Computer Forensics Research CISSP Information Security Management Vulnerability Management Data Loss Prevention Enterprise Architecture Governance Data Privacy DLP Vulnerability Assessment Data Leakage Active Directory Security Security Architecture Design Disaster Recovery Vendor Management
Michael T. Engle - Union City NJ, US Frederick Nwokobia - Union NJ, US Bradley D. Noack - Hoboken NJ, US Jerzy Makowiecki - Whitehouse Station NJ, US
Assignee:
Lehman Brothers Inc. - New York NY
International Classification:
G06F 17/00 H04K 1/00 H04L 9/00
US Classification:
726 1, 726 9, 709219
Abstract:
A system and method to ensure that a remote computer making a VPN connection complies with network security policies. Server-driven security checks may be configured to verify compliance with each access level before access is granted at that level. The security checks may be selected based at least according to the information received from the remote computer. After the server determines that the remote computer complies with the security policy for the requested access level, the server may pass a token to the remote computer, or may grant VPN access to the remote computer. If the remote computer does not comply with the security policy associated with the requested access level but is in compliance with a security policy corresponding to a lower access level, the server may grant the remote computer access to the lower access level.
Michael T. Engle - Union City NJ, US Frederick Nwokobia - Union NJ, US Bradley D. Noack - Hoboken NJ, US Jerzy Makowiecki - Whitehouse Station NJ, US
Assignee:
Lehman Brothers Inc. - New York NY
International Classification:
G06F 17/00
US Classification:
726 12, 726 15, 709219
Abstract:
A system and method to ensure that a remote computer making a VPN connection complies with network security policies. Server driven security checks may be configured to verify compliance with each access level before access is granted at that level. The security checks may be selected based at least according to the information received from the remote computer. After the server determines that the remote computer complies with the security policy for the requested access level, the server may pass a token to the remote computer, or may grant VPN access to the remote computer. If the remote computer does not comply with the security policy associated with the requested access level but is in compliance with a security policy corresponding to a lower access level, the server may grant the remote computer access to the lower access level.
A system and method to ensure that a remote computer making a VPN connection complies with network security policies. Server-driven security checks may be configured to verify compliance with each access level before access is granted at that level. The security checks may be selected based at least according to the information received from the remote computer. After the server determines that the remote computer complies with the security policy for the requested access level, the server may pass a token to the remote computer, or may grant VPN access to the remote computer. If the remote computer does not comply with the security policy associated with the requested access level but is in compliance with a security policy corresponding to a lower access level, the server may grant the remote computer access to the lower access level.
Are you looking for Frederick Nwokobia? MyLife is happy to assist you on the quest as we dedicate our efforts to streamline to process of finding long-lost ...