POLICY MANAGEMENT
First Claim
1. A method, comprising:
- Operating a threat management facility wherein the threat management facility provides a plurality of computer asset protection services to a corporate computer network;
Providing a policy management service as one of the plurality of protection services wherein the policy management service is adapted to provide corporate policy updates to a plurality of computer facilities associated with the corporate computer network, wherein the corporate policy updates and a related corporate policy relate to the acceptability of an operation of computer applications.
9 Assignments
0 Petitions
Accused Products
Abstract
In embodiments of the present invention improved capabilities are described for the operation of a threat management facility, wherein the threat management facility may provide for a plurality of computer asset protection services to a corporate computer network. The threat management facility may provide a policy management service as one of the plurality of protection services, wherein the policy management service may be adapted to provide corporate policy updates to a plurality of computer facilities associated with the corporate computer network. In addition, the corporate policy updates, and a related corporate policy, may relate to the acceptability of an operation of a computer application.
336 Citations
25 Claims
-
1. A method, comprising:
-
Operating a threat management facility wherein the threat management facility provides a plurality of computer asset protection services to a corporate computer network;
Providing a policy management service as one of the plurality of protection services wherein the policy management service is adapted to provide corporate policy updates to a plurality of computer facilities associated with the corporate computer network, wherein the corporate policy updates and a related corporate policy relate to the acceptability of an operation of computer applications. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system, comprising:
-
A threat management facility wherein the threat management facility provides a plurality of computer asset protection services to a corporate computer network;
Providing a policy management service as one of the plurality of protection services wherein the policy management service is adapted to provide corporate policy updates to a plurality of computer facilities associated with the corporate computer network, wherein the corporate policy updates and a related corporate policy relate to the acceptability of an operation of computer applications. - View Dependent Claims (22, 23, 24, 25)
-
Specification