Decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment
First Claim
1. A computer system, comprising:
- a processor; and
a memory that stores computer-executable instructions which, when executed by the processor, cause the processor to perform operations comprising;
receiving a network security software component from a security service provider, wherein the network security software component has been decoupled from a hardware component of a network security device by the security service provider,deploying the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource associated with the distributed computing environment to provide a security service to a customer platform;
exposing an application programming interface to the customer platform to provide on-demand access to the security service provided by the network security software component;
receiving an application programming interface call from the customer platform, wherein the application programming interface call identifies an asset associated with the customer platform for protection by the security service and a selection of the security service to protect the asset; and
in response to receiving the application programming interface call, providing the security service to the customer platform.
2 Assignments
0 Petitions
Accused Products
Abstract
Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment. A computer system includes a processor that can execute computer-executable instructions to perform various operations. The processor can perform operations to provide security services to one or more customer platforms. The operations can include receiving a network security software component from a security service provider, and deploying the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource of the distributed computing environment to provide a security service to the customer platform(s). The network security software component includes a software component that has been decoupled from a hardware component of a network security device by the security service provider.
-
Citations
20 Claims
-
1. A computer system, comprising:
-
a processor; and a memory that stores computer-executable instructions which, when executed by the processor, cause the processor to perform operations comprising; receiving a network security software component from a security service provider, wherein the network security software component has been decoupled from a hardware component of a network security device by the security service provider, deploying the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource associated with the distributed computing environment to provide a security service to a customer platform; exposing an application programming interface to the customer platform to provide on-demand access to the security service provided by the network security software component; receiving an application programming interface call from the customer platform, wherein the application programming interface call identifies an asset associated with the customer platform for protection by the security service and a selection of the security service to protect the asset; and in response to receiving the application programming interface call, providing the security service to the customer platform. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
receiving, at a computer system comprising a processor, a network security software component from a security service provider, wherein the network security software component has been decoupled from a hardware component of a network security device by the security service provider; deploying, by the computer system, the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource associated with the distributed computing environment to provide a security service to a customer platform; exposing an application programming interface to the customer platform to provide on-demand access to the security service provided by the network security software component, wherein the application programming interface call identifies an asset associated with the customer platform for protection by the security service, and a selection of the security service to protect the asset; receiving an application programming interface call from the customer platform; and in response to receiving the application programming interface call, providing the security service to the customer platform. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A computer-readable storage medium having instructions stored thereon that, when executed by a processor, cause the processor to perform operations comprising:
-
receiving a network security software component from a security service provider, wherein the network security software component has been decoupled from a hardware component of a network security device by the security service provider; deploying the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource associated with the distributed computing environment to provide a security service to a customer platform; exposing an application programming interface to the customer platform to provide on-demand access to the security service provided by the network security software component; receiving an application programming interface call from the customer platform, wherein the application programming interface call identifies an asset associated with the customer platform for protection by the security service and a selection of the security service to protect the asset; and in response to receiving the application programming interface call, providing the security service to the customer platform. - View Dependent Claims (14, 19, 20)
-
-
15. The computer-readable storage medium of 13, wherein the operations further comprise provisioning the network security software component to protect the asset, and providing the security service to protect the asset.
-
16. The computer-readable storage medium of 15, wherein the operations further comprise:
-
receiving a further network security software component from a further security service provider, wherein the further network security software component has been decoupled from a further hardware component of a further network security device by the further security service provider; and deploying the further network security software component within the distributed computing environment so that the further network security software component can be executed by the computing resource to provide a further security service to the customer platform.
-
-
17. The computer-readable storage medium of 16, wherein the operations further comprise provisioning the further network security software component to protect the asset, and providing the further security service to the customer platform to further protect the asset.
-
18. The computer-readable storage medium of 17, wherein the operations further comprise provisioning the further network security software component to protect a further asset, and providing the further security service to the customer platform to protect the further asset independent of the security service provided to the customer platform to protect the asset.
Specification