主权项 |
1. A cloud based method, implemented by a cloud node, for enforcing policy of a user communicatively coupled to an external network through a cloud system, comprising:
installing one of a mobile profile and an application on a mobile device associated with the user, wherein the mobile profile and the application enables the mobile device to communicate through the cloud system; monitoring and logging all communication between the user and the external network via a tunnel, a transparent proxy, a forward proxy, or redirection to the cloud node based on the mobile profile or the application, wherein the cloud node is in a distributed, cloud-based security system, wherein the cloud-based security system is external from the user and external from an enterprise network, and the cloud node acts as a proxy for the communication between a device associated with the user and the external network in a location and platform independent manner for the user, wherein the platform independent manner comprises the cloud node operating similarly for any device, platform, and operating system; allowing or blocking user generated data to Web 2.0 sites based on the policy, wherein the allowing or blocking comprises quarantining the user generated data, based on the policy, for inspection prior to sending to the Web 2.0 site, wherein the user generated data comprises any of comments, posts, and likes on the Web 2.0 site, and wherein the inspection is performed for data leakage prevention to the Web 2.0 site, the data leakage prevention is performed by the cloud node; inspecting and filtering data from the Web 2.0 sites prior to sending the data to the user, wherein the inspecting and filtering data comprises blocking malicious data from the user and notifying the user of blocked malicious data, the malicious data comprises viruses, spyware, malware, Trojans, botnets, spam email, or phishing content, wherein the inspecting and filtering data is through the cloud node which maintains transaction summaries for compliance. |