Computer software for server-based computing with access to applications installed on a server using a networked local client device; Software installed on a local server for detecting, monitoring and optionally enforcing network access; Software installed on a local server for identifying applications that are permanently or temporarily accepting inbound non-encrypted and/or inbound encrypted connections; Software installed on a local server for identifying applications that are making outbound nonencrypted and/or outbound encrypted connections; Software installed on a local server for identifying network segments that are accessing specific applications without encryption and/or with encryption; Software installed on a local server for managing network segmentation; Software installed on a local server for building a network knowledge base; Software installed on a local server for automatically generating enterprise service management resource definitions and access lists; Software installed on a local server for building policy agent profiles from the enterprise service management resources; Software installed on a local server for monitoring network activity and alert on policy violations; Software installed on a local server for providing proof positive data, including periodic reports; Software installed on a local server for detecting network traffic; Software installed on a local server for accessing lists based on current network traffic; Software installed on a local server for building profiles required to block or permit specific network traffic based on access controls; Software installed on a local server for providing standard commands; Software installed on a local server for compiling reports for compliance
Electrical and Scientific ApparatusSoftware as a service (SAAS) services featuring software for detecting, monitoring and optionally enforcing network access; Software as a service (SAAS) services featuring software for identifying applications that are permanently or temporarily accepting inbound non-encrypted and/or inbound encrypted connections; Software as a service (SAAS) services featuring software for identifying applications that are making outbound nonencrypted and/or outbound encrypted connections; Software as a service (SAAS) services featuring software for identifying network segments that are accessing specific applications without encryption and/or with encryption; Software as a service (SAAS) services featuring software for managing network segmentation; Software as a service (SAAS) services featuring software for building a network knowledge base; Software as a service (SAAS) services featuring software for automatically generating enterprise service management resource definitions and access lists; Software as a service (SAAS) services featuring software for building policy agent profiles from the enterprise service management resources; Software as a service (SAAS) services featuring software for monitoring network activity and alert on policy violations; Software as a service (SAAS) services featuring software for providing proof positive data, including periodic reports; Software as a service (SAAS) services featuring software for detecting network traffic; Software as a service (SAAS) services featuring software for accessing lists based on current network traffic; Software as a service (SAAS) services featuring software for building profiles required to block or permit specific network traffic based on access controls; Software as a service (SAAS) services featuring software for providing standard commands; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for detecting, monitoring and optionally enforcing network access; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for identifying applications that are permanently or temporarily accepting inbound non-encrypted and/or inbound encrypted connections; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for identifying applications that are making outbound nonencrypted and/or outbound encrypted connections; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for identifying network segments that are accessing specific applications without encryption and/or with encryption; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for managing network segmentation; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for building a network knowledge base; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for automatically generating enterprise service management resource definitions and access lists; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for building policy agent profiles from the enterprise service management resources; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for monitoring network activity and alert on policy violations; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for providing proof positive data, including periodic reports; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for detecting network traffic; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for accessing lists based on current network traffic; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for building profiles required to block or permit specific network traffic based on access controls; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for providing standard commands
Computer and Scientific