US 11,748,511 B2
Protecting data based on context of data movement operation
Paul Normand James Berube, Edmonton (CA); and Victor Salamon, Edmonton (CA)
Assigned to EMC IP Holding Company LLC, Hopkinton, MA (US)
Filed by EMC IP Holding Company LLC, Hopkinton, MA (US)
Filed on Mar. 31, 2021, as Appl. No. 17/218,940.
Prior Publication US 2022/0318421 A1, Oct. 6, 2022
Int. Cl. G06F 21/62 (2013.01); G06F 21/54 (2013.01); G06F 21/44 (2013.01); G06F 21/78 (2013.01); G06F 21/53 (2013.01)
CPC G06F 21/6245 (2013.01) [G06F 21/44 (2013.01); G06F 21/54 (2013.01); G06F 21/6218 (2013.01); G06F 21/78 (2013.01); G06F 21/53 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
identifying a context of a data movement operation based at least in part on a source and an indicated destination of data associated with the data movement operation;
applying one or more data protection policies to the data movement operation based at least in part on the identified context, wherein a given data protection policy comprises one or more indications of one or more content scanners that are configured to detect data belonging to one or more regulated data classes;
selecting and executing at least a portion of the one or more content scanners based at least in part on a scrutiny level computed for the data movement operation; and
in response to detecting data associated with the data movement operation that belongs to at least one of the regulated data classes, performing one or more automated remedial actions associated with the at least one regulated data class;
wherein the method is performed by at least one processing device comprising a processor coupled to a memory.