FLEXIBLE SECURITY BOUNDARIES IN AN ENTERPRISE NETWORK
First Claim
Patent Images
1. A method, comprising:
- receiving, by a node in an enterprise network, at least one of a request to send a selected communication and/or content and a provide a nonsubscriber with access to the selected communication and/or content, the selected communication and/or content comprising sensitive information to an enterprise corresponding to the enterprise network;
determining, by the node, that the nonsubscriber is a member of a trusted group, the trusted group comprising, as members, at least one subscriber and at least one nonsubscriber and each member of the trusted group being trusted by the enterprise; and
in response to the nonsubscriber being a member of the trusted group, the node at least one of sending the selected communication and/or content and providing the nonsubscriber access to the selected communication and/or content.
16 Assignments
0 Petitions
Accused Products
Abstract
A system and method are provided to monitor and prevent potential enterprise policy and/or rule violations by subscribers.
86 Citations
22 Claims
-
1. A method, comprising:
-
receiving, by a node in an enterprise network, at least one of a request to send a selected communication and/or content and a provide a nonsubscriber with access to the selected communication and/or content, the selected communication and/or content comprising sensitive information to an enterprise corresponding to the enterprise network; determining, by the node, that the nonsubscriber is a member of a trusted group, the trusted group comprising, as members, at least one subscriber and at least one nonsubscriber and each member of the trusted group being trusted by the enterprise; and in response to the nonsubscriber being a member of the trusted group, the node at least one of sending the selected communication and/or content and providing the nonsubscriber access to the selected communication and/or content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system, comprising:
a policy agent, in an enterprise network, operable to; receive at least one of a request to send a selected communication and/or content and a provide a nonsubscriber with access to the selected communication and/or content, the selected communication and/or content comprising sensitive information to an enterprise corresponding to the enterprise network; determine that the nonsubscriber is a member of a trusted group, the trusted group comprising, as members, at least one subscriber and at least one nonsubscriber and each member of the trusted group being trusted by the enterprise; and in response to the nonsubscriber being a member of the trusted group, at least one of send the selected communication and/or content and provide the nonsubscriber access to the selected communication and/or content. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
20. A method, comprising:
-
determining, by at least one of a policy agent and policy enforcement server, that a selected stimulus has occurred, the stimulus being one or more of a passage of a selected time interval and an event relevant to a degree of trust between an enterprise and a nonsubscriber, the degree of trust controlling whether the nonsubscriber has access to a selected communication and/or content, the selected communication and/or content comprising sensitive information to an enterprise corresponding to the enterprise network; and in response to the determined stimulus, changing, by at least one of a policy agent and policy enforcement server, the degree of trust of the nonsubscriber such that the nonsubscriber at least one of (i) the nonsubscriber, as a result of the changed degree of trust, is authorized to access the selected communication and/or content and (ii) the nonsubscriber, as a result of the changed degree of trust, is now authorized to access the selected communication and/or content. - View Dependent Claims (21, 22)
-
Specification