Patent application number | Description | Published |
20150178066 | System, Method, and Computer Program Product For Managing Software Updates - A method performed by a monitoring tool in a computer system, the method including: identifying a software update applied to a plurality of computer system assets, retrieving a first status of a first one of the assets from a first time period before the software update was applied to the first asset, retrieving a second status of the first asset from a second time period after the software update was applied to the first asset, determining a first effectiveness of the software update for the first asset based on comparing the first status and the second status, and displaying within a Graphical User Interface (GUI) an identification of the software update, an identification of the first asset, and a recommendation for the software update based on the first effectiveness. | 06-25-2015 |
20150180739 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR MONITORING HEALTH OF COMPUTER SYSTEM ASSETS - A method of displaying health information of a system asset in a computer system, the method including: accessing a data log associated with the system asset, wherein the data log includes a store of the health information of the system asset, identifying a plurality of state entries in the store of the health information, each of the state entries including a timestamp and a state of the system asset at the respective time stamp, generating a timeline based on the state entries, the timeline having a plurality of chronological portions defined by the timestamps, wherein each portion of the timeline is assigned a visual cue based on a state associated with its respective state entries, and visually rendering the timeline upon a computer display. | 06-25-2015 |
20150180744 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR MONITORING COMPUTER SYSTEMINFRASTRUCTURE AND ASSETS - A method performed by a monitoring tool in a computer system, the method including: displaying a user interface including information regarding a first resource; running a correlation algorithm to determine whether other resources in the computer system show correlation for one or more performance metrics; selecting one or more other resources as suggestions based on results of the correlation algorithm; displaying selected resources in a list with the base resource and render a graph of performance metrics over time with performance data of the base resource and the suggested resources overlaid; and overlaying further performance data on the graph for a resource searched for, and selected by, the human user. | 06-25-2015 |
20150180745 | System, Method and Computer program Product for Accessing Hierarchical Nodes in Information Associated with Computer System Infrastructure and Assets - A method of retrieving hierarchical information, the method including receiving a request on an interface of a server, the request identifying a base node and an expansion node, the base node and the expansion node being hierarchically-arranged data objects in a data memory in communication with the server, parsing the request to determine the base node in the hierarchical information, parsing the request to determine the expansion node in the hierarchical information, retrieving a base record associated with the base node, retrieving an expansion record associated with the expansion node and referenced by the base record, inserting information from the base record and information from the expansion record into a response, and returning the response to a client computer in response to the request. | 06-25-2015 |
Patent application number | Description | Published |
20080271157 | Evaluating removal of access permissions - Methods and systems are provided for controlling access to a file system. A record of actual accesses by users of the file system is maintained. Before a user is removed from a set of users or before a privilege for a set of users to access a data element is removed, it is determined whether the actual recorded accesses of the user are allowed by residual access permissions that would remain after implementing the proposed removal of access permission. An error condition is generated if the proposed removal of the access permission would have prevented at least one of the actual accesses. In another aspect of the invention, the system determines if the users would have alternate access to the storage element following implementation of the proposal. | 10-30-2008 |
20090100058 | VISUALIZATION OF ACCESS PERMISSION STATUS - Queries regarding access permissions of users and rights to directories in a complex enterprise are executed in near real-time, using lookups to tables that form a condensed database maintained for each file server. User information is condensed by arranging users in user groups having common data access rights. Directory permissions storage is condensed by showing only distinctive permissions to a directory in a table entry, and referencing inherited permissions of parent directories. The tables indicate recursive and ancestral relationships among the user groups and directories. They are developed and updated in advance of any queries. A consolidated view of the query results is presented on a single display screen. Using the tables results can be obtained without exhaustive searches of large file system tables. | 04-16-2009 |
20090119298 | VISUALIZATION OF ACCESS PERMISSION STATUS - Queries regarding access permissions of users and rights to directories in a complex enterprise are executed in near realtime, using lookups to tables that form a condensed database maintained for each file server. User information is condensed by arranging users in user groups having common data access rights. Directory permissions storage is condensed by showing only distinctive permissions to a directory in a table entry, and referencing inherited permissions of parent directories. The tables indicate recursive and ancestral relationships among the user groups and directories. They are developed and updated in advance of any queries. A consolidated view of the query results is presented on a single display screen. Using the tables results can be obtained without exhaustive searches of large file system tables. | 05-07-2009 |
20090265780 | ACCESS EVENT COLLECTION - On-line and computationally efficient methods and systems are provided for back resolving path names of files from inode numbers during data access request processing. As a result, a near real-time recording of data access events is achieved, including identification of the user who performed the access, and the full path name of the data object that was accessed. In a typical application, access events are collected for use in access control of storage elements in complex organizational file systems. | 10-22-2009 |
20130246476 | VISUALIZATION OF ACCESS PERMISSION STATUS - Queries regarding access permissions of users and rights to directories in a complex enterprise are executed in near real-time, using lookups to tables that form a condensed database maintained for each file server. User information is condensed by arranging users in user groups having common data access rights. Directory permissions storage is condensed by showing only distinctive permissions to a directory in a table entry, and referencing inherited permissions of parent directories. The tables indicate recursive and ancestral relationships among the user groups and directories. They are developed and updated in advance of any queries. A consolidated view of the query results is presented on a single display screen. Using the tables results can be obtained without exhaustive searches of large file system tables. | 09-19-2013 |
20130246477 | VISUALIZATOIN OF ACCESS PERMISSION STATUS - Queries regarding access permissions of users and rights to directories in a complex enterprise are executed in near real-time, using lookups to tables that form a condensed database maintained for each file server. User information is condensed by arranging users in user groups having common data access rights. Directory permissions storage is condensed by showing only distinctive permissions to a directory in a table entry, and referencing inherited permissions of parent directories. The tables indicate recursive and ancestral relationships among the user groups and directories. They are developed and updated in advance of any queries. A consolidated view of the query results is presented on a single display screen. Using the tables results can be obtained without exhaustive searches of large file system tables. | 09-19-2013 |
20150040185 | VISUALIZATION OF ACCESS PERMISSION STATUS - Queries regarding access permissions of users and rights to directories in a complex enterprise are executed in near real-time, using lookups to tables that form a condensed database maintained for each file server. User information is condensed by arranging users in user groups having common data access rights. Directory permissions storage is condensed by showing only distinctive permissions to a directory in a table entry, and referencing inherited permissions of parent directories. The tables indicate recursive and ancestral relationships among the user groups and directories. They are developed and updated in advance of any queries. A consolidated view of the query results is presented on a single display screen. Using the tables results can be obtained without exhaustive searches of large file system tables. | 02-05-2015 |
20150058932 | VISUALIZATION OF ACCESS PERMISSION STATUS - Queries regarding access permissions of users and rights to directories in a complex enterprise are executed in near real-time, using lookups to tables that form a condensed database maintained for each file server. User information is condensed by arranging users in user groups having common data access rights. Directory permissions storage is condensed by showing only distinctive permissions to a directory in a table entry, and referencing inherited permissions of parent directories. The tables indicate recursive and ancestral relationships among the user groups and directories. They are developed and updated in advance of any queries. A consolidated view of the query results is presented on a single display screen. Using the tables results can be obtained without exhaustive searches of large file system tables. | 02-26-2015 |
Patent application number | Description | Published |
20140358921 | DELEGATING RESEMBLING DATA OF AN ORGANIZATION TO A LINKED DEVICE - A computerized method for pooling objects in a computerized system having a storage for objects, comprising identifying in the computerized system objects having an at least one common metadata entity associated with the objects, and including the identified objects in a pool of objects, and an apparatus for performing the same. | 12-04-2014 |
20150127656 | IN-ADVANCE INDEXING - A method for in-advance obtaining properties of objects of a computerized system, the method comprising receiving a request for properties of a first object, and responsively providing the requested properties along with properties of an at least one another object that are similar to the properties of the first object, wherein the properties of the at least one another object are similar to the properties of the first object by having at least one element of properties that are common therebetween, and wherein the method is carried out by an at least one apparatus component of the computerized system, and an apparatus for performing the same. | 05-07-2015 |
20150178335 | ON-DEMAND INDEXING - A method for indexing objects in a computerized system having an index, comprising identifying in the computerized system an at least one indexed object that meets an at least one criterion related to contents of the at least one indexed object, detecting an at least one non-indexed object having a property similar to an at least one property of the at least one indexed object that was identified, and indexing the at least one non-indexed object in the index, wherein the method is performed by the computerized system, and an apparatus for performing the same. | 06-25-2015 |
20150254265 | METHOD AND APPRATUS FOR SCALABLE EVENTS HANDLING IN A MULTI-PLATFORM SYSTEM - A method for event handling in a multi-platform system, comprising acquiring an event of a file access from the multi-platform system, processing the event taking account of an auxiliary data to decide an action and activating the action, and an apparatus for performing the same. | 09-10-2015 |
20150278307 | DELEGATING PORTIONS OF AN INDEX OF AN ENTERPRISE - A method for enabling querying independently of a computerized system about objects thereof, comprising providing a computer linked to the computerized system with replications of entries of an index of the computerized system that comprise data derived from contents of the objects, where said entries correspond to a subset of objects that are identified as related objects, thereby enabling the computer, based on the provided replications, to query locally and independently of the computerized system about the related objects according to contents thereof, and an apparatus for performing the same. | 10-01-2015 |
20150347446 | POLICIES FOR OBJECTS COLLABORATIONS - A computerized method for managing collaboration in a computerized system, comprising repeatedly applying any one of rules defined in the computerized system pertaining to objects of the computerized system, wherein the any one of the rules comprises an at least one condition concerning collaborativity of an object to which the any one of the rules pertains and the at least one condition is based on metadata of the object, by evaluating any one of conditions in the any one of the rules, thereby determining collaborativity of any one of the objects to which the any one of the rules pertains, and an apparatus for performing the same. | 12-03-2015 |
20160028734 | GRANTING COLLABORATION PERMISSIONS IN A COMPUTERIZED SYSTEM - A computerized method for obtaining collaboration with an object of a computerized system, comprising receiving at an owner party that owns the object a request from a requesting party employing a requesting mechanism of the computerized system to collaborate the object with a recipient party, providing by the owner party a decision to the recipient party whether to grant the recipient party to collaborate with the object, and registering, in a data construct of the computerized system, data comprising a status indicative of the decision, thereby providing for the computerized system to determine whether to allow the recipient party to collaborate with the object, wherein the method is performed on an at least one computer of the computerized system configured to perform the method, and an apparatus for performing the same. | 01-28-2016 |
20160055163 | METHOD AND APPARATUS FOR ENTERPRISE-LEVEL FILTERED SEARCH - A method for a secure search in a computerized system having a storage, comprising searching for objects in the storage of the computerized system according to search criteria provided by a user wherein the criteria comprise at least one attribute of the objects, identifying objects that meet the criteria and displaying representations respective of identified objects that are accessible to the user, and an apparatus for performing the same. | 02-25-2016 |
20160088065 | DEMANDED DOWNLOADS BY LINKS - A method for handling data of a computerized system at a remote computer linked to the computerized system, the method comprising subject to applying an at least one rule fetching from the computerized system to the remote computer a stub of an object of the computerized system generated according to the location of the object, actuating the stub, thereby downloading a copy of the object from the computerized system to the remote computer, and consequent to a modification of the copy of the object in the remote computer, updating the object in the computerized system according the modification. | 03-24-2016 |
Patent application number | Description | Published |
20110061093 | TIME DEPENDENT ACCESS PERMISSIONS - A network object access permission management system useful with a computer network including at least one server and a multiplicity of clients, the system including an access permissions subsystem which governs access permissions of users to network objects in the computer network in real time and a future condition based permissions instruction subsystem providing instructions to the access permission subsystem to grant or revoke access permissions of the users to network objects in real time in response to future fulfillment of conditions which are established by an operator in advance. | 03-10-2011 |
20110061111 | ACCESS PERMISSIONS ENTITLEMENT REVIEW - A system for operating an enterprise computer network including multiple network objects, said system comprising monitoring and collection functionality for obtaining continuously updated information regarding at least one of access permissions and actual usage of said network objects, and entitlement review by owner functionality operative to present to at least one owner of at least one network object a visually sensible indication of authorization status including a specific indication of users which were not yet authorized by said at least one owner of said at least one network object. | 03-10-2011 |
20110184989 | AUTOMATIC RESOURCE OWNERSHIP ASSIGNMENT SYSTEMS AND METHODS - An automatic resource ownership assignment system, the system including resource ownership indicators definition functionality operative to allow an operator of the system to define resource ownership indicators, automatic resource ownership recommendation functionality operative to provide, to at least one user of the system, a recommendation to assign ownership of at least one resource to a potential owner, based on the resource ownership indicators, and automatic resource ownership assignment functionality which, responsive to predetermined at least partial approval of the at least one recommendation by the at least one user and approval of said at least one recommendation by the potential owner, is operative to automatically assign ownership of the at least one resource to the potential owner. | 07-28-2011 |
20110296490 | AUTOMATIC REMOVAL OF GLOBAL USER SECURITY GROUPS - A system for automatically replacing a user security group-based computer security policy by a computer security policy based at least partially on actual access, including a learned access permissions subsystem operative to learn current access permissions of users to network objects in an enterprise computer environment and to provide an indication of which users are members of which user security groups having access permissions to which network objects, a learned actual access subsystem operative to learn actual access history of users in the enterprise to the network objects and to provide indications of which users have had actual access to which network objects, and a computer security policy administration subsystem, receiving indications from the learned access permission subsystem and the learned actual access subsystem and being operative to automatically replace pre-selected user-security group-based access permissions with at least partially actual access-based access permissions without disrupting access to network objects. | 12-01-2011 |
20120173583 | AUTOMATION FRAMEWORK - An information technology management system for use in enterprise data management including a metadata supply subsystem which receives metadata from a network, an access permissions management subsystem for managing access permissions to data elements in the network and an access permissions management operation implementation subsystem which automatically governs the operation of the access permissions management subsystem, the access permissions management operation implementation subsystem having at least one of first, second, third and fourth modes of operation. The first mode of operation includes operating the access permissions management subsystem, the second mode of operation includes simulating the operation of the access permissions management subsystem, the third mode of operation included providing a report of proposed changes in access permissions and the fourth mode of operation includes providing an actionable report of multiple steps in implementation of proposed changes in access permissions to data elements for approval. | 07-05-2012 |
20120179681 | DATA CLASSIFICATION - A method for managing data in an enterprise by identifying data of interest from among a multiplicity of data elements in an enterprise, the method including characterizing data of interest at least by at least one non-content based data identifier thereof and at least one access metric thereof, the at least one access metric being selected from data access permissions and actual data access history and selecting data of interest by considering only data elements from among the multiplicity of data elements which have the at least one non-content based data identifier thereof and the at least one access metric thereof. | 07-12-2012 |
20120191646 | DATA TAGGING - A method for characterizing data elements in an enterprise including ascertaining at least one of an access metric and a data identifier for each of a plurality of data elements and employing the at least one of an access metric and a data identifier to automatically apply a metatag to ones of the plurality of data elements. | 07-26-2012 |
20120215780 | ENTERPRISE LEVEL DATA MANAGEMENT - A system for identifying data of interest from among a multiplicity of data elements residing on multiple platforms in an enterprise, the system including background data characterization functionality characterizing the data of interest at least by at least one content characteristic thereof and at least one access metric thereof, the at least one access metric being selected from data access permissions and actual data access history and near real time data matching functionality selecting the data of interest by considering only data elements which have the at least one content characteristic thereof and the at least one access metric thereof from among the multiplicity of data elements. | 08-23-2012 |
20120221550 | ENTERPRISE LEVEL DATA MANAGEMENT - A system for identifying data of interest from among a multiplicity of data elements residing on multiple platforms in an enterprise, the system including background data characterization functionality characterizing the data of interest at least by at least one content characteristic thereof and at least one access metric thereof, the at least one access metric being selected from data access permissions and actual data access history and near real time data matching functionality selecting the data of interest by considering only data elements which have the at least one content characteristic thereof and the at least one access metric thereof from among the multiplicity of data elements. | 08-30-2012 |
20120271853 | ACCESS PERMISSIONS MANAGEMENT SYSTEM AND METHOD - An access permissions management system including a hierarchical access permissions repository including access permissions relating to data elements arranged in a data element hierarchy, wherein some of the data elements have only access permissions which are inherited from ancestral data elements, some of the multiplicity of data elements are prevented from having inherited access permissions and thus have only unique access permissions which are not inherited and some of the data elements are not prevented from having inherited access permissions and have not only inherited access permissions but also unique access permissions which are not inherited, some of which unique access permissions possibly being redundant with inherited access permissions, and an access permissions redundancy prevention engine operative to ascertain which of the unique access permissions are redundant with inherited access permissions and not to store the unique access permissions which are redundant with inherited access permissions in the repository. | 10-25-2012 |
20120271855 | ACCESS PERMISSIONS MANAGEMENT SYSTEM AND METHOD - In a hierarchical access permissions environment, a method for enabling efficient management of project-wise permissions including maintaining project-wise lists of network objects, access permissions to which cannot be managed together via a hierarchical folder structure and employing the project-wise lists of network objects to make project-wise changes in access permissions to the network objects without the need to individually modify access permissions to individual ones of the network objects. | 10-25-2012 |
20120272294 | ACCESS PERMISSIONS MANAGEMENT SYSTEM AND METHOD - A system for providing bi-directional visualization of authority of users over SACs in an enterprise-wide network, the system including functionality for providing user-wise visualization of the authority of a given user over at least one SAC in respect of which the user has authority, and functionality for providing SAC-wise visualization for a given SAC of the authority of at least one user over the given SAC. | 10-25-2012 |
20120291100 | AUTOMATIC RESOURCE OWNERSHIP ASSIGNMENT SYSTEM AND METHOD - A method for automatic folder ownership assignment, including ascertaining which first folders, among a first multiplicity of folders, have at least one of modify and write permissions to non-IT administration entities, adding the first folders to a list of candidates for ownership assignment, defining a second multiplicity of folders which is a subset of the first multiplicity of folders and not including the first folders and descendents and ancestors thereof, ascertaining which second folders among the second multiplicity of folders, have permissions to non-IT administration entities, adding the second folders to the candidates, defining a third multiplicity of folders, which is a subset of the second multiplicity of folders and not including the second folders and descendents and ancestors thereof, ascertaining which third folders among the third multiplicity of folders are topmost folders, adding the third folders to the candidates, and recommending possible assignment of ownership of the candidates. | 11-15-2012 |
20130074100 | METHOD AND APPRATUS FOR EVENTS HANDLING IN A MULTI-PLATFORM SYSTEM - A method for event handling in a multi-platform system, comprising acquiring an event of a file access from the multi-platform system, processing the event taking account of an auxiliary data to decide an action and activating the action, and an apparatus for performing the same. | 03-21-2013 |
20130117314 | AUTOMATIC RESOURCE OWNERSHIP ASSIGNMENT SYSTEM AND METHOD - A method for automatic folder ownership assignment, including ascertaining which first folders, among a first multiplicity of folders, have at least one of modify and write permissions to non-IT administration entities, adding the first folders to a list of candidates for ownership assignment, defining a second multiplicity of folders which is a subset of the first multiplicity of folders and not including the first folders and descendents and ancestors thereof, ascertaining which second folders among the second multiplicity of folders, have permissions to non-IT administration entities, adding the second folders to the candidates, defining a third multiplicity of folders, which is a subset of the second multiplicity of folders and not including the second folders and descendents and ancestors thereof, ascertaining which third folders among the third multiplicity of folders are topmost folders, adding the third folders to the candidates, and recommending possible assignment of ownership of the candidates. | 05-09-2013 |
20130117315 | AUTOMATIC RESOURCE OWNERSHIP ASSIGNMENT SYSTEM AND METHOD - A method for automatic folder ownership assignment, including ascertaining which first folders, among a first multiplicity of folders, have at least one of modify and write permissions to non-IT administration entities, adding the first folders to a list of candidates for ownership assignment, defining a second multiplicity of folders which is a subset of the first multiplicity of folders and not including the first folders and descendents and ancestors thereof, ascertaining which second folders among the second multiplicity of folders, have permissions to non-IT administration entities, adding the second folders to the candidates, defining a third multiplicity of folders, which is a subset of the second multiplicity of folders and not including the second folders and descendents and ancestors thereof, ascertaining which third folders among the third multiplicity of folders are topmost folders, adding the third folders to the candidates, and recommending possible assignment of ownership of the candidates. | 05-09-2013 |
20130138683 | SYSTEMS AND METHODS OF AUTOMATIC GENERATION AND EXECUTION OF DATABASE QUERIES - There is thus provided in accordance with a preferred embodiment of the present invention a system for automatically generating and executing database queries, the system including a user interface operative to allow a user to select at least one selected predefined database report from a list of predefined database reports and automatic database query generation functionality operative to automatically generate a database query corresponding to the at least one selected predefined database report, the database query including at least one predefined combinable page. | 05-30-2013 |
20130263221 | METHOD AND APPARATUS FOR ENTERPRISE-LEVEL FILTERED SEARCH - A method for a secure search in a computerized system having a storage, comprising searching for objects in the storage of the computerized system according to search criteria provided by a user wherein the criteria comprise at least one attribute of the objects, identifying objects that meet the criteria and displaying representations respective of identified objects that are accessible to the user, and an apparatus for performing the same. | 10-03-2013 |
20130268562 | ENTERPRISE LEVEL DATA ELEMENT REVIEW SYSTEMS AND METHODOLOGIES - An enterprise level data element review system including a data access event collection subsystem operative to collect data access event notifications relating to ones of a multiplicity of data elements, a data element metadata modification subassembly receiving an output from the data access event collection subsystem and providing a script indicating which data elements have had a metadata modification over a given period of time, and a data element dancer operative to collect at least one of metadata and access permissions for a plurality of data elements which is substantially less than the multiplicity of data elements and is selected on the basis of the script. | 10-10-2013 |
20140006453 | AUTOMATIC RESOURCE OWNERSHIP ASSIGNMENT SYSTEM AND METHOD | 01-02-2014 |
20140040384 | EMAIL DISTRIBUTION LIST MEMBERSHIP GOVERNANCE METHOD AND SYSTEM - A computer-implemented method for controlling email distribution list membership in an enterprise email system, including the steps of monitoring and collecting continuously updated information regarding access to email distribution lists of an email system by members of the email distribution lists, ascertaining that a particular member of at least one of the email distribution lists has not accessed the at least one of the email distribution lists for a predetermined period of time, and responsive to the ascertaining, at least one of recommending revoking membership of the particular member to the at least one of the email distribution lists and automatically revoking membership of the particular member to the at least one of the email distribution lists. | 02-06-2014 |
20140059654 | ACCESS PERMISSIONS ENTITLEMENT REVIEW - A system for operating an enterprise computer network including multiple network objects, said system comprising monitoring and collection functionality for obtaining continuously updated information regarding at least one of access permissions and actual usage of said network objects, and entitlement review by owner functionality operative to present to at least one owner of at least one network object a visually sensible indication of authorization status including a specific indication of users which were not yet authorized by said at least one owner of said at least one network object. | 02-27-2014 |
20140101495 | ENTERPRISE LEVEL DATA ELEMENT REVIEW SYSTEMS AND METHODOLOGIES - An enterprise level data element review system including a data access event collection subsystem operative to collect data access event notifications relating to ones of a multiplicity of data elements, a data element metadata modification subassembly receiving an output from the data access event collection subsystem and providing a script indicating which data elements have had a metadata modification over a given period of time, and a data element dancer operative to collect at least one of metadata and access permissions for a plurality of data elements which is substantially less than the multiplicity of data elements and is selected on the basis of the script. | 04-10-2014 |
20150026778 | ACCESS PERMISSIONS MANAGEMENT SYSTEM AND METHOD - In a hierarchical access permissions environment, a method for enabling efficient management of project-wise permissions including maintaining project-wise lists of network objects, access permissions to which cannot be managed together via a hierarchical folder structure and employing the project-wise lists of network objects to make project-wise changes in access permissions to the network objects without the need to individually modify access permissions to individual ones of the network objects. | 01-22-2015 |
20150186392 | AUTOMATIC RESOURCE OWNERSHIP ASSIGNMENT SYSTEMS AND METHODS - An automatic resource ownership assignment system, the system including resource ownership indicators definition functionality operative to allow an operator of the system to define resource ownership indicators, automatic resource ownership recommendation functionality operative to provide, to at least one user of the system, a recommendation to assign ownership of at least one resource to a potential owner, based on the resource ownership indicators, and automatic resource ownership assignment functionality which, responsive to predetermined at least partial approval of the at least one recommendation by the at least one user and approval of said at least one recommendation by the potential owner, is operative to automatically assign ownership of the at least one resource to the potential owner. | 07-02-2015 |
20150304335 | ACCESS PERMISSIONS ENTITLEMENT REVIEW - A system for operating an enterprise computer network including multiple network objects, said system comprising monitoring and collection functionality for obtaining continuously updated information regarding at least one of access permissions and actual usage of said network objects, and entitlement review by owner functionality operative to present to at least one owner of at least one network object a visually sensible indication of authorization status including a specific indication of users which were not yet authorized by said at least one owner of said at least one network object. | 10-22-2015 |
20150363427 | AUTOMATIC RESOURCE OWNERSHIP ASSIGNMENT SYSTEM AND METHOD - A method for automatic folder ownership assignment, including ascertaining which first folders, among a first multiplicity of folders, have at least one of modify and write permissions to non-IT administration entities, adding the first folders to a list of candidates for ownership assignment, defining a second multiplicity of folders which is a subset of the first multiplicity of folders and not including the first folders and descendents and ancestors thereof, ascertaining which second folders among the second multiplicity of folders, have permissions to non-IT administration entities, adding the second folders to the candidates, defining a third multiplicity of folders, which is a subset of the second multiplicity of folders and not including the second folders and descendents and ancestors thereof, ascertaining which third folders among the third multiplicity of folders are topmost folders, adding the third folders to the candidates, and recommending possible assignment of ownership of the candidates. | 12-17-2015 |
20150365368 | DATA GOVERNANCE FOR EMAIL SYSTEMS - An enterprise email governance system including an enterprise-wide email communication item events monitoring subsystem providing at least near real time indications of email communication item events and an enterprise-wide email communication item events storage subsystem receiving inputs from the monitoring subsystem and providing at least near real time user accessibility to the email communication item events. | 12-17-2015 |