SYSTEMS AND METHODS THAT DETECT SENSITIVE DATA LEAKAGES FROM APPLICATIONS
First Claim
1. A computer program product embodied in a computer readable medium that, when executing on one or more computers, performs the steps of:
- selecting a software application to be monitored, wherein the selection is based at least in part on the basis that the software application controls confidential information, and where the software application is at least one of an end-point application, a web application, and a cloud application;
monitoring the software application by determining an output data quantity that is written from the software application; and
comparing the output data quantity with a predetermined quantity, wherein the predetermined quantity is indicative of sensitive data being written from the software application.
4 Assignments
0 Petitions
Accused Products
Abstract
In embodiments, the present invention may be a computer program product embodied in a computer readable medium that, when executing on one or more computers, may select a software application for monitoring, where the selection may be based at least in part on the basis that the software application controls confidential information, and where the software application may be an end-point application, a web application, a cloud application, and the like. The present invention may monitor the software application by determining an output data quantity that may be written from the software application. The output data may then be compared with a predetermined quantity, where the predetermined quantity may be indicative of confidential information being written from the software application.
242 Citations
2 Claims
-
1. A computer program product embodied in a computer readable medium that, when executing on one or more computers, performs the steps of:
-
selecting a software application to be monitored, wherein the selection is based at least in part on the basis that the software application controls confidential information, and where the software application is at least one of an end-point application, a web application, and a cloud application; monitoring the software application by determining an output data quantity that is written from the software application; and comparing the output data quantity with a predetermined quantity, wherein the predetermined quantity is indicative of sensitive data being written from the software application. - View Dependent Claims (2)
-
Specification