Methods and systems for monitoring user, application or device activity
First Claim
Patent Images
1. A method of managing security in an enterprise, comprising:
- detecting at periodic intervals events that correspond to user interactions with computers connected to a network of the enterprise;
storing such events in a data facility;
organizing the events by user, by computer and by event type; and
presenting a summary of the events in a report, wherein a viewer of the report may select the organization of the report by user, by computer and by event type.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems are provided for capturing usage data from a user computer, processing a subset of such data to form output, and offering access to selective views of such output, such as to assist a company'"'"'s management in monitoring computer usage in a work environment. The output may be processed and viewed according to software application, device, or specified user. The output, or a report generated therefrom, may be accessible in differing degrees to individuals having appropriate levels of permission.
-
Citations
53 Claims
-
1. A method of managing security in an enterprise, comprising:
-
detecting at periodic intervals events that correspond to user interactions with computers connected to a network of the enterprise;
storing such events in a data facility;
organizing the events by user, by computer and by event type; and
presenting a summary of the events in a report, wherein a viewer of the report may select the organization of the report by user, by computer and by event type. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of managing compliance with policies of an enterprise, comprising:
-
detecting at periodic intervals events that correspond to user interactions with computers connected to a network of the enterprise;
storing such events in a data facility;
organizing the events by user, by computer and by event type; and
presenting a summary of the events in a graphical-format report, wherein a viewer of the report may select the organization of the report. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of managing productivity of individuals operating within a business enterprise, comprising:
-
detecting at periodic intervals events that correspond to user interactions with computers connected to a network of the enterprise;
storing such events in a data facility;
organizing the events by user, by computer and by event type; and
presenting a summary of the events in a graphical-format report, wherein a viewer of the report may select the organization of the report. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
-
25. A system for managing security in an enterprise, coman agent for detecting at periodic intervals events that correspond to user interactions with computers connected to a network of the enterprise;
-
a data facility for storing the events detected by the agent; and
a reporting facility for organizing and reporting the events by user, by computer and by event type. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A system for managing compliance with policies of an enterprise, comprising:
-
an agent for detecting at periodic intervals events that correspond to user interactions with computers connected to a network of the enterprise;
a data facility for storing such events by user, by computer and by event type; and
a reporting facility for presenting a summary of the events in a graphical-format report, wherein a viewer of the report may select the organization of the report. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45)
-
-
46. A system for managing productivity of individuals operating within a business enterprise, comprising:
-
an agent for detecting at periodic intervals events that correspond to user interactions with computers connected to a network of the enterprise;
a data facility for storing such events by user, by computer and by event type; and
a reporting facility for presenting a summary of the events in a graphical-format report, wherein a viewer of the report may select the organization of a report generated by the reporting facility. - View Dependent Claims (47, 48, 49, 50, 51, 52)
-
-
53. A method of managing security in an enterprise, comprising:
-
detecting at periodic intervals events that correspond to user interactions with computers connected to a network of the enterprise;
storing such events in a data facility;
organizing the events by user, by computer and by event type;
permitting access by an individual to the stored events; and
logging events that indicate the nature of the access by the individual to the stored events.
-
Specification