SYSTEM AND METHOD FOR MANAGEMENT AND TRANSLATION OF TECHNICAL SECURITY POLICIES AND CONFIGURATIONS
First Claim
Patent Images
1. A method of translating information, comprising:
- capturing information of a source policy configuration; and
translating the information into a universal data type useable with a target policy configuration.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method translating information of a source policy configuration into a universal data type useable with a target policy configuration. The disclosed system and method provide comprehensive and highly automated translation of security policies and configurations into a normalized format, thereby enabling management and transformation of information across various types of technologies. Normalized data format is utilized to output data into different formats or data types.
-
Citations
20 Claims
-
1. A method of translating information, comprising:
-
capturing information of a source policy configuration; and translating the information into a universal data type useable with a target policy configuration. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system, comprising:
-
a user device running a security application based on original policy configuration settings; a database having policy configuration files of security applications defined by multiple vendors; a device having an application containing several adapters utilized to map the policy configuration files; and a server translating the original policy configuration settings into a target policy configuration file for use by a specified one of security applications provided by a vendor among said multiple vendors. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A computer-readable medium embodying a program for causing a computer to execute operations, comprising:
-
retrieving a policy configuration file of a first security application; transforming a value of the policy configuration file to a normalized field via the adapter; creating a new policy configuration file based on the normalized field via the adapter; and using the new policy configuration file with a second security application based on the policy configuration file of the first security application. - View Dependent Claims (18, 19, 20)
-
Specification