DEVICE DATA-AT-REST SECURITY USING EXTENDED VOLUME ENCRYPTION DATA

    公开(公告)号:US20230016069A1

    公开(公告)日:2023-01-19

    申请号:US17371198

    申请日:2021-07-09

    Applicant: VMware, Inc.

    Abstract: Examples of scheduled and on-demand volume encryption suspension are described. A management service can identify multi-volume encryption rules for local volumes of a client device including the operating system volume as well as non-operating-system volumes. The encryption rules can be transmitted to the client device. Volume encryption samples for the client device can be received, and a console user interface can be generated to indicate compliance status information for the multi-volume encryption rules for local volumes of a client device.

    Implementing management modes for user device management

    公开(公告)号:US11411816B1

    公开(公告)日:2022-08-09

    申请号:US17326934

    申请日:2021-05-21

    Applicant: VMware, Inc.

    Abstract: Systems and methods are described for managing a user device in multiple management modes. In an example, an agent executing on the user device can enroll the user device with a Unified Endpoint Management (“UEM”) system in a limited management mode. The agent can receive and install a first configuration profile from a server that configures the agent to operate on an unmanaged channel of the user device. In one example, the user device can have a third-party management client that manages the user device on a managed channel. The third-party management client can be removed. The agent can enroll the user device with the UEM in a full management mode. The agent can receive and install a second configuration profile that configures the agent to operate on the managed channel of the user device.

    Device data-at-rest security using extended volume encryption data

    公开(公告)号:US12135797B2

    公开(公告)日:2024-11-05

    申请号:US17371198

    申请日:2021-07-09

    Applicant: VMware, Inc.

    Abstract: Examples of scheduled and on-demand volume encryption suspension are described. A management service can identify multi-volume encryption rules for local volumes of a client device including the operating system volume as well as non-operating-system volumes. The encryption rules can be transmitted to the client device. Volume encryption samples for the client device can be received, and a console user interface can be generated to indicate compliance status information for the multi-volume encryption rules for local volumes of a client device.

    TRUSTED FIRMWARE VERIFICATION
    9.
    发明申请

    公开(公告)号:US20210334380A1

    公开(公告)日:2021-10-28

    申请号:US16857971

    申请日:2020-04-24

    Applicant: VMware, Inc.

    Abstract: Disclosed are various examples for verification and management of firmware for client devices enrolled with a management service of an enterprise. The firmware verification includes a verification process using multiple checkpoints for determining whether status responses associated with firmware installed on and received from a managed client device can be trusted. The multiple checkpoints can include verifying certificate data, signature data, and an exit code included in status responses received from managed devices. In the event that one of the verification steps fails, the device can be considered compromised and subject to various compliance actions. The compliance actions can include limiting access to enterprise data, limiting access to one or more applications, wiping a device clean to reset the devices to the original factory settings, sending a notification to an enterprise administrator providing an indication of the detected compromise, and other types of compliance actions.

    Trusted firmware verification
    10.
    发明授权

    公开(公告)号:US12086257B2

    公开(公告)日:2024-09-10

    申请号:US16857971

    申请日:2020-04-24

    Applicant: VMware, Inc.

    Abstract: Disclosed are various examples for verification and management of firmware for client devices enrolled with a management service of an enterprise. The firmware verification includes a verification process using multiple checkpoints for determining whether status responses associated with firmware installed on and received from a managed client device can be trusted. The multiple checkpoints can include verifying certificate data, signature data, and an exit code included in status responses received from managed devices. In the event that one of the verification steps fails, the device can be considered compromised and subject to various compliance actions. The compliance actions can include limiting access to enterprise data, limiting access to one or more applications, wiping a device clean to reset the devices to the original factory settings, sending a notification to an enterprise administrator providing an indication of the detected compromise, and other types of compliance actions.

Patent Agency Ranking