CLOUD BASED MOBILE DEVICE SECURITY AND POLICY ENFORCEMENT
First Claim
1. A cloud based security method for a mobile device, comprising:
- providing a mobile configuration to the mobile device, the mobile configuration configured to provide communications between the mobile device and external network through a cloud based system;
receiving communications from the mobile device for the external network;
analyzing the communications from the mobile device for policy and security compliance therewith; and
blocking the communications from the mobile device based on a violation of the policy and security compliance.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure relates to cloud based mobile device security and policy systems and methods to use the “cloud” to pervasively enforce security and policy on mobile devices. The cloud based mobile device security and policy systems and methods provide uniformity in securing mobile devices for small to large organizations. The cloud based mobile device security and policy systems and methods may enforce one or more policies for users wherever and whenever the users are connected across a plurality of different devices including mobile devices. This solution ensures protection across different types, brands, operating systems, etc. for smartphones, tablets, netbooks, mobile computers, and the like.
460 Citations
17 Claims
-
1. A cloud based security method for a mobile device, comprising:
-
providing a mobile configuration to the mobile device, the mobile configuration configured to provide communications between the mobile device and external network through a cloud based system; receiving communications from the mobile device for the external network; analyzing the communications from the mobile device for policy and security compliance therewith; and blocking the communications from the mobile device based on a violation of the policy and security compliance. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A mobile device, comprising:
-
a network interface configured to connect to a wireless network; memory; and a processor, the network interface, the memory, and the processor are communicatively coupled therebetween; wherein the processor with the network interface and the memory is configured to; connect to a cloud based security system over the wireless network; communicate data with an external network through the cloud based security system; and receive notifications of content blocking of the data from the cloud based security system based on security and policy violations. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A cloud network configured to perform mobile device security and policy enforcement, comprising:
a plurality of cloud nodes communicatively coupled to a network, each of the plurality of cloud nodes is configured to; communicate with a mobile device; and perform mobile device policy and security enforcement of the mobile device while concurrently providing access to the network. - View Dependent Claims (16, 17)
Specification