WO2014077914A3 - System and method for ensuring compliance with organizational policies - Google Patents

System and method for ensuring compliance with organizational policies Download PDF

Info

Publication number
WO2014077914A3
WO2014077914A3 PCT/US2013/052836 US2013052836W WO2014077914A3 WO 2014077914 A3 WO2014077914 A3 WO 2014077914A3 US 2013052836 W US2013052836 W US 2013052836W WO 2014077914 A3 WO2014077914 A3 WO 2014077914A3
Authority
WO
WIPO (PCT)
Prior art keywords
computing device
policies
organizational
managed computing
ensuring compliance
Prior art date
Application number
PCT/US2013/052836
Other languages
French (fr)
Other versions
WO2014077914A2 (en
Inventor
Vadim Kacherov
Robert M. DARE
Gregory Paul WATSON
Parag Goel
Original Assignee
Openpeak Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/564,809 external-priority patent/US8713173B2/en
Application filed by Openpeak Inc. filed Critical Openpeak Inc.
Priority to KR20157005069A priority Critical patent/KR20150040967A/en
Priority to EP13855418.3A priority patent/EP2880583A4/en
Publication of WO2014077914A2 publication Critical patent/WO2014077914A2/en
Publication of WO2014077914A3 publication Critical patent/WO2014077914A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Abstract

A method for ensuring compliance with organizational policies is described herein. The method can include the step of monitoring one or more parameters of a managed computing device for compliance with one or more policies of an organization in which the organizational policies may include limitations on the managed computing device. The method can also include the step of detecting a non-conformance event at the managed computing device with respect to at least one organizational policy. In response to the detection of the non-conformance event, the operation of the managed computing device may be restricted with respect to features or data associated with the organization.
PCT/US2013/052836 2012-08-02 2013-07-31 System and method for ensuring compliance with organizational policies WO2014077914A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
KR20157005069A KR20150040967A (en) 2012-08-02 2013-07-31 System and method for ensuring compliance with organizational policies
EP13855418.3A EP2880583A4 (en) 2012-08-02 2013-07-31 System and method for ensuring compliance with organizational policies

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/564,809 2012-08-02
US13/564,809 US8713173B2 (en) 2008-12-19 2012-08-02 System and method for ensuring compliance with organizational policies

Publications (2)

Publication Number Publication Date
WO2014077914A2 WO2014077914A2 (en) 2014-05-22
WO2014077914A3 true WO2014077914A3 (en) 2014-08-21

Family

ID=50731803

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2013/052836 WO2014077914A2 (en) 2012-08-02 2013-07-31 System and method for ensuring compliance with organizational policies

Country Status (3)

Country Link
EP (1) EP2880583A4 (en)
KR (1) KR20150040967A (en)
WO (1) WO2014077914A2 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016186662A1 (en) * 2015-05-19 2016-11-24 Hewlett Packard Enterprise Development Lp Mobile asset compliance evaluation

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050027980A1 (en) * 2003-07-01 2005-02-03 Vidius Inc. Apparatus and method for ensuring compliance with a distribution policy
US20050183143A1 (en) * 2004-02-13 2005-08-18 Anderholm Eric J. Methods and systems for monitoring user, application or device activity
WO2007059428A2 (en) * 2005-11-10 2007-05-24 Secure Computing Corporation Content-based policy compliance systems and methods
US20120036220A1 (en) * 2008-12-19 2012-02-09 Openpeak Inc. Systems for accepting and approving applications and methods of operation of same
US20120072985A1 (en) * 2010-05-18 2012-03-22 Freedom Professional Service & Technologies LLC d/b/a Freedom OSS Managing services in a cloud computing environment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050027980A1 (en) * 2003-07-01 2005-02-03 Vidius Inc. Apparatus and method for ensuring compliance with a distribution policy
US20050183143A1 (en) * 2004-02-13 2005-08-18 Anderholm Eric J. Methods and systems for monitoring user, application or device activity
WO2007059428A2 (en) * 2005-11-10 2007-05-24 Secure Computing Corporation Content-based policy compliance systems and methods
US20120036220A1 (en) * 2008-12-19 2012-02-09 Openpeak Inc. Systems for accepting and approving applications and methods of operation of same
US20120072985A1 (en) * 2010-05-18 2012-03-22 Freedom Professional Service & Technologies LLC d/b/a Freedom OSS Managing services in a cloud computing environment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2880583A4 *

Also Published As

Publication number Publication date
EP2880583A4 (en) 2016-03-23
KR20150040967A (en) 2015-04-15
EP2880583A2 (en) 2015-06-10
WO2014077914A2 (en) 2014-05-22

Similar Documents

Publication Publication Date Title
WO2015013376A3 (en) Systems and methods for self-tuning network intrusion detection and prevention
WO2015100177A3 (en) Neural watchdog
WO2014078466A3 (en) Application-level anomaly detection
WO2015008290A3 (en) Method and device for assisting in safe driving of a vehicle
WO2013164821A3 (en) Detection and prevention for malicious threats
WO2014078585A3 (en) Methods, systems and computer readable media for detecting command injection attacks
EP3407534A4 (en) In-car computer system, vehicle, key generation device, management method, key generation method, and computer program
GB201100039D0 (en) Server, user device and malware detection method thereof
IN2014CH01209A (en)
WO2014140926A3 (en) Systems, methods, and computer-readable media for identifying when a subject is likely to be affected by a medical condition
WO2013130539A3 (en) Time-stamped emissions data collection for process control devices
WO2013040496A3 (en) System and method for real-time customized threat protection
WO2011146917A3 (en) Apparatuses, systems and methods for determining installed software applications on a computing device
WO2014124270A3 (en) Intelligent management and compliance verification in distributed work flow environments
GB2538915A (en) Detection of an unauthorized wireless communication device
GB2548270A (en) A Method and system for network access control based on traffic monitoring and vulnerability detection using process related information
WO2014140814A3 (en) Proof of presence via tag interactions
MX2015015761A (en) Distributed remote sensing system sensing device.
GB201106516D0 (en) Method and system for controlling access
EP3046006A4 (en) Information processing device, gesture detection method, and gesture detection program
WO2014028648A3 (en) System and method for forming predictions using event-based sentiment analysis
EP2661049A3 (en) System and method for malware detection
CL2015000449A1 (en) Component version management system for a machine, comprising a software-driven component located on the machine, a data system located outside the machine, and a data system controller in communication with the software-driven component and the data system, controller configured to automatically collect software and hardware version information, analyze the information, and generate notification when mismatch is detected; associated method
WO2014102523A3 (en) Processing device and method of operation thereof
EP4246530A3 (en) Event detection using a variable threshold

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13855418

Country of ref document: EP

Kind code of ref document: A2

REEP Request for entry into the european phase

Ref document number: 2013855418

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2013855418

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 20157005069

Country of ref document: KR

Kind code of ref document: A