfahren zur verwendung eines dedizierten computersicherheitsdienstes

Système et procédé d'utilisation d'un service de sécurité informatique spécialisé

Abstract

Disclosed are systems and method for utilizing a dedicated computer security service. An exemplary method includes storing in an electronic database rules that indicate when to use either a first cloud service or a second cloud service for one of the security services, receiving a request from a client computer to access the security service, determining parameters relating to the received request, applying the parameters to the plurality of rules to determine an instruction indicating whether to transmit the request to the first cloud service or the second cloud service; and transmitting the request to either the first cloud service or the second cloud service, based on the instruction, to use the at least one security service.

Claims

Description

Topics

Download Full PDF Version (Non-Commercial Use)

Patent Citations (7)

    Publication numberPublication dateAssigneeTitle
    US-2014325600-A1October 30, 2014Sap AgInformation level agreements for enterprise cloud data
    US-7640589-B1December 29, 2009Kaspersky Lab, ZaoDetection and minimization of false positives in anti-malware processing
    US-8566943-B2October 22, 2013Kaspersky Lab, ZaoAsynchronous processing of events for malware detection
    US-8732472-B2May 20, 2014Kaspersky Lab ZaoSystem and method for verification of digital certificates
    US-8732836-B2May 20, 2014Kaspersky Lab ZaoSystem and method for correcting antivirus records to minimize false malware detections
    US-8738721-B1May 27, 2014Kaspersky Lab ZaoSystem and method for detecting spam using clustering and rating of E-mails
    US-8813174-B1August 19, 2014Symantec CorporationEmbedded security blades for cloud service providers

NO-Patent Citations (3)

    Title
    CHRIS JARABEK ET AL: "ThinAV", 20121203; 20121203 - 20121207, 3 December 2012 (2012-12-03), pages 209 - 218, XP058010683, ISBN: 978-1-4503-1312-4, DOI: 10.1145/2420950.2420983
    SHAHID ALAM ET AL: "In-Cloud Malware Analysis and Detection", SECURITY OF INFORMATION AND NETWORKS, ACM, 2 PENN PLAZA, SUITE 701 NEW YORK NY 10121-0701 USA, 9 September 2014 (2014-09-09), pages 473 - 478, XP058062551, ISBN: 978-1-4503-3033-6, DOI: 10.1145/2659651.2659730
    VLADIMIR GETOV: "Security as a Service in Smart Clouds -- Opportunities and Concerns", COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2012 IEEE 36TH ANNUAL, IEEE, 16 July 2012 (2012-07-16), pages 373 - 379, XP032472770, ISBN: 978-1-4673-1990-4, DOI: 10.1109/COMPSAC.2012.112

Cited By (0)

    Publication numberPublication dateAssigneeTitle