System and method for data mining and security policy management
First Claim
1. One or more non-transitory machine-readable storage media that includes code for execution and when executed by a processor is operable to perform operations comprising:
- receiving a plurality of parameters based, at least in part, on metadata information obtained from data mining one or more databases, at least one database containing tags associated with objects, wherein the data mining is to apply one or more filters to the tags of the at least one database to obtain at least a portion of the metadata information;
creating a rule associated with at least some of the parameters; and
incorporating the rule into a security policy to be used by a capture system, wherein the security policy is to control network communications captured by the capture system.
9 Assignments
0 Petitions
Accused Products
Abstract
A method is provided in one example and includes generating a query for a database for information stored in the database. The information relates to data discovered through a capture system. The method further includes generating an Online Analytical Processing (OLAP) element to represent information received from the query. A rule based on the OLAP element is generated and the rule affects data management for one or more documents that satisfy the rule. In more specific embodiments, the method further includes generating a capture rule that defines items the capture system should capture. The method also includes generating a discovery rule that defines objects the capture system should register. In still other embodiments, the method includes developing a policy based on the rule, where the policy identifies how one or more documents are permitted to traverse a network.
-
Citations
20 Claims
-
1. One or more non-transitory machine-readable storage media that includes code for execution and when executed by a processor is operable to perform operations comprising:
-
receiving a plurality of parameters based, at least in part, on metadata information obtained from data mining one or more databases, at least one database containing tags associated with objects, wherein the data mining is to apply one or more filters to the tags of the at least one database to obtain at least a portion of the metadata information; creating a rule associated with at least some of the parameters; and incorporating the rule into a security policy to be used by a capture system, wherein the security policy is to control network communications captured by the capture system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An administration system, comprising:
-
a processor; a memory; and logic, at least a portion of which is implemented in hardware, the logic configured to; receive a plurality of parameters based, at least in part, on metadata information obtained from data mining one or more databases, at least one database containing tags associated with objects, wherein the data mining is to apply one or more filters to the tags of the at least one database to obtain at least a portion of the metadata information; create a rule associated with at least some of the parameters; and incorporate the rule into a security policy to be used by a capture system, wherein the security policy is to control network communications captured by the capture system. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A method, comprising:
-
receiving a plurality of parameters based, at least in part, on metadata information obtained from data mining one or more databases, at least one database containing tags associated with objects, wherein the data mining is to apply one or more filters to the tags of the at least one database to obtain at least a portion of the metadata information; creating a rule associated with at least some of the parameters; and incorporating the rule into a security policy to be used by a capture system, wherein the security policy controls network communications captured by the capture system. - View Dependent Claims (18, 19, 20)
-
Specification