Systems and methods for integrating cloud services with information management systems
First Claim
1. A system, comprising:
- an enterprise network comprising an internal management system communicatively coupled thereon, wherein the enterprise network comprises a security device and the internal management system is disposed internally in the enterprise network behind the security device;
a cloud system external to the enterprise network and communicatively coupled to the enterprise network, wherein at least one user associated with the enterprise network is configured to communicate through the cloud system for cloud-based services, and wherein the cloud system is configured to log data associated with the at least one user for the cloud-based services; and
an external service bridge located internally in the enterprise network behind the security device, wherein the external service bridge is configured to securely communicate with the cloud system to receive the log data, to buffer the received log data, and to communicate with the internal management system to provide the buffered log data thereto via insecure protocols over the enterprise network in a format specified by the internal management system;
wherein the cloud-based services comprise security as a service through the cloud system providing security to the at least one user while the at least one user is internal to the enterprise network or external to the enterprise network, and wherein the external service bridge communicates the log data comprising security data associated with the at least one user to the internal management system.
1 Assignment
0 Petitions
Accused Products
Abstract
A system includes an enterprise network including an internal management system communicatively coupled thereon, the enterprise network includes security and the internal management system is disposed behind the security; a cloud system external to the enterprise network and communicatively coupled to the enterprise network, at least one user associated with the enterprise network is configured to communicate through the cloud system for cloud-based services, and the cloud system is configured to log data associated with the at least one user for the cloud-based services; and an external service bridge located in the enterprise network behind the security, the external service bridge is configured to securely communicate with the cloud system to receive the log data and to communicate with the internal management system to provide the log data thereto.
-
Citations
18 Claims
-
1. A system, comprising:
-
an enterprise network comprising an internal management system communicatively coupled thereon, wherein the enterprise network comprises a security device and the internal management system is disposed internally in the enterprise network behind the security device; a cloud system external to the enterprise network and communicatively coupled to the enterprise network, wherein at least one user associated with the enterprise network is configured to communicate through the cloud system for cloud-based services, and wherein the cloud system is configured to log data associated with the at least one user for the cloud-based services; and an external service bridge located internally in the enterprise network behind the security device, wherein the external service bridge is configured to securely communicate with the cloud system to receive the log data, to buffer the received log data, and to communicate with the internal management system to provide the buffered log data thereto via insecure protocols over the enterprise network in a format specified by the internal management system; wherein the cloud-based services comprise security as a service through the cloud system providing security to the at least one user while the at least one user is internal to the enterprise network or external to the enterprise network, and wherein the external service bridge communicates the log data comprising security data associated with the at least one user to the internal management system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method, comprising:
-
logging transactions and events associated with users of an enterprise network in a management system located internally on the enterprise network; communicating with a cloud system through a secure connection outside the enterprise network, wherein the cloud system is external to the enterprise network and at least one user uses cloud-based services through the cloud system; receiving and buffering log data through the secure connection from the cloud system for the at least one user, wherein the log data comprises transactions and events associated with the at least one user and associated usage of the cloud-based services; and transmitting, via insecure protocols, the log data to the management system from a buffer over the enterprise network in a format specified by the management system; wherein the cloud-based services comprise security as a service through the cloud system providing security to the at least one user while the users are internal to the enterprise network or external to the enterprise network, and wherein the external service bridge communicates the log data comprising security data associated with the users to the internal management system.
-
-
17. An external service bridge, comprising:
-
a network interface communicatively coupled on a secure network, wherein the external service bridge is located internally on the secure network; a processor; and memory storing computer executable instructions, and in response to execution by the processor, the computer executable instructions cause the processing node to perform steps of; establish a secure connection to an external network through the secure network; receive and buffer data from the secure connection; parse the buffered data into one or more feeds; filter and format the data in the one or more feeds; and output the one or more feeds on the secure network via an insecure protocol to an internal management system in a format specified by the internal management system, wherein the format comprises a format expected by the internal management system; wherein the data is from cloud-based services external from the secure network providing security to user while the users are internal to the secure network or external to the secure network, and wherein the external service bridge communicates the data comprising security data associated with the users to the internal management system as if the cloud-based services where internal to the secure network. - View Dependent Claims (18)
-
Specification