×

Security policy unification across different security products

  • US 10,116,702 B2
  • Filed: 04/27/2017
  • Issued: 10/30/2018
  • Est. Priority Date: 01/20/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • displaying multiple icons, each icon representing an actor or a resource in a networking environment;

    defining a generic security policy by receiving user input in the form of a line drawn between a first icon representing an actor and a second icon representing a resource to control abilities between the actor and the resource, wherein the line represents;

    that abilities between the actor and the resource are allowed or denied when the line has a first characteristic and a second characteristic, respectively;

    that traffic between the actor and the resource is to be monitored or is not to be monitored when the line has a third characteristic and a fourth characteristic that include respective colors of the line that indicate that the traffic is to be monitored or is not to be monitored, respectively; and

    a level of security risk when the line has a fifth characteristic that includes a color of the line that represents the level of the security risk;

    translating the generic security policy to multiple native security policies each of which is based on a corresponding one of multiple native policy models associated with corresponding ones of multiple security devices; and

    supplying data descriptive of the multiple native security policies to the corresponding ones of the security devices to configure the corresponding ones of the security devices to implement the native security policies.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×