CLASSIFICATION OF SECURITY POLICIES ACROSS MULTIPLE SECURITY PRODUCTS
First Claim
Patent Images
1. A method comprising:
- at a management entity;
connecting with multiple security devices across a network, each security device configured to operate in accordance with one or more security policies;
importing, over the network, data describing the security policies from the multiple security devices; and
classifying the imported security policies into security policy classifications based on commonality in information included in the security policies across the multiple security devices.
1 Assignment
0 Petitions
Accused Products
Abstract
A management entity connects with multiple security devices across a network. Each security device operates in accordance with one or more security policies. The management entity imports, over the network, data describing the security policies from the multiple security devices. The management entity classifies the imported security policies into security policy classifications based on commonality in information included in the security policies across the multiple security devices.
-
Citations
25 Claims
-
1. A method comprising:
at a management entity; connecting with multiple security devices across a network, each security device configured to operate in accordance with one or more security policies; importing, over the network, data describing the security policies from the multiple security devices; and classifying the imported security policies into security policy classifications based on commonality in information included in the security policies across the multiple security devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. An apparatus comprising:
-
a network interface unit to connect with a network; and a processor coupled to the network interface unit to; connect with multiple security devices across a network, each security device configured to operate in accordance with one or more security policies; import, over the network, data describing the security policies from the multiple security devices; and classify the imported security policies into security policy classifications based on commonality in information included in the security policies across the multiple security devices. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory tangible computer readable storage media encoded with instructions that, when executed by a processor, cause the processor to:
-
connect with multiple security devices across a network, each security device configured to operate in accordance with one or more security policies; import, over the network, data describing the security policies from the multiple security devices; and classify the imported security policies into security policy classifications based on commonality in information included in the security policies across the multiple security devices. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
Specification