End-To-End Secure Cloud Computing
First Claim
1. In a cloud computing network hosting at least one enterprise application on behalf of a first enterprise and hosting at least one enterprise application on behalf of a second enterprise, a method comprising:
- receiving, at a control node of the cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, the first enterprise policy representing security and access policies for the first enterprise and the second enterprise policy representing security and access policies for the second enterprise;
managing, at the control node, communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy; and
managing, at the control node, communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy.
4 Assignments
0 Petitions
Accused Products
Abstract
A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, and managing communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy. The method also includes managing communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy.
157 Citations
20 Claims
-
1. In a cloud computing network hosting at least one enterprise application on behalf of a first enterprise and hosting at least one enterprise application on behalf of a second enterprise, a method comprising:
-
receiving, at a control node of the cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, the first enterprise policy representing security and access policies for the first enterprise and the second enterprise policy representing security and access policies for the second enterprise; managing, at the control node, communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy; and managing, at the control node, communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
configuring a first set of user devices for use by a first enterprise to interface with at least one enterprise application hosted at a cloud computing network on behalf of the first enterprise, the cloud computing network managed by a service provider; determining a first enterprise policy representing access and security policies specific to the first enterprise; and providing the first enterprise policy to the service provider for use in managing communications between the first set of user devices and the at least one enterprise application hosted at the cloud computing network. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A cloud computing network managed by a service provider, the cloud computing network comprising:
-
at least one data center to host enterprise applications on behalf of a plurality of enterprises; a policy database to store data representative of enterprise policies for the plurality of enterprises, each enterprise policy representing access and security policies specific to a corresponding enterprise; and a control node to manage communications between at least one user device of an enterprise and at least one enterprise application hosted at the at least one data center on behalf of the enterprise based on the corresponding enterprise policy. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification