Abstract: Exemplary security applications and systems are described herein. Such embodiments may be configured to provide backup functionality and ransomware protection for cloud storage systems. The described embodiments may monitor cloud storage systems to detect and classify various events. And the embodiments may perform any number of actions based on classified events, such as transmitting notifications to users, preventing a user or application from accessing the cloud storage system, and/or restoring infected files.
Abstract: Exemplary security applications and systems are described herein. Such embodiments may be configured to provide backup functionality and ransomware protection for cloud storage systems. The described embodiments may monitor cloud storage systems to detect and classify various events. And the embodiments may perform any number of actions based on classified events, such as transmitting notifications to users, preventing a user or application from accessing the cloud storage system, and/or restoring infected files.
Abstract: A decentralized system for issuing digital certificates to users and authenticating such users is provided. A certificate issuer system may verify a user and issue a digital certificate to the user. The certificate issuer system may also calculate authenticity information relating to the digital certificate and cause the same to be recorded in a distributed ledger system, for example, in the form of a smart contract. When the user attempts to access a cloud application, the application receives the digital certificate, calculates second authenticity information relating to the certificate, and compares the calculated authenticity information to that recorded in the distributed ledger system. Upon a determination that the calculated and recorded authenticity information match, an authentication confirmation may be generated and the user may be permitted to access the cloud application.
Abstract: Exemplary security applications and systems are described herein. Such embodiments may be configured to provide backup functionality and ransomware protection for cloud storage systems. The described embodiments may monitor cloud storage systems to detect and classify various events. And the embodiments may perform any number of actions based on classified events, such as transmitting notifications to users, preventing a user or application from accessing the cloud storage system, and/or restoring infected files.