US 12,141,270 B2
Methods and apparatus for comprehensive user-centric protection of digital assets
Srikanth Nalluri, Bangalore Karnataka (IN); Dattatraya Kulkarni, Bangalore Karnataka (IN); Raghavendra Hebbalalu, Bangalore Karnataka (IN); Pravat Lall, San Jose, CA (US); Jitesh Dattani, Bangalore Karnataka (IN); and Samrat Chitta, Bangalore Karnataka (IN)
Assigned to McAfee, LLC, San Jose, CA (US)
Filed by McAfee, LLC, San Jose, CA (US)
Filed on Aug. 27, 2021, as Appl. No. 17/459,979.
Claims priority of provisional application 63/151,533, filed on Feb. 19, 2021.
Prior Publication US 2022/0269776 A1, Aug. 25, 2022
Int. Cl. G06F 21/54 (2013.01); G06F 21/55 (2013.01)
CPC G06F 21/54 (2013.01) [G06F 21/554 (2013.01); G06F 21/556 (2013.01)] 25 Claims
OG exemplary drawing
 
1. An apparatus comprising:
at least one memory;
instructions in the apparatus; and
processor circuitry including control circuitry to control data movement within the processor circuitry, arithmetic and logic circuitry to perform one or more operations on the data, and one or more registers to store a result of one or more of the operations, the processor circuitry to execute the instructions to:
identify digital assets associated with a protection threat surface, the digital assets including at least one cloud asset and at least one local asset, the at least one local asset including at least one user device;
detect protection events corresponding to threats associated with the at least one cloud asset and the at least one local asset;
determine protection vectors associated with the at least one cloud asset and the at least one local asset based on the protection events, the protection vectors corresponding to protection capabilities associated with the at least one cloud asset and the at least one local asset;
map a first protection event of the detected protection events to one or more of the protection vectors;
map a second protection event of the detected protection events to one or more of the protection vectors;
determine a protection efficacy score indicative of an overall protection posture of the protection threat surface based on the protection vectors corresponding to the protection capabilities associated with the at least one cloud asset and the at least one local asset;
determine whether a remediating action is to be implemented based on at least one of the protection vectors or the protection efficacy score; and
in response to determining that the remediating action is to be implemented, trigger performance or presentation of the remediating action at one or more of the digital assets.