TECHNOLOGIES FOR PROTECTING SYSTEMS AND DATA TO PREVENT CYBER-ATTACKS
First Claim
1. A data integrity server for protecting systems and data, the data integrity server comprising:
- a malware detection module to (i) receive a data file for import from an external source, (ii) analyze the received data file with a plurality of anti-malware engines, (iii) determine whether the received data file comprises malware based on the analysis, and (iv) discard the received data file in response to a determination that the received file comprises malware;
a file type verification module to verify, in response to a determination that the received file does not comprise malware, a file type of the received data file based at least in part on a file extension associated with the received data file; and
a file sterilization module to (i) clean the received data file in response to a verification of the file type of the received data file and (ii) transmit the cleaned data file to a computing device for import of the cleaned data file.
1 Assignment
0 Petitions
Accused Products
Abstract
Technologies for protecting systems and data of an organization from malware include a data integrity server configured to receive a data file for import from an external source. The data integrity server analyzes the received data file with multiple anti-malware engines to determine whether the data file includes hidden malware. The data integrity server discards the data file in response to a determination that the data file includes hidden malware. Additionally, the data integrity server verifies the type of the received data file based on the file extension associated with the received data file. The data integrity server cleans the received data file in response to verification of the file type. The cleaned data file is transmitted to a computing device to be imported. Other embodiments are described and claimed.
-
Citations
20 Claims
-
1. A data integrity server for protecting systems and data, the data integrity server comprising:
-
a malware detection module to (i) receive a data file for import from an external source, (ii) analyze the received data file with a plurality of anti-malware engines, (iii) determine whether the received data file comprises malware based on the analysis, and (iv) discard the received data file in response to a determination that the received file comprises malware; a file type verification module to verify, in response to a determination that the received file does not comprise malware, a file type of the received data file based at least in part on a file extension associated with the received data file; and a file sterilization module to (i) clean the received data file in response to a verification of the file type of the received data file and (ii) transmit the cleaned data file to a computing device for import of the cleaned data file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. One or more machine-readable storage media comprising a plurality of instructions stored thereon that in response to being executed by a data integrity server, cause the data integrity server to:
-
receive a data file for import from an external source; analyze the received data file with a plurality of anti-malware engines; determine whether the received data file comprises malware based on the analysis; discard the received data file in response to a determination that the received file comprises malware; verify, in response to a determination that the received file does not comprise malware, a file type of the received data file based at least in part on a file extension associated with the received data file; clean the received data file in response to a verification of the file type of the received data file; and transmit the cleaned data file to a computing device for import of the cleaned data file. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method for protecting systems and data, the method comprising:
-
receiving, by a data integrity server, a data file for import from an external source; analyzing, by the data integrity server, the received data file with a plurality of anti-malware engines; determining, by the data integrity server, whether the received data file comprises malware based on the analysis; discarding, by the data integrity server, the received data file in response to determining that the received file comprises malware; verifying, by the data integrity server and in response to determining that the received file does not comprise malware, a file type of the received data file based at least in part on a file extension associated with the received data file; cleaning, by the data integrity server, the received data file in response to verifying the file type of the received data file; and transmitting, by the data integrity server, the cleaned data file to a computing device for import of the cleaned data file. - View Dependent Claims (18, 19, 20)
-
Specification