System and Method to Apply Network Traffic Policy to an Application Session
First Claim
1. A method for applying a security policy to an application session, comprising:
- (a) recognizing the application session between a network and an application via a security gateway;
(b) determining by the security gateway a user identity of the application session using information about the application session;
(c) obtaining by the security gateway the security policy comprising network parameters mapped to the user identity; and
(d) applying the security policy to the application session by the security gateway.
3 Assignments
0 Petitions
Accused Products
Abstract
Method for applying a security policy to an application session, includes: recognizing the application session between a network and an application via a security gateway; determining by the security gateway a user identity of the application session using information about the application session; obtaining by the security gateway the security policy comprising network parameters mapped to the user identity; and applying the security policy to the application session by the security gateway. The user identity may be a network user identity or an application user identity recognized from packets of the application session. The security policy may comprise a network traffic policy mapped and/or a document access policy mapped to the user identity, where the network traffic policy is applied to the application session. The security gateway may further generate a security report concerning the application of the security policy to the application session.
136 Citations
25 Claims
-
1. A method for applying a security policy to an application session, comprising:
-
(a) recognizing the application session between a network and an application via a security gateway; (b) determining by the security gateway a user identity of the application session using information about the application session; (c) obtaining by the security gateway the security policy comprising network parameters mapped to the user identity; and (d) applying the security policy to the application session by the security gateway. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product for applying a security policy to an application session, the computer program product comprising:
a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code configured to; recognize the application session between a network and an application via a security gateway; determine a user identity of the application session using information about the application session; obtain the security policy comprising network parameters mapped to the user identity; and apply the security policy to the application session. - View Dependent Claims (18, 19, 20, 21)
-
22. A system, comprising:
-
a corporate directory comprising a plurality of security policies; and a security gateway, wherein the security gateway; recognizes an application session between a network and an application via the security gateway; determines a user identity of the application session using information about the application session; obtains from the corporate direction the security policy of the plurality of security policies comprising network parameters mapped to the user identity; and applies the security policy to the application session. - View Dependent Claims (23, 24, 25)
-
Specification