-
公开(公告)号:US10999329B2
公开(公告)日:2021-05-04
申请号:US16742238
申请日:2020-01-14
Applicant: VMware, Inc.
Inventor: Gaurav Verma , Suchit Shivashankar , Don Joy
Abstract: Disclosed are various examples for enforcing network access permissions on applications that are installed on a client device. A network whitelist or network blacklist can be deployed by a management service onto a managed client device. A management component can facilitate enforcement of the whitelist and/or blacklist to enforce network access rules on installed applications.
-
公开(公告)号:US10560482B2
公开(公告)日:2020-02-11
申请号:US15795286
申请日:2017-10-27
Applicant: VMWARE, INC.
Inventor: Gaurav Verma , Suchit Shivashankar , Don Joy
Abstract: Disclosed are various examples for enforcing network access permissions on applications that are installed on a client device. A network whitelist or network blacklist can be deployed by a management service onto a managed client device. A management component can facilitate enforcement of the whitelist and/or blacklist to enforce network access rules on installed applications.
-
公开(公告)号:US11689575B2
公开(公告)日:2023-06-27
申请号:US17241524
申请日:2021-04-27
Applicant: VMware, Inc.
Inventor: Gaurav Verma , Suchit Shivashankar , Don Joy
CPC classification number: H04L63/20 , H04L63/101 , H04W12/08 , H04W12/37
Abstract: Disclosed are various examples for enforcing network access permissions on applications that are installed on a client device. A network whitelist or network blacklist can be deployed by a management service onto a managed client device. A management component can facilitate enforcement of the whitelist and/or blacklist to enforce network access rules on installed applications.
-
公开(公告)号:US10673951B2
公开(公告)日:2020-06-02
申请号:US15936478
申请日:2018-03-27
Applicant: VMWARE, INC.
Inventor: Don Joy , Gaurav Verma , Suchit Shivashankar
Abstract: Examples described herein include systems and methods for migrating a group of user devices associated with an enterprise from a first device-management service to a second device-management service. An example method can include receiving a request to migrate the group of user devices from the first device-management service to the second device-management service. The second device-management service can associate the enterprise support service with the second, rather than the first, device-management service. It can also cause the enterprise support service to install an agent application the user devices in the group. Finally, the second device-management service can remove one or more applications, associated with the first device-management service, from the user devices in the group.
-
-
-