WO2014077914A3 - System and method for ensuring compliance with organizational policies - Google Patents
System and method for ensuring compliance with organizational policies Download PDFInfo
- Publication number
- WO2014077914A3 WO2014077914A3 PCT/US2013/052836 US2013052836W WO2014077914A3 WO 2014077914 A3 WO2014077914 A3 WO 2014077914A3 US 2013052836 W US2013052836 W US 2013052836W WO 2014077914 A3 WO2014077914 A3 WO 2014077914A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computing device
- policies
- organizational
- managed computing
- ensuring compliance
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
Abstract
A method for ensuring compliance with organizational policies is described herein. The method can include the step of monitoring one or more parameters of a managed computing device for compliance with one or more policies of an organization in which the organizational policies may include limitations on the managed computing device. The method can also include the step of detecting a non-conformance event at the managed computing device with respect to at least one organizational policy. In response to the detection of the non-conformance event, the operation of the managed computing device may be restricted with respect to features or data associated with the organization.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20157005069A KR20150040967A (en) | 2012-08-02 | 2013-07-31 | System and method for ensuring compliance with organizational policies |
EP13855418.3A EP2880583A4 (en) | 2012-08-02 | 2013-07-31 | System and method for ensuring compliance with organizational policies |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/564,809 | 2012-08-02 | ||
US13/564,809 US8713173B2 (en) | 2008-12-19 | 2012-08-02 | System and method for ensuring compliance with organizational policies |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2014077914A2 WO2014077914A2 (en) | 2014-05-22 |
WO2014077914A3 true WO2014077914A3 (en) | 2014-08-21 |
Family
ID=50731803
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2013/052836 WO2014077914A2 (en) | 2012-08-02 | 2013-07-31 | System and method for ensuring compliance with organizational policies |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP2880583A4 (en) |
KR (1) | KR20150040967A (en) |
WO (1) | WO2014077914A2 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016186662A1 (en) * | 2015-05-19 | 2016-11-24 | Hewlett Packard Enterprise Development Lp | Mobile asset compliance evaluation |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050027980A1 (en) * | 2003-07-01 | 2005-02-03 | Vidius Inc. | Apparatus and method for ensuring compliance with a distribution policy |
US20050183143A1 (en) * | 2004-02-13 | 2005-08-18 | Anderholm Eric J. | Methods and systems for monitoring user, application or device activity |
WO2007059428A2 (en) * | 2005-11-10 | 2007-05-24 | Secure Computing Corporation | Content-based policy compliance systems and methods |
US20120036220A1 (en) * | 2008-12-19 | 2012-02-09 | Openpeak Inc. | Systems for accepting and approving applications and methods of operation of same |
US20120072985A1 (en) * | 2010-05-18 | 2012-03-22 | Freedom Professional Service & Technologies LLC d/b/a Freedom OSS | Managing services in a cloud computing environment |
-
2013
- 2013-07-31 EP EP13855418.3A patent/EP2880583A4/en not_active Withdrawn
- 2013-07-31 KR KR20157005069A patent/KR20150040967A/en not_active Application Discontinuation
- 2013-07-31 WO PCT/US2013/052836 patent/WO2014077914A2/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050027980A1 (en) * | 2003-07-01 | 2005-02-03 | Vidius Inc. | Apparatus and method for ensuring compliance with a distribution policy |
US20050183143A1 (en) * | 2004-02-13 | 2005-08-18 | Anderholm Eric J. | Methods and systems for monitoring user, application or device activity |
WO2007059428A2 (en) * | 2005-11-10 | 2007-05-24 | Secure Computing Corporation | Content-based policy compliance systems and methods |
US20120036220A1 (en) * | 2008-12-19 | 2012-02-09 | Openpeak Inc. | Systems for accepting and approving applications and methods of operation of same |
US20120072985A1 (en) * | 2010-05-18 | 2012-03-22 | Freedom Professional Service & Technologies LLC d/b/a Freedom OSS | Managing services in a cloud computing environment |
Non-Patent Citations (1)
Title |
---|
See also references of EP2880583A4 * |
Also Published As
Publication number | Publication date |
---|---|
EP2880583A4 (en) | 2016-03-23 |
KR20150040967A (en) | 2015-04-15 |
EP2880583A2 (en) | 2015-06-10 |
WO2014077914A2 (en) | 2014-05-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015013376A3 (en) | Systems and methods for self-tuning network intrusion detection and prevention | |
WO2015100177A3 (en) | Neural watchdog | |
WO2014078466A3 (en) | Application-level anomaly detection | |
WO2015008290A3 (en) | Method and device for assisting in safe driving of a vehicle | |
WO2013164821A3 (en) | Detection and prevention for malicious threats | |
WO2014078585A3 (en) | Methods, systems and computer readable media for detecting command injection attacks | |
EP3407534A4 (en) | In-car computer system, vehicle, key generation device, management method, key generation method, and computer program | |
GB201100039D0 (en) | Server, user device and malware detection method thereof | |
IN2014CH01209A (en) | ||
WO2014140926A3 (en) | Systems, methods, and computer-readable media for identifying when a subject is likely to be affected by a medical condition | |
WO2013130539A3 (en) | Time-stamped emissions data collection for process control devices | |
WO2013040496A3 (en) | System and method for real-time customized threat protection | |
WO2011146917A3 (en) | Apparatuses, systems and methods for determining installed software applications on a computing device | |
WO2014124270A3 (en) | Intelligent management and compliance verification in distributed work flow environments | |
GB2538915A (en) | Detection of an unauthorized wireless communication device | |
GB2548270A (en) | A Method and system for network access control based on traffic monitoring and vulnerability detection using process related information | |
WO2014140814A3 (en) | Proof of presence via tag interactions | |
MX2015015761A (en) | Distributed remote sensing system sensing device. | |
GB201106516D0 (en) | Method and system for controlling access | |
EP3046006A4 (en) | Information processing device, gesture detection method, and gesture detection program | |
WO2014028648A3 (en) | System and method for forming predictions using event-based sentiment analysis | |
EP2661049A3 (en) | System and method for malware detection | |
CL2015000449A1 (en) | Component version management system for a machine, comprising a software-driven component located on the machine, a data system located outside the machine, and a data system controller in communication with the software-driven component and the data system, controller configured to automatically collect software and hardware version information, analyze the information, and generate notification when mismatch is detected; associated method | |
WO2014102523A3 (en) | Processing device and method of operation thereof | |
EP4246530A3 (en) | Event detection using a variable threshold |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13855418 Country of ref document: EP Kind code of ref document: A2 |
|
REEP | Request for entry into the european phase |
Ref document number: 2013855418 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2013855418 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 20157005069 Country of ref document: KR Kind code of ref document: A |