System and method of utilizing a dedicated computer security service
First Claim
1. A method for utilizing computer security services, the method comprising:
- storing, in an electronic database, a plurality of policies that indicate when to use either a private cloud service or a public cloud service configured to analyze software objects using different types of security services to determine whether the software objects are malicious,wherein the policies relate to at least one of;
a predetermined time period when software of the private cloud service was last updated, a type of the at least one security service provided by the private cloud service, a type of data being sent in a request to the service, and a traffic quota of requests sent to at least one of the private or public service;
receiving a request from a client computer to access the at least one private or public cloud security service, wherein the request includes an unknown software object;
determining, by a processor, at least one parameter relating to the received request, including at least one of a type of the security service being accessed and a type of the software object included in the request, including one of a file, a link and a hash sum;
applying, by the processor, the at least one parameter to the plurality of policies to determine whether to transmit the request to the private cloud service or the public cloud service; and
based on the determination, transmitting the request to one of the private cloud service or the public cloud service.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are systems and method for utilizing a dedicated computer security service. An exemplary method includes storing in an electronic database rules that indicate when to use either a first cloud service or a second cloud service for one of the security services, receiving a request from a client computer to access the security service, determining parameters relating to the received request, applying the parameters to the plurality of rules to determine an instruction indicating whether to transmit the request to the first cloud service or the second cloud service; and transmitting the request to either the first cloud service or the second cloud service, based on the instruction, to use the at least one security service.
140 Citations
18 Claims
-
1. A method for utilizing computer security services, the method comprising:
-
storing, in an electronic database, a plurality of policies that indicate when to use either a private cloud service or a public cloud service configured to analyze software objects using different types of security services to determine whether the software objects are malicious, wherein the policies relate to at least one of;
a predetermined time period when software of the private cloud service was last updated, a type of the at least one security service provided by the private cloud service, a type of data being sent in a request to the service, and a traffic quota of requests sent to at least one of the private or public service;receiving a request from a client computer to access the at least one private or public cloud security service, wherein the request includes an unknown software object; determining, by a processor, at least one parameter relating to the received request, including at least one of a type of the security service being accessed and a type of the software object included in the request, including one of a file, a link and a hash sum; applying, by the processor, the at least one parameter to the plurality of policies to determine whether to transmit the request to the private cloud service or the public cloud service; and based on the determination, transmitting the request to one of the private cloud service or the public cloud service. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for utilizing computer security services, the system comprising:
-
an electronic database configured to store a plurality of policies that indicate when to use either a private cloud service or a public cloud service configured to analyze software objects using different types of security services to determine whether the software objects are malicious, wherein the policies relate to at least one of;
a predetermined time period when software of the private cloud service was last updated, a type of the at least one security service provided by the private cloud service, a type of data being sent in a request to the service, and a traffic quota of requests sent to at least one of the private or public service;a hardware processor configured to; receive a request from a client computer to access the at least one private or public cloud security service, wherein the request includes an unknown software object; determine at least one parameter relating to the received request, including at least one of a type of the security service being accessed and a type of the software object included in the request, including one of a file, a link and a hash sum; apply the at least one parameter to the plurality of policies to determine whether to transmit the request to the private cloud service or the public cloud service; and based on the determination, transmit the request to one of the private cloud service or the public cloud service. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable medium storing computer executable instructions for utilizing computer security services, including instructions for:
-
storing, in an electronic database, a plurality of policies that indicate when to use either a private cloud service or a public cloud service configured to analyze software objects using different types of security services to determine whether the software objects are malicious, wherein the policies relate to at least one of;
a predetermined time period when software of the private cloud service was last updated, a type of the at least one security service provided by the private cloud service, a type of data being sent in a request to the service, and a traffic quota of requests sent to at least one of the private or public service;receiving a request from a client computer to access the at least one private or public cloud security service, wherein the request includes an unknown software object; determining, by a processor, at least one parameter relating to the received request, including at least one of a type of the security service being accessed and a type of the software object included in the request, including one of a file, a link and a hash sum; applying, by the processor, the at least one parameter to the plurality of policies to determine whether to transmit the request to the private cloud service or the public cloud service; and based on the determination, transmitting the request to one of the private cloud service or the public cloud service. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification