System and method for enhanced security and management mechanisms for enterprise administrators in a cloud-based environment
First Claim
1. A method comprising:
- receiving a file to a location in a content repository of a cloud-based environment, wherein the content repository stores data for multiple users associated with an enterprise account;
permitting a third-party to access an activity log database in real-time to monitor events and permitting the third-party to scan the file as it is being uploaded to the content repository in the cloud-based environment, said each permitting via an application programming interface (API) of the cloud-based environment, wherein the third-party request identifies a security-as-a-service provider external to the content repository;
permitting the security-as-a-service provider access to the file in the content repository for scanning the file via the API, wherein the API provides rules customized by the security-as-a-service provider for identifying files containing sensitive information; and
receiving an indication from the third-party whether the file contains sensitive information.
6 Assignments
0 Petitions
Accused Products
Abstract
A cloud-based platform (e.g., cloud-based collaboration and/or storage platform/service) is described that provides administrators with better visibility into content and activity across an enterprise account via advanced search tools and activity reports. Administrator tools are also provided that allow for actively managing content and passively monitoring content with real-time alerts sent to the administrator if usage of the cloud-based platform changes within the enterprise account. A reporting API is also supported by the cloud-based platform to permit the platform'"'"'s activity logs to be retrieved by a third-party platform. Additionally, administrators are provided with the option to select two-step login verification of enterprise account users.
-
Citations
28 Claims
-
1. A method comprising:
-
receiving a file to a location in a content repository of a cloud-based environment, wherein the content repository stores data for multiple users associated with an enterprise account; permitting a third-party to access an activity log database in real-time to monitor events and permitting the third-party to scan the file as it is being uploaded to the content repository in the cloud-based environment, said each permitting via an application programming interface (API) of the cloud-based environment, wherein the third-party request identifies a security-as-a-service provider external to the content repository; permitting the security-as-a-service provider access to the file in the content repository for scanning the file via the API, wherein the API provides rules customized by the security-as-a-service provider for identifying files containing sensitive information; and receiving an indication from the third-party whether the file contains sensitive information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory machine-readable storage medium having stored thereon instructions which, when executed by a processor, causes the processor to:
-
receive a file to a location in a content repository of a cloud-based environment, wherein the content repository stores data for multiple users associated with an enterprise account; permit a third-party to access an activity log database in real-time to monitor events and permit the third-party to scan the file as it is being uploaded to the content repository in the cloud-based environment, said each permitting via an application programming interface (API) of the cloud-based environment, wherein the third-party request identifies a security-as-a-service provider external to the content repository; permit the security-as-a-service provider access to the file in the content repository for scanning the file via the API, wherein the API provides rules customized by the security-as-a-service provider for identifying files containing sensitive information; and receive an indication from the third-party whether the file contains sensitive information. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system comprising:
-
a processor; a memory having stored thereon instructions which, when executed by the processor, cause the system to; receive a file to a location in a content repository of a cloud-based environment, wherein the content repository stores data for multiple users associated with an enterprise account; permit a third-party to access an activity log database in real-time to monitor events and permit the third-party to scan the file as it is being uploaded to the content repository in the cloud-based environment, said each permitting via an application programming interface (API) of the cloud-based environment, wherein the third-party request identifies a security-as-a-service provider external to the content repository; permit the security-as-a-service provider access to the file in the content repository for scanning the file via the API, wherein the API provides rules customized by the security-as-a-service provider for identifying files containing sensitive information; and receive an indication from the third-party whether the file contains sensitive information. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
Specification