Policy management
First Claim
1. A computer program product comprising non-transitory computer executable code embodied in a computer readable medium that, when executing on one or more computing devices, performs the steps of:
- organizing a number of applications into a number of application types including at least a messaging category, an electronic mail category, a word processing category, a database category, and a browser category;
providing a policy management service for an enterprise network, the policy management service configured to provide protection services to one or more endpoints of the enterprise network by restricting usage of endpoint resources based on the number of application types and a connection type;
detecting an application executing on one of the endpoints;
identifying the connection type for the one of the endpoints;
determining one of the number of application types for the application by disassembling binary code of the application to recreate one or more functional blocks of the application and matching the one or more functional blocks to a phenotype representing one of the number of application types; and
applying the protection services to conditionally limit network access by the application on the endpoint based on the one of the number of application types and the connection type for the one of the endpoints.
5 Assignments
0 Petitions
Accused Products
Abstract
In embodiments of the present invention improved capabilities are described for the operation of a threat management facility, wherein the threat management facility may provide for a plurality of computer asset protection services to a corporate computer network. The threat management facility may provide a policy management service as one of the plurality of protection services, wherein the policy management service may be adapted to provide corporate policy updates to a plurality of computer facilities associated with the corporate computer network. In addition, the corporate policy updates, and a related corporate policy, may relate to the acceptability of an operation of a computer application.
-
Citations
20 Claims
-
1. A computer program product comprising non-transitory computer executable code embodied in a computer readable medium that, when executing on one or more computing devices, performs the steps of:
-
organizing a number of applications into a number of application types including at least a messaging category, an electronic mail category, a word processing category, a database category, and a browser category; providing a policy management service for an enterprise network, the policy management service configured to provide protection services to one or more endpoints of the enterprise network by restricting usage of endpoint resources based on the number of application types and a connection type; detecting an application executing on one of the endpoints; identifying the connection type for the one of the endpoints; determining one of the number of application types for the application by disassembling binary code of the application to recreate one or more functional blocks of the application and matching the one or more functional blocks to a phenotype representing one of the number of application types; and applying the protection services to conditionally limit network access by the application on the endpoint based on the one of the number of application types and the connection type for the one of the endpoints.
-
-
2. A method comprising:
-
organizing a number of applications into a number of application types; providing a policy management service for an enterprise network, the policy management service configured to provide protection services to one or more endpoints of the enterprise network; detecting an application executing on one of the endpoints; determining one of the number of application types for the application; identifying a connection type for the endpoint; and applying the protection services to conditionally restrict use of the application on the endpoint based on the one of the number of application types and the connection type for the endpoint. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system comprising:
-
a threat management facility storing information in a database that organizes a number of applications into a number of application types, the threat management facility providing a policy management service including protection services for one or more endpoints of an enterprise network; a data network; and an endpoint coupled to the threat management facility through the data network the endpoint configured by computer executable code stored in a memory of the endpoint to perform the steps of detecting an application executing on the one of the endpoints, determining one of the number of application types for the application, and identifying a connection type for the endpoint, wherein the threat management facility is configured to conditionally restrict use of the application on the endpoint based on the one of the number of application types and the connection type for the endpoint.
-
Specification