ENDPOINT SECURITY IMPLEMENTATION
First Claim
Patent Images
1. A method comprising:
- a computer detecting an element from a data flow for at least one endpoint device;
the computer using the detected element and a protection engine to assess security requirements for the flow of data for the at least one endpoint device; and
the computer causing the protection engine to issue additional security controls for the at least one endpoint device.
4 Assignments
0 Petitions
Accused Products
Abstract
A method includes a computer detecting an element from a data flow for at least one endpoint device; the computer using the detected element and a protection engine to assess security requirements for the flow of data for the at least one endpoint device; and the computer causing the protection engine to issue additional security controls for the at least one endpoint device.
7 Citations
20 Claims
-
1. A method comprising:
-
a computer detecting an element from a data flow for at least one endpoint device; the computer using the detected element and a protection engine to assess security requirements for the flow of data for the at least one endpoint device; and the computer causing the protection engine to issue additional security controls for the at least one endpoint device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer system comprising:
-
one or more processors, one or more computer-readable memories and one or more computer-readable, tangible storage devices; a protection engine, operatively coupled to at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, configured to receive an element from a data flow for at least one endpoint device; the protection engine, operatively coupled to at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, being further configured to determine security requirements for the flow of data for the at least one endpoint device based upon the received element; and the protection engine, operatively coupled to at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, being yet further configured to issue additional security controls for the at least one endpoint device. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computer program product comprising:
-
one or more computer-readable, tangible storage medium; program instructions, stored on at least one of the one or more storage medium, to detect an element from a data flow for at least one endpoint device; program instructions, stored on at least one of the one or more storage medium, using the detected element and a protection engine to assess security requirements for the data flow; and program instructions, stored on at least one of the one or more storage medium, causing the protection engine to issue additional security controls for the at least one endpoint device. - View Dependent Claims (17, 18, 19, 20)
-
Specification