Policy management
First Claim
Patent Images
1. A method comprising:
- organizing a number of applications into a number of application types;
providing a policy management service for an enterprise network, the policy management service configured to provide protection services to one or more endpoints in the enterprise network based on the application types;
detecting an application executing on one of the endpoints;
disassembling a binary executable for the application to recreate functional blocks of code for the application;
grouping a number of the functional blocks into a phenotype;
categorizing the application into one of the application types based on the phenotype; and
applying the protection services to the endpoint based on the one of the application types of the application.
5 Assignments
0 Petitions
Accused Products
Abstract
In embodiments of the present invention improved capabilities are described for the operation of a threat management facility, wherein the threat management facility may provide for a plurality of computer asset protection services to a corporate computer network. The threat management facility may provide a policy management service as one of the plurality of protection services, wherein the policy management service may be adapted to provide corporate policy updates to a plurality of computer facilities associated with the corporate computer network. In addition, the corporate policy updates, and a related corporate policy, may relate to the acceptability of an operation of a computer application.
-
Citations
20 Claims
-
1. A method comprising:
-
organizing a number of applications into a number of application types; providing a policy management service for an enterprise network, the policy management service configured to provide protection services to one or more endpoints in the enterprise network based on the application types; detecting an application executing on one of the endpoints; disassembling a binary executable for the application to recreate functional blocks of code for the application; grouping a number of the functional blocks into a phenotype; categorizing the application into one of the application types based on the phenotype; and applying the protection services to the endpoint based on the one of the application types of the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product comprising non-transitory computer executable code embodied in a computer readable medium that, when executing on one or more computing devices, performs the steps of:
-
providing a policy management service for an enterprise network, the policy management service configured to provide protection services to one or more endpoints in the enterprise network based on application types; detecting an application executing on one of the endpoints; disassembling a binary executable for the application to recreate functional blocks of code for the application; forming a list of genes associated with the functional blocks, each gene corresponding to an identifying characteristic of the application; matching phenotypes against the list of genes to identify a phenotype; categorizing the application into one of a number of application types based on the phenotype; and conditionally limiting network access by the application based on the one of the number of application types of the application.
-
-
20. A system comprising:
-
a threat management facility storing information in a database organizing a number of applications into a number of application types, the threat management facility providing a policy management service including protection services for one or more endpoints of an enterprise network; a data network; and an endpoint coupled to the threat management facility through the data network the endpoint configured by computer executable code stored in a memory of the endpoint to perform the steps of detecting an application executing on the one of the endpoints, disassembling an executable for the application to recreate functional blocks of code for the application, categorizing the application into one of the application types based on phenotypes derived from the functional blocks, and applying the protection services to the endpoint based on the one of the application types of the application.
-
Specification