Methods, systems, and computer program products for implementing data asset management activities
First Claim
Patent Images
1. A method for implementing data asset management activities, comprising:
- defining, via an application executing on a computer processor, authorization and authentication permissions for accessing network entities of an organization;
defining, via the application, rules for conducting audits and audit response activities with respect to the network entities, the rules including criteria for identifying a non-compliance;
defining, via the application, a data pattern;
implementing, via the application, a probe on the network devices, the probe discovering data patterns, structured and unstructured, from the events occurring on the network entities;
executing, via the application, an audit of the network entities by applying the rules to events occurring at the network entities and the data patterns during the audit; and
generating, via the application, a summary of results of the audit.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and computer program products for implementing data asset management activities are provided. A method includes defining authorization and authentication permissions for accessing network entities of an organization, defining rules for conducting audits and audit response activities with respect to the network entities, and executing an audit of the network entities by applying the rules to events occurring at the network entities during the audit. The method also includes generating a summary of results of the audit.
14 Citations
17 Claims
-
1. A method for implementing data asset management activities, comprising:
-
defining, via an application executing on a computer processor, authorization and authentication permissions for accessing network entities of an organization; defining, via the application, rules for conducting audits and audit response activities with respect to the network entities, the rules including criteria for identifying a non-compliance; defining, via the application, a data pattern; implementing, via the application, a probe on the network devices, the probe discovering data patterns, structured and unstructured, from the events occurring on the network entities; executing, via the application, an audit of the network entities by applying the rules to events occurring at the network entities and the data patterns during the audit; and generating, via the application, a summary of results of the audit. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for implementing data asset management activities, comprising:
-
a host system; and a data steward rules engine executing on the host system, the data steward rules engine implementing a method, comprising; defining authorization and authentication permissions for accessing network entities of an organization; defining rules for conducting audits and audit response activities with respect to the network entities, the rules including criteria for identifying a non-compliance; defining a data pattern; implementing a probe on the network devices, the probe discovering data patterns, structured and unstructured, from the events occurring on the network entities; executing an audit of the network entities by applying the rules to events occurring at the network entities and the data patterns during the audit; and generating a summary of results of the audit. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A computer program product for implementing data asset management activities, the computer program product including instructions for implementing a method, the method comprising:
-
defining authorization and authentication permissions for accessing network entities of an organization; defining rules for conducting audits and audit response activities with respect to the network entities, the rules including criteria for identifying a non-compliance; defining a data pattern; implementing a probe on the network devices, the probe discovering data patterns, structured and unstructured, from the events occurring on the network entities; executing an audit of the network entities by applying the rules to events occurring at the network entities and the data patterns during the audit; and generating a summary of results of the audit. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification