DASHBOARD FOR MANAGING ENTERPRISE NETWORK TRAFFIC
First Claim
1. A method for visualizing network usage comprising:
- providing a number of application types that characterizing one or more applications sourcing network traffic within an enterprise network;
labeling each of a number of network traffic flows in the enterprise network with one of the application types by querying endpoints for network type information when each new one of the number of network traffic flows is initiated;
aggregating a number of endpoints using each one of the application types on the enterprise network at a cloud-based enterprise management facility; and
configuring the cloud-based enterprise management facility to present the number of endpoints using each one of the application types to a user in a web-based dashboard.
4 Assignments
0 Petitions
Accused Products
Abstract
An enterprise security system is improved by managing network flows based on an application type. When a network message having an unknown application type is received at a gateway, firewall, or other network device/service from an endpoint, the endpoint that originated the network message may be queried for identifying information for the source of the network message and the application type may be determined, or the endpoint may periodically communicate application type information to the network device in a heartbeat or other periodic communication or the like. The network message may be managed along with other network traffic according to the application type.
19 Citations
20 Claims
-
1. A method for visualizing network usage comprising:
-
providing a number of application types that characterizing one or more applications sourcing network traffic within an enterprise network; labeling each of a number of network traffic flows in the enterprise network with one of the application types by querying endpoints for network type information when each new one of the number of network traffic flows is initiated; aggregating a number of endpoints using each one of the application types on the enterprise network at a cloud-based enterprise management facility; and configuring the cloud-based enterprise management facility to present the number of endpoints using each one of the application types to a user in a web-based dashboard. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer program product comprising computer executable code embodied in a non-transitory computer readable medium that, when executing on one or more computing devices, performs the steps of:
-
providing a number of application types; labeling each of a number of network traffic flows in an enterprise network with one of the application types; aggregating a number of endpoints using each one of the application types on the enterprise network; and configuring a server to present the number of endpoints using each one of the application types to a user in a web-based dashboard. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A system comprising:
-
a plurality of security agents executing on a plurality of endpoints in an enterprise network; one or more network device in the enterprise network, each one of the network devices configured to label network traffic flows from the plurality of endpoints according to an application type selected from a predetermined group of application types; and a server configured to aggregate usage data from each one of the network devices to determine a number of instances of each one of the predetermined group of application types associated with a network traffic flow within the enterprise network, and to present the usage data in a web-based interface.
-
Specification