Network monitoring system with remote access
Abstract:
Methods for a NETWORK MONITORING WITH REMOTE ACCESS are disclosed. A secured customer network comprises computing resources that are connected together in an internal network. The secured customer network is protected by a security perimeter, which prevents access by unauthorized devices outside the perimeter. This internal network is connected to a secured customer network monitor, which is in turn, connected to an intelligence engine and to a security broker. An application program is installed onto a mobile computing device, which allows connection of the mobile computing device to the network while it is within the secured perimeter. The mobile computing device connects to and obtains access authorization credentials from a security broker that is part of the network. After disconnecting from the security broker and being moved outside the security perimeter, the remote computing device creates a secure remote session with the intelligence engine.
Public/Granted literature
Information query
Patent Agency Ranking
0/0