Network Policy Management And Effectiveness System
First Claim
1. A method for maintaining network policy compliance on a network comprising the steps of:
- monitoring network user compliance with a network security policy from a plurality of network security policies stored in a database;
evaluating compliance with the network security policy based on the network user compliance;
automatically undertaking a network policy compliance action, the network policy compliance action being generated in response to the evaluation of compliance with the network security policy;
automatically analyzing the undertaking of a network policy compliance action to identify ineffectual policies; and
automatically implementing a different network security policy based on the identification of an ineffectual policy.
9 Assignments
0 Petitions
Accused Products
Abstract
The Present Invention discloses a method and apparatus for maintaining policy compliance on a computer network. A system in accordance with the principles of the Present Invention performs the steps of electronically monitoring network user compliance with a network security policy stored in a database, electronically evaluating network security policy compliance based on network user compliance and electronically undertaking a network policy compliance action in response to network security policy non-compliance. The network policy compliance actions may include automatically implementing a different network security policy selected from network security policies stored in the database, generating policy effectiveness reports and providing a retraining module to network users.
68 Citations
20 Claims
-
1. A method for maintaining network policy compliance on a network comprising the steps of:
-
monitoring network user compliance with a network security policy from a plurality of network security policies stored in a database;
evaluating compliance with the network security policy based on the network user compliance;
automatically undertaking a network policy compliance action, the network policy compliance action being generated in response to the evaluation of compliance with the network security policy;
automatically analyzing the undertaking of a network policy compliance action to identify ineffectual policies; and
automatically implementing a different network security policy based on the identification of an ineffectual policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 14, 15)
-
-
13. The method of Claim Error! Reference source not found., wherein the step of interactively generating a network security policy comprising the steps of:
-
providing a suggested network security policy to a plurality of network users;
receiving at least one modified network security policy from at least one of the network users;
providing at least one of the modified network security policies to the plurality of network users; and
receiving a group modified network security policy from the plurality of network users.
-
- 16. An apparatus for maintaining policy compliance on a computer network comprising a computer system comprising at least one processor and at least one memory.
-
19. An article of manufacture for maintaining policy compliance on a computer network, the article of manufacture comprising a computer-readable storage medium having a computer program embodied therein that causes the computer network to perform the steps of:
-
monitoring network user compliance with a network security policy from a plurality of network security policies stored in a database;
evaluating compliance with the network security policy based on the network user compliance;
automatically undertaking a network policy compliance action, the network policy compliance action being generated in response to the evaluation of compliance with the network security policy;
automatically analyzing the undertaking of a network policy compliance action to identify ineffectual policies; and
automatically implementing a different network security policy based on the identification of an ineffectual policy. - View Dependent Claims (20)
-
Specification