scispace - formally typeset
Patent

Method and apparatus for network wide policy-based analysis of configurations of devices

TLDR
In this article, the authors present a method and an apparatus for analyzing a network configuration against a corporate network policy and determining violation(s) against the corporate network policies and adding an entry to its final report each time that it detects a violation against the network policy in the network configuration model.
Abstract
A method and an apparatus for analyzing a network configuration against a corporate network policy and determining violation(s) against the corporate network policy. A report indicating the violation(s) can be generated indicating instances of the violation(s). An analysis platform reads in a network policy. The analysis platform collects configuration files from the relevant network devices in the network and builds up an internal instance of a network configuration model based on the configuration files and the network topology. The analysis platform analyzes this network configuration model according to the network policy and adds an entry to its final report each time that it detects a violation against the network policy in the network configuration model. The data in the entries pinpoints the cause of the deviation(s) from the network policy.

read more

Citations
More filters
Patent

Architecture for distributed computing system and automated design, deployment, and management of distributed applications

TL;DR: An architecture and methodology for designing, deploying, and managing a distributed application onto a distributed computing system is described in this article, where the authors present an architecture and a methodology for deploying and managing such applications.
Patent

System and method for a cloud computing abstraction layer with security zone facilities

TL;DR: In this paper, the authors describe improved capabilities for a virtualization environment adapted for development and deployment of at least one software workload, the virtualisation environment having a metamodel framework that allows the association of a policy to the software workload upon development of the workload that is applied upon deployment of software workload.
Patent

Eyepiece with uniformly illuminated reflective display

TL;DR: In this paper, an eyepiece includes a mechanical frame adapted to secure a lens and an image source facility above the lens, which includes an LED, a planar illumination facility and a reflective display.
Patent

Mobile data security system and methods

TL;DR: In this paper, the authors present an integration of security, mobile computing, wireless and IT infrastructure management technology, to create a new level of automation and enforcement to enable the transparent application of mobile security across an enterprise, while embracing end user transparency and ease of use.
References
More filters
Book

Computer Security

TL;DR: This new edition of this self-study guide includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection.
Proceedings ArticleDOI

A graph-based system for network-vulnerability analysis

TL;DR: A graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker, and is used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc.
Patent

Automatic software installation on heterogeneous networked computer systems

TL;DR: In this article, a distributed system having heterogeneous computer systems having dissimilar hardware or software components or dissimilar configuration information, such as different natural languages, different operating system types, different network operating system type, and different processor types, the present invention automatically installs the appropriate edition of software on computers.
Patent

Method and apparatus for defining and enforcing policies for configuration management in communications networks

TL;DR: In this article, the use of templates for generating configuration records of network devices of a selected model type is described, each model representing an associated network device and including attribute values for the parameters of the associated network devices.
Patent

Graphical network security policy management

TL;DR: In this article, a method of establishing a representation of an abstract network security policy is disclosed, which is established in the form of a decision tree that is constructed by assembling graphical symbols representing policy actions and policy conditions.