User interface for low-touch security policy provisioning

    公开(公告)号:US10666683B2

    公开(公告)日:2020-05-26

    申请号:US15663757

    申请日:2017-07-30

    Abstract: In one embodiment, a system includes a processor, and a memory to store data used by the processor, the processor being operative to prepare a first user interface including a security policy selection section, interpret user input data to include performing at least one security policy selection action in the security policy selection section yielding selection of a first security policy for a first device, and update the first user interface yielding an updated first user interface including the first security policy, and a first security policy activation key for inputting into a second user interface to be generated when the first device is installed, the first security policy activation key being associated with providing authentication for downloading the first security policy to the first device.

    SECURITY POLICY EFFICACY VISUALIZATION
    24.
    发明申请

    公开(公告)号:US20170353459A1

    公开(公告)日:2017-12-07

    申请号:US15426702

    申请日:2017-02-07

    CPC classification number: H04L63/10 H04L63/0263 H04L63/20

    Abstract: A management entity communicates over a network with devices on which security rules are configured to control network access. Data that indicates a hit count for each security rule across the devices is repeatedly collected from the devices. The indicated hit counts for each security rule are aggregated over different repeating time intervals to produce repeatedly aggregated hit counts for respective ones of the different repeating time intervals. The security rules are generated for display on a user interface screen as selectable options. Responsive to a selection of one of the security rules, a selected security rule and most recently aggregated hit counts for the different repeating time intervals for the selected security rule are generated for concurrent display on the user interface screen. The display of the most recently aggregated hit counts for the selected security rule is updated as time progresses.

    POLICY BLOCK CREATION WITH CONTEXT-SENSITIVE POLICY LINE CLASSIFICATION

    公开(公告)号:US20170208094A1

    公开(公告)日:2017-07-20

    申请号:US15131604

    申请日:2016-04-18

    CPC classification number: H04L63/20 H04L41/0893 H04L63/0263

    Abstract: Presented herein are techniques for creating a policy block comprised of a group of lines of rules/statements across configuration files for network devices. An algorithm is provided that determines when multiple policies are to be merged together into one policy. In one embodiment, data is uploaded from a network that includes a plurality of network devices. The data represents policy rules configured on the plurality of network devices. The data representing the policy rules is compared for similarities in order to group together policy rules based on their similarities. Data is stored representing a plurality of clusters, each cluster representing a group of policy rules that have been grouped together. One or more configuration policies are generated to be applied across the plurality of network devices using the data representing each of the plurality of clusters, while maintaining context of policy rule processing.

    Integrated Development Environment (IDE) for Network Security Configuration Files
    28.
    发明申请
    Integrated Development Environment (IDE) for Network Security Configuration Files 有权
    用于网络安全配置文件的集成开发环境(IDE)

    公开(公告)号:US20160344773A1

    公开(公告)日:2016-11-24

    申请号:US14755228

    申请日:2015-06-30

    Abstract: An integrated development environment (IDE) preprocesses a configuration file including security rules. The preprocessing maps object names in the security rules to associated object values based on object definitions for the object names. Responsive to the configuration file being opened in an editor, the IDE provides the editor with access to preprocessing results. Each security rule in the opened configuration file is searched for object names. The IDE links each object name found in the search to an associated object value mapped thereto by the mapping performed during the preprocessing. The IDE receives a selection of an object name in a security rule of the opened configuration file and generates for display the associated object value linked to the selected object name.

    Abstract translation: 集成开发环境(IDE)预处理包括安全规则在内的配置文件。 预处理根据对象名称的对象定义将安全规则中的对象名称映射到关联对象值。 响应于在编辑器中打开的配置文件,IDE为编辑器提供对预处理结果的访问。 搜索打开的配置文件中的每个安全规则的对象名称。 IDE通过在预处理期间执行的映射将搜索中找到的每个对象名称链接到映射到其上的关联对象值。 IDE在打开的配置文件的安全规则中接收对象名称的选择,并生成用于显示链接到所选对象名称的关联对象值。

Patent Agency Ranking