Supercharge Your Innovation With Domain-Expert AI Agents!

Framework for coordination between endpoint security and network security services

A security service and security technology, applied in computer security devices, instruments, computing, etc., can solve problems such as application program and operating system program or code attack, consumption of computer resources, computer operation deterioration or interruption, etc., to prevent proliferation or impact. , Prevent the leakage of sensitive information, and minimize the effect of time

Active Publication Date: 2019-08-02
NICIRA
View PDF13 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In addition, applications and operating systems, whether executed on a virtual machine or directly on a host computer, remain vulnerable to programs or code such as viruses or worms that surreptitiously enter the computer environment
Viruses often replicate themselves, or cause them to be replicated, thereby consuming excessive computer resources and causing degradation or interruption of computer operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Framework for coordination between endpoint security and network security services
  • Framework for coordination between endpoint security and network security services
  • Framework for coordination between endpoint security and network security services

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] This document describes a framework for enabling synergistic orchestration between different endpoint security services (eg, antivirus software) and network security services (eg, network firewalls). Such a framework may enable rapid and automated responses to security policy violations within a virtual machine environment, while enabling customers to select the best of breed endpoint and network security services, including those offered by different vendors.

[0019] figure 1 An example of virtual machines being assigned to secure containers and being transferred between secure containers is shown. A physical machine, such as a data processing apparatus, may execute virtual machines 110a-d according to respectively assigned secure containers 105a-c. Security containers 105a-c are virtual machine operating environments that may specify policies such as firewall settings 115a-c, operational settings for one or more security services, and tag-based rules 120a-c. In som...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a framework for coordination between endpoint security and network security services. A technique includes operating one or more virtual machines each in accordance with a respective security container, wherein the respective security container is associated with a respective rule that specifies transfer of the virtual machine from the respective security container to a quarantine container based on one or more criteria. One or more security services are operated on the one or more virtual machines to identify one or more security threats associated with one or more ofthe virtual machines. One or more tags generated by the endpoint security services are obtained, where each tag is used for a virtual machine that is associated with one of the identified security threats. And one of the virtual machines is identified as requiring transfer to the quarantine container based on, at least, one or more of the obtained tags and the one or more criteria.

Description

[0001] This application is a divisional application of an invention patent application with the application number 201480034454.9, the application date is April 11, 2014, and the invention title is "Framework for Coordination Between Endpoint Security and Network Security Services". technical field [0002] This document deals with virtual machines and security services. Background technique [0003] A virtual machine is a software-based abstraction of a physical computer system. Generally, any computer program that can be executed on a physical computer system can be executed in a virtual machine using virtualization software. Virtualization software is software that logically intervenes between and interfaces with a virtual machine and a physical computer system. Each virtual machine is configured to execute an operating system, referred to herein as a guest OS, and application programs. A physical computer system, referred to herein as a host, can execute one or more vi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F9/455
CPCG06F21/554G06F21/56G06F21/568G06F21/53H04L63/20
Inventor S·M·韦德亚A·费罗泽A·森谷普塔J·C·维塞
Owner NICIRA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More