Penn State University 1995 - 1999
Bachelors, Operations Management
Skills:
Management Team Building Operations Management Inventory Management Microsoft Excel Lean Manufacturing Continuous Improvement Process Improvement Customer Service
- Dulles VA, US David A. Hedges - Arlington VA, US Scott T. Kelly - Laytonsville MD, US David G. Maschinsky - Washington DC, US Nathan H. Robinson - Dulles VA, US
Technologies are presented that provide cloud-based network security and access control in a networked computing system. A method may include: receiving a network traffic request from a user device, identifying the user device, applying rules specific to the network traffic request and the user device, obtaining data specific to the network traffic request in accordance with the applied rules, and providing the data to the user device for presentation to a user in accordance with the applied rules. Applying rules may include blocking, capturing, processing, redirecting, reporting on, and/or alerting to, network traffic related to the user device. The method may also include monitoring network traffic to and from the user device, and generating reports regarding the monitored network traffic. The method may further include detecting a rule violation, and providing a rule violation alert regarding the rule violation to one or more designated alert recipient devices.
- Dulles VA, US David A. Hedges - Arlington VA, US Scott T. Kelly - Laytonsville MD, US David G. Maschinsky - Washington DC, US Nathan H. Robinson - Stuttgart, DE
International Classification:
H04L 29/06
Abstract:
Technologies are presented that provide cloud-based network security and access control in a networked computing system. A method may include: receiving a network traffic request from a user device, identifying the user device, applying rules specific to the network traffic request and the user device, obtaining data specific to the network traffic request in accordance with the applied rules, and providing the data to the user device for presentation to a user in accordance with the applied rules. Applying rules may include blocking, capturing, processing, redirecting, reporting on, and/or alerting to, network traffic related to the user device. The method may also include monitoring network traffic to and from the user device, and generating reports regarding the monitored network traffic. The method may further include detecting a rule violation, and providing a rule violation alert regarding the rule violation to one or more designated alert recipient devices.