Hardware-based system monitoring
C Golden, E Watkins - US Patent 11,010,233, 2021 - Google Patents
An exemplary monitoring system receives log data associated with an operation of a
hardware component, applies the log data as an input to an unsupervised machine learning …
hardware component, applies the log data as an input to an unsupervised machine learning …
Detection of writing to a non-header portion of a file as an indicator of a possible ransomware attack against a storage system
R Karr - US Patent 12,067,118, 2024 - Google Patents
An illustrative method includes detecting a request to perform an overwrite operation with
respect to a non-header portion of a file stored by a storage system and determining, based …
respect to a non-header portion of a file stored by a storage system and determining, based …
Security threat monitoring for a storage system
A Bansal, O Watkins, J Hayase, N Bhargava… - US Patent …, 2021 - Google Patents
An exemplary security threat monitoring system receives performance metric data
representative of a performance metric for a storage system, applies the performance metric …
representative of a performance metric for a storage system, applies the performance metric …
Traffic-based detection of a security threat to a storage system
A Miller, R Karr, A Kutner, PD Lee… - US Patent …, 2022 - Google Patents
An illustrative method includes a data protection system determining that a total amount of
read traffic and write traffic processed by a storage system during a time period exceeds a …
read traffic and write traffic processed by a storage system during a time period exceeds a …
Modify access restrictions in response to a possible attack against data stored by a storage system
R Child, R Karr - US Patent 11,755,751, 2023 - Google Patents
An illustrative method includes a data protection system determining that data stored by a
storage system is under a possible attack, detecting a modify request with respect to the …
storage system is under a possible attack, detecting a modify request with respect to the …
Multi-layer security threat detection for a storage system
PD Lee, R Karr, A Kutner, A Miller… - US Patent …, 2023 - Google Patents
2020-06-30 Assigned to PURE STORAGE, INC., A DELAWARE CORPORATION
reassignment PURE STORAGE, INC., A DELAWARE CORPORATION ASSIGNMENT OF …
reassignment PURE STORAGE, INC., A DELAWARE CORPORATION ASSIGNMENT OF …
Logical address based authorization of operations with respect to a storage system
EL Miller, R Karr - US Patent 11,500,788, 2022 - Google Patents
2020-09-30 Assigned to PURE STORAGE, INC., A DELAWARE CORPORATION
reassignment PURE STORAGE, INC., A DELAWARE CORPORATION ASSIGNMENT OF …
reassignment PURE STORAGE, INC., A DELAWARE CORPORATION ASSIGNMENT OF …
Disabling Malicious Browser Extensions
HM Gordon, MS Burriesci… - US Patent App. 15 …, 2017 - Google Patents
An extension manager can identify that a browser extension that is installed on a computing
device is configured to modify the operation of a browser application. The extension …
device is configured to modify the operation of a browser application. The extension …
Storage system snapshot retention based on encrypted data
BP Borowiec, R Karr - US Patent 11,520,907, 2022 - Google Patents
2021-01-28 Assigned to PURE STORAGE, INC., A DELAWARE CORPORATION
reassignment PURE STORAGE, INC., A DELAWARE CORPORATION ASSIGNMENT OF …
reassignment PURE STORAGE, INC., A DELAWARE CORPORATION ASSIGNMENT OF …
Host anomaly-based generation of snapshots
PR Massiglia, R Karr, J Colgrove - US Patent 12,050,689, 2024 - Google Patents
An illustrative method includes a data protection system detecting a request provided by a
host to perform an operation with respect to a storage system, detecting, based on the …
host to perform an operation with respect to a storage system, detecting, based on the …