Security and compliance alerts based on content, activities, and metadata in cloud
A content metadata and metadata technology, applied in the field of security and compliance alerts based on content, activities, and metadata in the cloud, can solve problems such as false negatives, false positives, and deletion of pointed threats
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0014] As briefly described above, embodiments relate to security and compliance alerts based on content, activity, and metadata in the cloud. In some examples, correlation signals associated with one or more of a tenant's stored content, content metadata, and activity associated with stored content may be analyzed and based on alert thresholds or broader "anomaly" patterns detection to determine the alert. Different recipients for different alerts or alert levels can be designated and alerts sent to the designated recipients. Alerts can also be displayed through the protection service's alert management dashboard. Alerts and analysis results can also be provided to the policy engine for use in tuning or creating rules, alert thresholds, and signal collection / analysis within policies. Postmortem investigations can also be initiated following an alert.
[0015] In the following detailed description, reference is made to the accompanying drawings which form a part hereof, and...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


