Mark A. Beadles - Hilliard OH, US William S. Emerick - Dublin OH, US Kevin A. Russo - Lewis Center OH, US Kenneth E. Mulh - Upper Arlington OH, US Raymond J. Bell - Mill Valley CA, US
Assignee:
Endforce, Inc. - Dublin OH
International Classification:
G06F 9/24
US Classification:
713193, 713168
Abstract:
A policy engine in a policy-based, outsourced, network management system. In one embodiment, the management system is multi-layered, modular and stores device configuration data in non-device specific format, which are subsequently translated to device-specific format by lower layers of the management system. The non-device specific format is the same (e. g. , XML) as that used to create the policies with the user GUI (e. g. , browser) and transport them to the service center over the internet. A database stores a policy directory in a hierarchical format that is separate from a policy store (configuration store) for devices in a flat (non-hierarchical or parallel) format. In one embodiment, a policy engine develops policies in a hierarchical format, but then stores the device schema, or objects, in a low-level, flat database. Multiple hierarchical services which impact a single device have the characteristics related to that device knitted together, and then fed back to a policy store database as a flat file for that device, in a non-device specific format. Thus, instead of storing the policies separately, and in hierarchical linked format, the device descriptions are stored with the aspects of all policies that affect that device.
Selection And Storage Of Policies In Network Management
Mark A. Beadles - Hilliard OH, US William S. Emerick - Dublin OH, US Kevin A. Russo - Lewis Center OH, US Kenneth E. Mulh - Upper Arlington OH, US Raymond J. Bell - Mill Valley CA, US
Assignee:
Sophos PLC - Abingdon
International Classification:
G06F 17/30
US Classification:
707792
Abstract:
User interface and policy loading aspects of a policy-based, outsourced, network management system. In one aspect, a user selects policies using a graphical user interface (GUI) with a two paned window having a tree view of the policies in one pane. In another aspect, the policies are (1) created in the GUI format (e. g. , XML), (2) sent over a network (e. g. , the internet) to a service center in the same format, and (3) are loaded, manipulated and stored in the same format. In another aspect, the initial loading of the policies is done using a bulk loader in a logic layer. In another aspect, the logic layer also includes a configuration checker which handles changes or additions to policies in a finished network management system. Any aspects of the new or changed policy that are inconsistent with the finished system are parsed and stripped out. In another aspect, where the details of a new policy or change aren't specified, a base configuration creator creates a policy with minimal attributes.
Selection And Storage Of Policies In Network Management
Mark A. Beadles - Hilliard OH, US William S. Emerick - Dublin OH, US Kevin A. Russo - Lewis Center OH, US Kenneth E. Mulh - Upper Arlington OH, US Raymond J. Bell - Mill Valley CA, US
Assignee:
Sophos PLC - Abingdon
International Classification:
G06F 17/30
US Classification:
707804, 707792
Abstract:
User interface and policy loading aspects of a policy-based, outsourced, network management system. In one aspect, a user selects policies using a graphical user interface (GUI) with a two paned window having a tree view of the policies in one pane. In another aspect, the policies are (1) created in the GUI format (e. g. , XML), (2) sent over a network (e. g. , the internet) to a service center in the same format, and (3) are loaded, manipulated and stored in the same format. In another aspect, the initial loading of the policies is done using a bulk loader in a logic layer. In another aspect, the logic layer also includes a configuration checker which handles changes or additions to policies in a finished network management system. Any aspects of the new or changed policy that are inconsistent with the finished system are parsed and stripped out. In another aspect, where the details of a new policy or change aren't specified, a base configuration creator creates a policy with minimal attributes.
Selection And Storage Of Policies In Network Management
Mark Beadles - Hilliard OH, US William Emerick - Dublin OH, US Kevin Russo - Lewis Center OH, US Kenneth Mulh - Upper Arlington OH, US Raymond Bell - Mill Valley CA, US
Assignee:
Smartpipes, Incorporated - Redwood City CA
International Classification:
G06F017/30
US Classification:
707/001000
Abstract:
User interface and policy loading aspects of a policy-based, outsourced, network management system. In one aspect, a user selects policies using a graphical user interface (GUI) with a two paned window having a tree view of the policies in one pane. In another aspect, the policies are (1) created in the GUI format (e.g., XML), (2) sent over a network (e.g., the internet) to a service center in the same format, and (3) are loaded, manipulated and stored in the same format. In another aspect, the initial loading of the policies is done using a bulk loader in a logic layer. In another aspect, the logic layer also includes a configuration checker which handles changes or additions to policies in a finished network management system. Any aspects of the new or changed policy that are inconsistent with the finished system are parsed and stripped out. In another aspect, where the details of a new policy or change aren't specified, a base configuration creator creates a policy with minimal attributes. In another aspect, the logic layer also contains a device control console, which allows bypassing the policy creating and configuring to allow a user to directly access a device for configuration.
Mark Beadles - Hilliard OH, US William Emerick - Dublin OH, US Kevin Russo - Lewis Center OH, US Kenneth Mulh - Upper Arlington OH, US Raymond Bell - Mill Valley CA, US
Assignee:
Smartpipes, Incorporated - Redwood City CA
International Classification:
G06F015/177
US Classification:
709/220000
Abstract:
A modular remote network management system which can configure a customer's network over the internet. A first module receives customer descriptions of desired customer network policy configurations. Another module automatically translates that description into device-level policy configuration data. Finally, a third module transmits the device-level policy configuration data over the internet to the devices of the customer network.
Event Management For A Remote Network Policy Management System
Mark Beadles - Hilliard OH, US William Emerick - Dublin OH, US Kevin Russo - Lewis Center OH, US Kenneth Mulh - Upper Arlington OH, US Raymond Bell - Mill Valley CA, US
Assignee:
Smartpipes, Incorporated - Redwood City CA
International Classification:
G06F015/173
US Classification:
709/223000
Abstract:
An event manager for a remote network management system. The event manager provides dynamic response for the purposes of controlling policy updates, generation and deployment. Dynamic events are used to communicate the fact that policy changes/updates/creations have occurred. In prior art systems, a user would simply make a data update, and then the system would retrieve the latest data from the data storage synchronously.
Selection And Storage Of Policies In Network Management
Mark Beadles - Hilliard OH, US William Emerick - Dublin OH, US Kevin Russo - Lewis Center OH, US Kenneth Mulh - Upper Arlington OH, US Raymond Bell - Mill Valley CA, US
Assignee:
Endforce, Inc. - Dublin OH
International Classification:
G06F 17/30
US Classification:
707010000
Abstract:
User interface and policy loading aspects of a policy-based, outsourced, network management system. In one aspect, a user selects policies using a graphical user interface (GUI) with a two paned window having a tree view of the policies in one pane. In another aspect, the policies are (1) created in the GUI format (e.g., XML), (2) sent over a network (e.g., the internet) to a service center in the same format, and (3) are loaded, manipulated and stored in the same format. In another aspect, the initial loading of the policies is done using a bulk loader in a logic layer. In another aspect, the logic layer also includes a configuration checker which handles changes or additions to policies in a finished network management system. Any aspects of the new or changed policy that are inconsistent with the finished system are parsed and stripped out. In another aspect, where the details of a new policy or change aren't specified, a base configuration creator creates a policy with minimal attributes. In another aspect, the logic layer also contains a device control console, which allows bypassing the policy creating and configuring to allow a user to directly access a device for configuration.
Ohio Cyber Collaboration Committe
Chair, Cyber Range Subcommittee
Oarnet & the Ohio Technology Consortium at the Ohio State University
Information Security Officer
Great Lakes Grey Matter
Founder
Sophos Jan 2007 - Feb 2009
Chief Technologist
Endforce Jan 2004 - Jan 2007
Chief Architect
Education:
Michigan State University 1989 - 1993
Bachelors, Bachelor of Science, Social Science
Us Army Noncommissioned Officer Academy 1988 - 1988
Skills:
Security Cloud Computing Enterprise Software Network Security Data Center Networking Software Development Saas Information Security Computer Security Identity Management Program Management Integration Product Management Business Continuity Tcp/Ip Leadership Enterprise Architecture Network Administration It Operations Start Ups System Administration Firewalls Requirements Analysis It Strategy Virtualization System Architecture Telecommunications It Management Ip Architecture Technical Writing Strategic Planning Technical Leadership Linux Operating Systems Unix Cisco Technologies Information Technology Vmware Disaster Recovery Business Analysis Team Leadership Cissp Information Security Management Itil Architectures
Columbus, OH Dublin, OH Hilliard, OH Anchorage, AK Kalamazoo, MI Haslett, MI Augusta, GA Okemos, MI East Lansing, MI Three Rivers, MI Vicksburg, MI Fort Dix, NJ
Work:
Ohio State University - Information Security Officer