On-demand security policy activation

ABSTRACT

On-demand activation of a security policy may be provided. Upon receiving a selection of a link, a profile identified by a security policy associated with the link may be activated and the link may be opened according to the security policy. In some embodiments, opening the link according to the security policy may comprise redirecting the opening of the link from a first application to a second application.

This application claims priority as a continuation of U.S. patentapplication Ser. No. 15/714,032, filed Sep. 25, 2017, which is acontinuation of U.S. patent application Ser. No. 13/862,218, filed Apr.12, 2013 and issued Oct. 10, 2017 as U.S. Pat. No. 9,787,686, all ofwhich are expressly incorporated by reference herein.

BACKGROUND

On-demand activation of security policies provides for launching weblinks and applications in a secure manner. In some situations, certainresources, such as e-mail and corporate intranet web pages, may only beavailable when a device is signed into a VPN. The VPN connection processcan be cumbersome and time consuming, however. Conventional approachesapproach this problem by keeping a device signed into a VPN for extendedperiods, but this can prove taxing on battery and network resources.

SUMMARY

This Summary is provided to introduce a selection of concepts in asimplified form that are further described below in the DetailedDescription. This Summary is not intended to identify key features oressential features of the claimed subject matter nor is this Summaryintended to be used to limit the claimed subject matter's scope.

On-demand activation of a security policy may be provided. Uponreceiving a selection of a link, a profile identified by a securitypolicy associated with the link may be activated and the link may beopened according to the security policy. In some embodiments, openingthe link according to the security policy may comprise redirecting theopening of the link from a first application to a second application.

It is to be understood that both the foregoing general description andthe following detailed description are examples and explanatory only,and should not be considered to restrict the disclosure's scope, asdescribed and claimed. Further, features and/or variations may beprovided in addition to those set forth herein. For example, embodimentsof the disclosure may be directed to various feature combinations andsub-combinations described in the detailed description.

BRIEF DESCRIPTION OF THE DRAWINGS

Many aspects of the present disclosure can be better understood withreference to the following diagrams. The drawings are not necessarily toscale. Instead, emphasis is placed upon clearly illustrating certainfeatures of the disclosure. Moreover, in the drawings, like referencenumerals designate corresponding parts throughout the several views. Inthe drawings:

FIG. 1 is a block diagram of a user device;

FIG. 2 is a block diagram of an operating environment; and

FIG. 3 is a flow chart illustrating a method for providing on-demandsecurity policy activation.

DETAILED DESCRIPTION

The following detailed description refers to the accompanying drawings.Wherever possible, the same reference numbers are used in the drawingsand the following description to refer to the same or similar elements.While embodiments of the disclosure may be described, modifications,adaptations, and other implementations are possible. For example,substitutions, additions, or modifications may be made to the elementsillustrated in the drawings, and the methods described herein may bemodified by substituting, reordering, or adding stages to the disclosedmethods. Accordingly, the following detailed description does not limitthe disclosure. Instead, the proper scope of the disclosure is definedby the appended claims.

On-demand virtual private networking (VPN) may be provided. On mostcomputing devices, such as personal computers, laptops, tablets,smartphones, etc., selectable links are often displayed. These links maybe associated with default applications. For example, a uniform resourcelocator (URL) link to a web page may be associated with a default webbrowser, while a symbolic file system link to an image file may beassociated with a photo editing application.

In some cases, however, these links may refer to secure resources, suchas those accessible only after a user has authenticated with adestination server of the link or only while a user's device isconnected to a virtual private network. For example, the symbolic linkto the image file may point to a file on a shared network driveassociated with a security policy that requires entry of an appropriateusername and password.

The security policy may comprise, for example, a Virtual Private Network(VPN) policy. Such a policy may require that the user's computing devicebe connected to a VPN in order to access secured resources, but allowconnection to non-secured resources whether the VPN is connected or not.The security policy may require, for example, that all URL links toresources and/or content located within a corporate intranet, may onlybe accessed via an encrypted connection and/or via an applicationoperative to execute in a secure environment (e.g., a secure memorysandbox). The security policy may therefore activate a VPN connectionwhenever a link to resources stored on the intranet is selected and/orwhenever any links in a policy-specified application are opened, such asrequiring any links opened from an e-mail application to require the VPNbe in place before opening. This may allow for enterprise policies andactions to be taken while opening the link, such as screening forviruses, spam, or malware, encrypting the data associated with the link,and/or redirecting the computing device to open the link using adifferent application than a normal default application.

The computing device may be configured to launch the VPN on demand to a“placeholder” IPSEc VPN a policy and/or management server. The devicemay auto dial this VPN for any intranet URL and/or any link listed in anemail. Upon launching the VPN, a proxy may be configured using aProxy-Auto-Config (PAC) file. A PAC file defines how applications canautomatically choose the appropriate proxy server and/or access methodfor opening a given link, often using JavaScript functions. The policyserver may act as the PAC file to dynamically change the link of therequested resource to redirect from one application to another (e.g.,from a default web browser to a secure/encrypted web browser). The appto which the link is redirected may use tunneling—individual sessionsecurity to connect the app to the secure network through a securetunnel without opening a full VPN connection—to connect to the backendnetwork. The VPN may then auto disconnect to allow the redirect tolaunch in the new application. In some embodiments, the computing devicemay receive a list of secure sites that may be associated with thesecurity profile. For example, active directory allows for thepublication of an index of corporate intranet servers/sites that may beused to populate the list of secure sites.

FIG. 1 is a block diagram of a user device 100 comprising a processor105 and a memory 110. Depending on the configuration and type of device,memory 110 may comprise, but is not limited to, volatile (e.g. randomaccess memory (RAM)), non-volatile (e.g. read-only memory (ROM)), flashmemory, or any combination. Memory 110 may store executable programs andrelated data components of various applications and modules forexecution by user device 100. Memory 110 may be coupled to processor 105for storing configuration data and operational parameters, such ascommands that are recognized by processor 105.

Basic functionality of user device 100 may be provided by an operatingsystem 115 contained in memory 100. One or more programmed softwareapplications may be executed by utilizing the computing resources inuser device 100. Applications stored in memory 110 may be executed byprocessor 105 (e.g., a central processing unit or digital signalprocessor) under the auspices of operating system 115. For example,processor 105 may be configured to execute applications such as webbrowsing applications, email applications, instant messagingapplications, and/or other applications capable of receiving and/orproviding data.

Data provided as input to and generated as output from theapplication(s) may be stored in memory 110 and read by processor 105from memory 110 as needed during the course of application programexecution. Input data may be data stored in memory 110 by a secondaryapplication or other source, either internal or external to user device100, or possibly anticipated by the application and thus created withthe application program at the time it was generated as a softwareapplication program. Data may be received via any of a plurality ofcommunication ports 120(A)-(C) of user device 100. Communication ports120(A)-(C) may allow user device 100 to communicate with other devices,and may comprise components such as an Ethernet network adapter, amodem, and/or a wireless network connectivity interface. For example,the wireless network connectivity interface may comprise one and/or moreof a PCI (Peripheral Component Interconnect) card, USB (Universal SerialBus) interface, PCMCIA (Personal Computer Memory Card InternationalAssociation) card, SDIO (Secure Digital Input-Output) card, NewCard,Cardbus, a modem, a wireless radio transceiver, and/or the like.

User device 100 may also receive data as user input via an inputcomponent 125, such as a keyboard, a mouse, a pen, a stylus, a soundinput device, a touch input device, a capture device, etc. A capturedevice may be operative to record user(s) and capture spoken words,motions and/or gestures, such as with a camera and/or microphone. Thecapture device may comprise any speech and/or motion detection devicecapable of detecting the speech and/or actions of the user(s).

Data generated by applications may be stored in memory 110 by theprocessor 105 during the course of application program execution. Datamay be provided to the user during application program execution bymeans of a display 130. Consistent with embodiments of this disclosure,display 130 may comprise an integrated display screen and/or an outputport coupled to an external display screen.

Memory 110 may also comprise a platform library 140. Platform library140 may comprise a collection of functionality useful to multipleapplications, such as may be provided by an application programminginterface (API) to a software development kit (SDK). These utilities maybe accessed by applications as necessary so that each application doesnot have to contain these utilities thus allowing for memory consumptionsavings and a consistent user interface.

Furthermore, embodiments of this disclosure may be practiced inconjunction with a graphics library, other operating systems, or anyother application program and is not limited to any particularapplication or system. The devices described with respect to the Figuresmay have additional features or functionality. For example, user device100 may also include additional data storage devices (removable and/ornon-removable) such as, for example, magnetic disks, optical disks, ortape (not shown).

User device 100 may comprise a desktop computer, a laptop computer, apersonal digital assistant, a cellular telephone, a set-top box, a musicplayer, a web pad, a tablet computer system, a game console, and/oranother device with like capability.

User device 100 may store in a data store 150 a device profile 152 and aplurality of user preferences 154. Device profile 152 may comprise anindication of the current position of user device 100 and/or indicationsof the hardware, software, and security attributes which describe userdevice 100. For instance, device profile 152 may represent hardwarespecifications of user device 100, version and configuration informationof various software program and hardware components installed on userdevice 100, data transmission protocols enabled on user device 100,version and usage information of various resources stored on user device100, and/or any other attributes associated with the state of userdevice 100. The device profile 152 may further comprise data indicatinga date of last virus scan of user device 100, a date of last access byan IT representative, a date of last service by the IT representative,and/or any other data indicating maintenance and usage of user device100. Furthermore, the device profile 152 may comprise indications of thepast behavior of associated users, such as resources accessed, chargesfor resource accesses, and the inventory accessed from such resources.User preferences 154 may comprise a listing of factors that may affectthe experience of the user. In particular, user preferences 154 mayinclude indications of the user's age, gender, bodily traits, preferredresource types, preferred venue resources, and combinations thereof.

FIG. 2 is a block diagram view of an operating environment 200comprising user device 100 in communication with a file server 210 and acompliance server 220 via a network 240. The compliance server 220 maycomprise, for example, cloud-based solutions, server computers and/orany other system providing device management capability. For purposes ofconvenience, the compliance server 220 is referred to herein in thesingular, although it is understood that a plurality of servers may beemployed in the arrangements as descried herein. Furthermore, in someembodiments, multiple compliance servers 220 may operate on the sameserver computer. The components executed on the compliance server 220,for example, may comprise various applications, services, processes,systems, engines, or functionality not disclosed in detail herein.

The compliance server 220 may comprise a policy store 230 comprising aplurality of compliance rules and/or policies that may be applicable touser device 100. While the policy store 230 is shown as within thecompliance server 220, the policy store 230 may alternately be withinthe user device 100 and/or remotely located on the file server 210 andmay be remotely updated periodically by compliance server 220 accordingto common over-the-air (OTA) updating methods. Attempts by user device100 to perform certain functionality on user device 100 may require userdevice 100 to be in compliance with one and/or more of the compliancepolicies/rules. Depending on the sensitivity of a given functionality,different compliance rules may be necessary to ensure that thefunctionality is adequately restricted. Some functionality may onlyrequire ensuring that the proper user is requesting the functionality.Other resources may require compliance with more stringent authorizationrules, such as determining whether the functionality is restrictedduring certain time windows. Accordingly, user device 100 and/orcompliance server 220 may be operative to determine whether the user ofuser device 100 is authorized to perform requested functionality at thetime the user requests to perform such functionality.

In some embodiments, an agent application 234 executed on user device100 may make the compliance determination based on the device profile,credentials, and/or user preferences. For instance, the agentapplication 234 may monitor calls by applications, such as a web browser235, an e-mail client 236, and/or a secure application 237, on userdevice 110 to the operating system 115 of user device 100 to determinewhether user device 110 seeks to perform functionality associated with agiven compliance rule. Additionally, the agent application 234 on userdevice 100 may approve and/or deny the associated functionalityrequests. For instance, the agent application 234 may instruct operatingsystem 115 on user device 100 to disable the camera of user device 100in response to a determination that a compliance rule specifies that thecamera cannot be used at the time of the request by the user device 100to operate the camera.

In some embodiments, the agent application 234 executed on user device100 may rely on compliance server 220 to determine whether a givenfunctionality request on user device 100 is permitted according to thecompliance rules. For instance, the agent application may transmit afunctionality request, a device profile, credentials, and/or userpreferences to compliance server 220 so that compliance server 220 maydetermine whether user device 110 seeks to perform functionality thatmay violate a given compliance rule. Additionally, compliance server 220may approve and/or deny the associated functionality requests. Forinstance, compliance server 220 may instruct the agent application 234on user device 100 to instruct operating system 115 to activate a VPNsecurity profile prior to opening a document and/or link.

In some embodiments, the compliance rules may comprise device settingsand/or executable instructions that define which functionality theoperating system 115 of user device 100 is authorized to perform.Furthermore, the compliance rules may comprise a list of functions, suchas those provided by APIs associated with operating system 115 and/orplatform library 140, that may be treated as protected functions. Callsto these functions, such as calls to retrieve login credentials, mayresult in checks by user device 100 and/or compliance server 220 forcompliance with the compliance rules.

The Network 240 may comprise, for example, any type of wired and/orwireless network such as a wireless local area network (WLAN), awireless wide area network (WWAN), Ethernet, fiber-optic network, and/orany other type of wired and/or wireless network now known or laterdeveloped. Additionally, the Network 240 may be or include the Internet,intranets, extranets, microwave networks, satellite communications,cellular systems, PCS, infrared communications, global area networks, orother suitable networks, etc., or any combination of such networks.

FIG. 3 is a flow chart setting forth the general stages involved in amethod 300 consistent with embodiments of this disclosure for providingon-demand VPN connectivity. Method 300 may be implemented using elementsof operating environment 200 as described above. Ways to implement thestages of method 300 will be described in greater detail below. Method300 may begin at starting block 305 and proceed to stage 310 where userdevice 100 may receive a request to open a link. For example, e-mailclient 236 may receive a selection of a uniform resource locator (URL)displayed in an e-mail message.

From stage 310, method 300 may advance to stage 320 where user device100 may determine whether the link is associated with a secure resource.For example, a plurality of secure source locations comprising remoteservers that require authentication in order to access associatedresources may be stored in a list in data store 150. For anotherexample, any links to network resources associated with a particularserver (e.g., file server 210), and/or network segment, such as acorporate intranet, may be determined to comprise secure resources.

From stage 320, method 300 may advance to stage 325 where user device100 may determine whether a security policy applies to the link. Forexample, all secure resources, as identified at stage 320, above, mayrequire one and/or more compliance policies to be in effect before thelink may be opened. Such compliance policies may be provided to userdevice 100 by compliance server 220 and/or user device 100 may provide adescription of the requested link to compliance server 220 fordetermination. In some embodiments, non-secure resources may still beassociated with a required and/or optional security policy. Thecompliance policy may comprise, for example, a requirement that certainlinks be opened over a virtual private network (VPN) or other encryptedconnection and/or may require that certain links be opened by adifferent application than may be used by default for links of the sametype. For example, a secure web browser may be required to open links tocorporate intranet resources, where the secure web browser is operativeto execute in a sandboxed memory segment that may be securely erased atregular intervals and/or when the secure browser is closed.

From stage 325, method 300 may advance to stage 330 where user device100 may open the link in accordance with the security policy. Forexample, user device 100 may activate a VPN connection prior to openingthe link. For another example, user device 100 may redirect the openingof the link from a default application to a different application. Sucha redirect may be achieved according to instructions provided by thesecurity policy and/or the redirect may be provided by compliance server220.

If the resource is not determined to comprise a secure resource or isnot determined to be access controlled by a security policy, method 300may advance to stage 340 where user device 100 may open the link using adefault application. Method 300 may then end at stage 350.

An embodiment consistent with the disclosure may comprise a system forproviding on-demand security policy activation. The system may comprisea memory storage and a processing unit coupled to the memory storage.The processing unit may be operative to receive a selection of a link,determine whether the link is associated with a security policy, and inresponse to determining that the link is associated with the securitypolicy, activate a profile identified by the security policy and openthe link according to the security policy, wherein opening the linkaccording to the security policy comprises redirecting the opening ofthe link to the secure file from a first application to a secondapplication. The processing unit may be further operative to determinewhether a VPN is connected. If so, the processing unit may be operativeto allow the link to be opened in one of a plurality of applications(e.g., allow the user to select an application.) If not, the processingunit may activate the VPN profile prior to opening the link.

Another embodiment consistent with the disclosure may comprise a systemfor providing on-demand security policy activation. The system maycomprise a memory storage and a processing unit coupled to the memorystorage. The processing unit may be operative to display a link, receivea request to open the link, determine whether the link comprises a linkto a secure file, and, in response to determining that the linkcomprises the link to the secure file, determine whether a securitypolicy applies to opening the link to the secure file, and open the linkto the secure file in accordance with the security policy, wherein beingoperative to open the link to the secure file in accordance with thesecurity policy comprises being operative to redirect the opening of thelink to the secure file from a first application to a secondapplication.

Yet another embodiment consistent with the disclosure may comprise asystem for providing on-demand security policy activation. The systemmay comprise a memory storage and a processing unit coupled to thememory storage. The processing unit may be operative to receive aselection of a link to a resource, determine whether the resourcecomprises a secure resource, and, in response to determining that theresource comprises a secure resource, activate a security policy andopen the link in accordance with the security policy, wherein openingthe link in accordance with the security policy comprises redirectingthe opening of the link from a first application to a secondapplication.

The embodiments and functionalities described herein may operate via amultitude of computing systems, including wired and wireless computingsystems, mobile computing systems (e.g., mobile telephones, tablet orslate type computers, laptop computers, etc.). In addition, theembodiments and functionalities described herein may operate overdistributed systems, where application functionality, memory, datastorage and retrieval and various processing functions may be operatedremotely from each other over a distributed computing network, such asthe Internet or an intranet. User interfaces and information of varioustypes may be displayed via on-board computing device displays or viaremote display units associated with one or more computing devices. Forexample user interfaces and information of various types may bedisplayed and interacted with on a wall surface onto which userinterfaces and information of various types are projected. Interactionwith the multitude of computing systems with which embodiments of thisdisclosure may be practiced include, keystroke entry, touch screenentry, voice or other audio entry, gesture entry where an associatedcomputing device is equipped with detection (e.g., camera) functionalityfor capturing and interpreting user gestures for controlling thefunctionality of the computing device, and the like. The Figures aboveand their associated descriptions provide a discussion of a variety ofoperating environments in which embodiments of this disclosure may bepracticed. However, the devices and systems illustrated and discussedwith respect to the Figures are for purposes of example and illustrationand are not limiting of a vast number of computing device configurationsthat may be utilized for practicing embodiments of this disclosure asdescribed herein.

The term computer readable media as used herein may include computerstorage media. Computer storage media may include volatile andnonvolatile, removable and non-removable media implemented in any methodor technology for storage of information, such as computer readableinstructions, data structures, program modules, or other data. Systemmemory, removable storage, and non-removable storage are all computerstorage media examples (i.e., memory storage.) Computer storage mediamay include, but is not limited to, RAM, ROM, electrically erasableread-only memory (EEPROM), flash memory or other memory technology,CD-ROM, digital versatile disks (DVD) or other optical storage, magneticcassettes, magnetic tape, magnetic disk storage or other magneticstorage devices, or any other medium which can be used to store.

The term computer readable media as used herein may also includecommunication media. Communication media may be embodied by computerreadable instructions, data structures, program modules, or other datain a modulated data signal, such as a carrier wave or other transportmechanism, and includes any information delivery media. The term“modulated data signal” may describe a signal that has one or morecharacteristics set or changed in such a manner as to encode informationin the signal. By way of example, and not limitation, communicationmedia may include wired media such as a wired network or direct-wiredconnection, and wireless media such as acoustic, radio frequency (RE),infrared, and other wireless media.

A number of applications and data files may be used to perform processesand/or methods as described above. The aforementioned processes areexamples, and a processing unit may perform other processes. Otherprogramming modules that may be used in accordance with embodiments ofthis disclosure may include electronic mail, calendar, and contactsapplications, data processing applications, word processingapplications, spreadsheet applications, database applications, slidepresentation applications, drawing or computer-aided applicationprograms, etc.

Generally, consistent with embodiments of this disclosure, programmodules may include routines, programs, components, data structures, andother types of structures that may perform particular tasks or that mayimplement particular abstract data types. Moreover, embodiments of thedisclosure may be practiced with other computer system configurations,including hand-held devices, multiprocessor systems,microprocessor-based or programmable consumer electronics,minicomputers, mainframe computers, and the like. Embodiments of thisdisclosure may also be practiced in distributed computing environmentswhere tasks are performed by remote processing devices that are linkedthrough a communications network. In a distributed computingenvironment, program modules may be located in both local and remotememory storage devices.

Furthermore, embodiments of this disclosure may be practiced in anelectrical circuit comprising discrete electronic elements, packaged orintegrated electronic chips containing logic gates, a circuit utilizinga microprocessor, or on a single chip containing electronic elements ormicroprocessors. Embodiments of this disclosure may also be practicedusing other technologies capable of performing logical operations suchas, for example, AND, OR, and NOT, including but not limited tomechanical, optical, fluidic, and quantum technologies. In addition,embodiments of the disclosure may be practiced within a general purposecomputer or in any other circuits or systems.

Embodiments of this disclosure may, for example, be implemented as acomputer process and/or method, a computing system, an apparatus,device, or appliance, and/or as an article of manufacture, such as acomputer program product or computer readable media. The computerprogram product may be a computer storage media readable by a computersystem and encoding a computer program of instructions for executing acomputer process. The computer program product may also be a propagatedsignal on a carrier readable by a computing system and encoding acomputer program of instructions for executing a computer process.Accordingly, the present disclosure may be embodied in hardware and/orin software (including firmware, resident software, micro-code, etc.).In other words, embodiments of the present disclosure may take the formof a computer program product on a computer-usable or computer-readablestorage medium having computer-usable or computer-readable program codeembodied in the medium for use by or in connection with an instructionexecution system. A computer-usable or computer-readable medium may beany medium that can contain, store, communicate, propagate, or transportthe program for use by or in connection with the instruction executionsystem, apparatus, or device.

The computer-usable or computer-readable medium may be, for example butnot limited to, an electronic, magnetic, optical, electromagnetic,infrared, or semiconductor system, apparatus, device, or propagationmedium. More specific computer-readable medium examples (anon-exhaustive list), the computer-readable medium may include thefollowing: an electrical connection having one or more wires, a portablecomputer diskette, a random access memory (RAM), a read-only memory(ROM), an erasable programmable read-only memory (EPROM or Flashmemory), an optical fiber, and a portable compact disc read-only memory(CD-ROM), Note that the computer-usable or computer-readable mediumcould even be paper or another suitable medium upon which the program isprinted, as the program can be electronically captured, via, forinstance, optical scanning of the paper or other medium, then compiled,interpreted, or otherwise processed in a suitable manner, if necessary,and then stored in a computer memory.

Embodiments of this disclosure may be practiced via a system-on-a-chip(SOC) where each and/or many of the elements described above may beintegrated onto a single integrated circuit. Such an SOC device mayinclude one or more processing units, graphics units, communicationsunits, system virtualization units and various applicationfunctionalities, all of which may be integrated (or “burned”) onto thechip substrate as a single integrated circuit. When operating via anSOC, the functionality, described herein, with respect to trainingand/or interacting with any element may operate via application-specificlogic integrated with other components of the computing device/system onthe single integrated circuit (chip).

Embodiments of this disclosure are described above with reference toblock diagrams and/or operational illustrations of methods, systems, andcomputer program products according to embodiments of the disclosure.The functions/acts noted in the blocks may occur out of the order asshown in any flowchart. For example, two blocks shown in succession mayin fact be executed substantially concurrently or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality/acts involved.

While certain embodiments have been described, other embodiments mayexist. Furthermore, although embodiments of the present disclosure havebeen described as being associated with data stored in memory and otherstorage mediums, data can also be stored on or read from other types ofcomputer-readable media, such as secondary storage devices, like harddisks, floppy disks, or a CD-ROM, a carrier wave from the Internet, orother forms of RAM or ROM. Further, the disclosed methods' stages may bemodified in any manner, including by reordering stages and/or insertingor deleting stages, without departing from the disclosure.

Embodiments of the present disclosure, for example, are described abovewith reference to block diagrams and/or operational illustrations ofmethods, systems, and computer program products according to embodimentsof the disclosure. The functions/acts noted in the blocks may occur outof the order as shown in any flowchart. For example, two blocks shown insuccession may in fact be executed substantially concurrently or theblocks may sometimes be executed in the reverse order, depending uponthe functionality/acts involved.

While certain embodiments of the disclosure have been described, otherembodiments may exist. Furthermore, although embodiments of the presentdisclosure have been described as being associated with data stored inmemory and other storage mediums, data can also be stored on or readfrom other types of computer-readable media, such as secondary storagedevices, like hard disks, floppy disks, or a CD-ROM, a carrier wave fromthe Internet, or other forms of RAM or ROM. Further, the disclosedmethods' stages may be modified in any manner, including by reorderingstages and/or inserting or deleting stages, without departing from thedisclosure.

All rights including copyrights in the code included herein are vestedin and the property of the Assignee. The Assignee retains and reservesall rights in the code included herein, and grants permission toreproduce the material only in connection with reproduction of thegranted patent and for no other purpose.

While the specification includes examples, the disclosure's scope isindicated by the following claims. Furthermore, while the specificationhas been described in language specific to structural features and/ormethodological acts, the claims are not limited to the features or actsdescribed above. Rather, the specific features and acts described aboveare disclosed as example for embodiments of the disclosure.

What is claimed is:
 1. A method comprising: receiving, using a firstapplication of a mobile computing device, a user selection of a resourcelocator displayed by the mobile computing device; determining, at themobile computing device, that the selected resource locator isassociated with a security policy; activating, at the mobile computingdevice, a profile identified by the security policy, wherein the profilespecifies that a second application is permitted to access a resourcereferred to by the resource locator; and accessing the resource referredto by the resource locator using the second application.
 2. The methodof claim 1, wherein the user selection is performed using an emailapplication.
 3. The method of claim 1, wherein determining that theresource locator is associated with a security policy comprisesdetermining whether an address for the resource locator is associatedwith an intranet.
 4. The method of claim 1, wherein determining whetherthe resource locator is associated with the security policy comprisesdetermining whether the resource locator is associated with at least onesecure source site.
 5. The method of claim 1, wherein the securitypolicy permits access to the resource if the mobile computing device isin communication with a specified VPN.
 6. The method of claim 1, whereinthe security policy specifies that the second application use a VPN toaccess the resource.
 7. The method of claim 1, further comprisingactivating a VPN connection for use by the second application.
 8. Anon-transitory, computer-readable medium comprising instructions that,when executed by a processor of a mobile computing device, performs amethod comprising: receiving, using a first application of the mobilecomputing device, a user selection of a resource locator displayed bythe mobile computing device; determining, at the mobile computingdevice, that the selected resource locator is associated with a securitypolicy; activating, at the mobile computing device, a profile identifiedby the security policy, wherein the profile specifies that a secondapplication is permitted to access a resource referred to by theresource locator; and accessing the resource referred to by the resourcelocator using the second application.
 9. The non-transitory,computer-readable medium of claim 8, wherein the user selection isperformed using an email application.
 10. The non-transitory,computer-readable medium of claim 8, wherein determining that theresource locator is associated with a security policy comprisesdetermining whether an address for the resource locator is associatedwith an intranet.
 11. The non-transitory, computer-readable medium ofclaim 8, wherein determining whether the resource locator is associatedwith the security policy comprises determining whether the resourcelocator is associated with at least one secure source site.
 12. Thenon-transitory, computer-readable medium of claim 8, wherein thesecurity policy permits access to the resource if the mobile computingdevice is in communication with a specified VPN.
 13. The non-transitory,computer-readable medium of claim 8, wherein the security policyspecifies that the second application use a VPN to access the resource.14. The non-transitory, computer-readable medium of claim 13, the methodfurther comprising activating a VPN connection for use by the secondapplication.
 15. A system comprising: a memory storage storing programcode; and a processor coupled to the memory storage, wherein, uponexecution, the program code causes the processor to perform stagesincluding: receiving, using a first application of a mobile computingdevice, a user selection of a resource locator displayed by the mobilecomputing device; determining, at the mobile computing device, that theselected resource locator is associated with a security policy;activating, at the mobile computing device, a profile identified by thesecurity policy, wherein the profile specifies that a second applicationis permitted to access a resource referred to by the resource locator;and accessing the resource referred to by the resource locator using thesecond application.
 16. The system of claim 15, wherein the userselection is performed using an email application.
 17. The system ofclaim 15, wherein determining that the resource locator is associatedwith a security policy comprises determining whether an address for theresource locator is associated with an intranet.
 18. The system of claim15, wherein determining whether the resource locator is associated withthe security policy comprises determining whether the resource locatoris associated with at least one secure source site.
 19. The system ofclaim 15, wherein the security policy permits access to the resource ifthe mobile computing device is in communication with a specified VPN.20. The system of claim 15, wherein the security policy specifies thatthe second application use a VPN to access the resource.