发明名称 IDENTIFYING UNAUTHORIZED CHANGES TO NETWORK ELEMENTS AND DETERMINING THE IMPACT OF UNAUTHORIZED CHANGES TO NETWORK ELEMENTS ON NETWORK SERVICES
摘要 Methods of managing an information technology (IT) infrastructure include detecting by a configuration management system an unauthorized change to one of a plurality of network elements, determining by the configuration management system that the unauthorized change to the one of the plurality of network elements creates a risk condition to an operation of one of the services provided by the IT infrastructure, and initiating an action to remedy the unauthorized change in response to determining that the unauthorized change to the one of the plurality of network elements creates the risk condition to the operation of one of the services provided by the IT infrastructure. Related systems and computer program products are disclosed.
申请公布号 US2016043919(A1) 申请公布日期 2016.02.11
申请号 US201414454150 申请日期 2014.08.07
申请人 CA, INC. 发明人 Connelly Kieron John James;Subrahmanya Sudhakar Anivella Venkata Satya Sai Narsimha;Isenberg Steven M.;Sato Mirian Minomizaki;Chen Daocheng
分类号 H04L12/26;H04L29/06;H04L12/24 主分类号 H04L12/26
代理机构 代理人
主权项 1. A method of managing an information technology (IT) infrastructure comprising a plurality of interconnected network elements that are configured to provide services to clients of the IT infrastructure, a configuration management system that manages elements of the IT infrastructure, and a service management system that monitors operation of services provided by the IT infrastructure, the method comprising: detecting by the configuration management system an unauthorized change to one of the plurality of network elements; determining by the configuration management system that the unauthorized change to the one of the plurality of network elements creates a risk condition to an operation of one of the services provided by the IT infrastructure; and initiating an action to remedy the unauthorized change in response to determining that the unauthorized change to the one of the plurality of network elements creates the risk condition to the operation of one of the services provided by the IT infrastructure.
地址 Islandia NY US