Enterprise environment analysis
First Claim
Patent Images
1. A system for analyzing an enterprise environment, comprising:
- a modeling module that determines possible accesses to enterprise network services from a plurality of entities; and
a validation module that determines whether a possible access to an enterprise service by a particular entity violates an enterprise policy, the enterprise policy governing which entities are authorized to access one or more enterprise services.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present disclosure provide systems and methods for analyzing an enterprise environment. Briefly described, one embodiment of the system for analyzing an enterprise environment comprises a modeling module that determines possible accesses to enterprise network services from a plurality of entities; and a validation module that determines whether a possible access to an enterprise service by a particular entity violates an enterprise policy, the enterprise policy governing which entities are authorized to access one or more enterprise services.
-
Citations
41 Claims
-
1. A system for analyzing an enterprise environment, comprising:
-
a modeling module that determines possible accesses to enterprise network services from a plurality of entities; and
a validation module that determines whether a possible access to an enterprise service by a particular entity violates an enterprise policy, the enterprise policy governing which entities are authorized to access one or more enterprise services. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for analyzing an enterprise environment, comprising the steps of:
-
collecting configuration data from a collection of enterprise network components that characterize the enterprise environment;
binding the configuration data of each enterprise network component to a model of that component; and
computing a set of all possible accesses to the network components in the enterprise environment based on the configuration data and models. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer readable medium having a computer program for analyzing an enterprise environment, the program having instructions for performing the steps of:
-
collecting configuration data from a collection of enterprise network components that characterize the enterprise environment;
binding the configuration data of each enterprise network component to a model of that component; and
computing a set of all possible accesses to network components in the enterprise environment based on the configuration data and models. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method for analyzing a proposed enterprise environment, comprising the steps of:
-
receiving a list of network components that are included in the proposed enterprise environment;
receiving configuration values for the network components;
receiving a set of enterprise policies that govern which entities are authorized to access the network components;
detecting if the configuration values of the network components allow an enterprise policy to be violated; and
providing an example violation that may occur if an enterprise policy violation has been detected. - View Dependent Claims (30, 31)
-
-
32. A system for analyzing an enterprise environment, comprising:
-
means for determining possible accesses to enterprise network services from a plurality of entities; and
means for determining whether a possible access to an enterprise service by a particular entity violates an enterprise policy, the enterprise policy governing which entities are authorized to access one or more enterprise services. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41)
-
Specification