Propagation protection within a network
First Claim
1. A computerized method for propagation protection within a network, the method comprising:
- monitoring, by a transparent network appliance, data being transmitted from a first portion of the network to a second portion of the network through the network appliance;
analyzing, by the network appliance, the data to determine whether the data represents a threat to the network; and
transmitting the data to the second portion of the network if the data does not represent a threat to the network or preventing transmission of the data to the second portion of the network if the data represents a threat to the network.
3 Assignments
0 Petitions
Accused Products
Abstract
Described are methods and apparatus, including computer program products, for propagation protection within a network. A transparent network appliance monitors data being transmitted from a first portion of the network to a second portion of the network through the network appliance and analyzes the data to determine whether the data represents a threat to the network. The network appliance transmits the data to the second portion of the network if the data does not represent a threat to the network or prevents transmission of the data to the second portion of the network if the data represents a threat to the network.
88 Citations
28 Claims
-
1. A computerized method for propagation protection within a network, the method comprising:
-
monitoring, by a transparent network appliance, data being transmitted from a first portion of the network to a second portion of the network through the network appliance;
analyzing, by the network appliance, the data to determine whether the data represents a threat to the network; and
transmitting the data to the second portion of the network if the data does not represent a threat to the network or preventing transmission of the data to the second portion of the network if the data represents a threat to the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A transparent network appliance for propagation protection within a network, the network appliance comprising:
-
a transparent network interface card configured to act as a bridge between a first portion of the network and a second portion of the network; and
a data analyzer module configured to analyze data transmitted from the first portion of the network to the second portion of the network to determine whether the data represents a threat to the network and to transmit the data to the second portion of the network if the data does not represent a threat to the network or prevent transmission of the data to the second portion of the network if the data represents a threat to the network. - View Dependent Claims (20, 21, 22, 24, 25, 27)
-
-
23. The network appliance of claim 23 wherein the memory module comprises a compact flash card.
-
26. The network appliance of claim 26 where the interface is associated with an Internet Protocol (IP) address.
-
28. A computer program product, tangibly embodied in an information carrier, for propagation protection within a network, the computer program product including instructions being operable to cause data processing apparatus to:
-
monitor, by a transparent network appliance, data being transmitted from a first portion of the network to a second portion of the network through the network appliance;
analyze, by the network appliance, the data to determine whether the data represents a threat to the network; and
transmit the data to the second portion of the network if the data does not represent a threat to the network or prevent transmission of the data to the second portion of the network if the data represents a threat to the network.
-
Specification