Systems and methods for reputation-based application of data-loss prevention policies
First Claim
Patent Images
1. A computer-implemented method for data-loss prevention, the method comprising:
- identifying data associated with a user;
determining that the data associated with the user is subject to a data-loss-prevention scan;
identifying a data-loss-prevention reputation associated with the user;
determining that the data-loss-prevention reputation associated with the user meets a predetermined risk threshold;
in response to determining that the data-loss-prevention reputation associated with the user meets the predetermined risk threshold, modifying at least one aspect of the data-loss-prevention scan in accordance with the data-loss-prevention reputation associated with the user;
applying the modified data-loss-prevention scan to the data associated with the user;
wherein each step of the computer-implemented method is performed by a computing device comprising at least one processor.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for data-loss prevention may include: 1) identifying data associated with a user, 2) determining that the data is subject to a data-loss-prevention scan, 3) identifying a data-loss-prevention reputation associated with the user, and then 4) performing a data-loss-prevention operation based at least in part on the data-loss-prevention reputation associated with the user. Various other methods, systems, and computer-readable media are also disclosed.
-
Citations
19 Claims
-
1. A computer-implemented method for data-loss prevention, the method comprising:
-
identifying data associated with a user; determining that the data associated with the user is subject to a data-loss-prevention scan; identifying a data-loss-prevention reputation associated with the user; determining that the data-loss-prevention reputation associated with the user meets a predetermined risk threshold; in response to determining that the data-loss-prevention reputation associated with the user meets the predetermined risk threshold, modifying at least one aspect of the data-loss-prevention scan in accordance with the data-loss-prevention reputation associated with the user; applying the modified data-loss-prevention scan to the data associated with the user; wherein each step of the computer-implemented method is performed by a computing device comprising at least one processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 18, 19)
-
-
11. A system for data-loss prevention, the system comprising:
-
an identification module programmed to identify data associated with a user; a determination module programmed to determine that the data associated with the user is subject to a data-loss-prevention scan; a reputation module programmed to identify a data-loss-prevention reputation associated with the user; a data-loss-prevention module programmed to; determine that the data-loss-prevention reputation associated with the user meets a predetermined risk threshold; in response to determining that the data-loss-prevention reputation associated with the user meets the predetermined risk threshold, modify at least one aspect of the data-loss-prevention scan in accordance with the data-loss-prevention reputation associated with the user; apply the modified data-loss-prevention scan to the data associated with the user; at least one processor configured to execute the identification module, the determination module, the reputation module, and the data-loss-prevention module. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable-storage medium comprising one or more computer-executable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
identify data associated with a user; determine that the data associated with the user is subject to a data-loss-prevention scan; identify a data-loss-prevention reputation associated with the user; determine that the data-loss-prevention reputation associated with the user meets a predetermined risk threshold; in response to determining that the data-loss-prevention reputation associated with the user meets the predetermined risk threshold, modify at least one aspect of the data-loss-prevention scan in accordance with the data-loss-prevention reputation associated with the user; apply the modified data-loss-prevention scan to the data associated with the user.
-
Specification