Globally distributed infrastructure for secure content management

ABSTRACT

Secure content management is enabled as a cloud-based service through which security protection and policy enforcement may be implemented for both on-premise network users and roaming users. The global SCM service integrates the security functionalities—such as anti-virus, spyware and phishing protection, firewall, intrusion detection, centralized management, and the like—that are typically provided by enterprise network SCM appliance hardware or servers into a cloud-based service that users reach via Internet-based points-of-presence (“POPs”). The POPs are configured with forward proxy servers, and in some implementations, caching and network acceleration components, and coupled to hubs which provide configuration management and identity management services such as active directory services.

STATEMENT OF RELATED APPLICATION

This application claims the benefit of U.S. Provisional PatentApplication Ser. No. 61/019,739, filed Jan. 8, 2008, entitled “GloballyDistributed Infrastructure for Secure Content Management” the disclosureof which is incorporated by reference with the same effect as if setforth at length herein.

BACKGROUND

Secure Content Management, or “SCM,” is a term that is commonly used todescribe the functionality provided by security products and appliancesthat are utilized to protect the IT (information technology) assets ofan enterprise such as a business, company, or other organization. Suchfunctionality can include, for example, filtering network traffic intoand out of the enterprise for malicious code such as viruses and worms,limiting access to inappropriate external content on the Internet frominside the enterprise, and preventing attacks and other intrusions onthe enterprise network. SCM can also reduce the vulnerability of theenterprise to client-side exploits, spam e-mail, and phishing schemeswhere valuable and/or confidential information can be stolen.

Enterprises will often implement security policies that govern assetutilization to meet their particular business needs. These policiestypically cover how information in the enterprise is handled, who mayaccess information, what kinds of information may be accessed and whenthat information may be accessed, permissible and impermissiblebehaviors, auditing practices, and the like.

SCM can generally provide excellent protection against known and unknownInternet-borne threats for IT assets that are located within theperimeter of the enterprise. However, many enterprises are increasinglyutilizing mobile IT assets such as laptop computers having, for example,Wi-Fi or other network connectivity functionality. Portable computingdevices like smartphones, which may support both voice and wireless datacommunication features such as e-mail, are also seeing widespread usage.

Existing SCM solutions typically require roaming users to connect backto their company's enterprise network in order to access the Internet.This is often impractical if the roaming user is not close to theenterprise network because of the high latency that would typically beexperienced or for other reasons, such as lack of support forlocalization of the user experience. As a result, roaming users andother users outside the enterprise network may utilize Internet accessprovided by Internet service providers (“ISPs”) and use public points ofaccess such as Wi-Fi “hotspots” where security protection may not be ascomprehensive as protection provided in the enterprise network. This canbe a drawback to existing SCM solutions because such mobile IT assetscan become vulnerable to security threats, and are not subject to theenforcement of the company's security policies when operated outside thepremises of the protected enterprise network. In addition, while SCMcurrently provides comprehensive security solutions for business-basedusers, SCM solutions for the consumer market have not been developedwith the same level of effectiveness.

This Background is provided to introduce a brief context for the Summaryand Detailed Description that follow. This Background is not intended tobe an aid in determining the scope of the claimed subject matter nor beviewed as limiting the claimed subject matter to implementations thatsolve any or all of the disadvantages or problems presented above.

SUMMARY

Secure content management is enabled as a cloud-based service throughwhich security protection and policy enforcement may be implemented forboth on-premise network users and roaming users. The global SCM serviceintegrates the security functionalities—such as anti-virus, spyware andphishing protection, firewall, intrusion detection, information leakageprevention, centralized management, and the like—that are typicallyprovided by enterprise network SCM appliance hardware or servers into acloud-based service that users reach via Internet-basedpoints-of-presence (“POPs”). The POPs are configured with forward proxyservers, and in some implementations, caching and networkacceleration/optimization components, and coupled to hubs which provideconfiguration management and identity management services such as activedirectory services.

The POPs can be distributed on a large scale basis to ensure that userscan access the global SCM service virtually anywhere using a co-locatedPOP. Such co-location, where the POP is relatively close to the globalSCM service user, enables a high quality user experience with lownetwork latency, while simultaneously providing for localization of theexperience so that accessed resources, such as web pages, areappropriately supported in terms of language, characters sets, currency,time zone, and other localization criteria.

The global SCM service advantageously provides for securing everyinteraction (e.g., every “click” of a mouse or pointing device) withresources on the Internet regardless of the user's location. The samelevel of protection, quality of security, and security policies can beapplied to all enterprise IT assets, both on-premise and mobile, inexactly the same way. In addition to extending protection beyond theboundaries of the enterprise network, in some implementations, byshifting the focus of security away from SCM appliances to one supportedby a service model, the size of the vulnerability window is reduced asmalware signatures may be identified and deployed to the POPs quickly.In addition, total costs of ownership can often decrease and deploymentof the SCM security solution across all IT assets is simplified whenutilized as a service, and bandwidth consumption on target resourceservers is reduced because the global SCM service load balances usersacross the POPs and can also filter traffic to the servers throughpolicy enforcement.

In various illustrative examples, the global SCM service is arranged tosupport consumer users who desire to use cloud-based securityprotection. The global SCM service can protect the consumer'snetworkable computing devices that may be located in the home, outsidethe home while roaming, for example at a Wi-Fi hotspot at a publiclibrary or shopping center, or outside the home when a family membertakes a laptop away to college. In all these scenarios, userpreferences, parental controls, and other options can be maintained bythe global SCM service, irrespective of where the devices are located,much like policies in a business setting can be enforced. In addition,the global SCM service provides comprehensive security protectionagainst malware, hackers, and other threats.

A secure search service may be supported by the global SCM service. Inthis example, the service can check or clean links to the web pagesreturned as search results to frustrate hackers or spammers whoartificially boost rankings of their sites in an attempt to draw usersto them.

In cases where a user experience with an Internet-based resource such asa website requires a particular resource that a user does not have onthe user's local IT device or may be prohibited from using it locallydue to policy restrictions, the global SCM service can provide theresource on a POP. For example, a user may not have a current version ofa needed word processing application on the user's local laptopcomputer, or policy prevents a word processing document from opening onthe laptop due to concerns for macro viruses. The global SCM may bearranged to open the document at the POP and render the user interfaceto the document using a Microsoft Terminal Services session, HTTP(HyperText Transfer Protocol) rendering, or other remote applicationdeployment.

The global SCM service may implement an enterprise security assessmentsharing (“ESAS”) arrangement in which a semantic abstraction, called asecurity assessment, is created to enable sharing of security-relatedinformation among different ESAS-enabled security endpoints in a POP, oramong ESAS-enabled endpoints in different POPs that are deployed withthe SCM service. The security assessments existing in the environmentfunction to provide a security context that gives an ESAS-enabledendpoint with a new way to look at its own locally-availableinformation. The security context enables an ESAS-enabled endpoint tocombine or correlate evidence from security assessments received from avariety of different sources, and across object types, in order tosignificantly enhance the quality of its detection of potential securityincidents and reduces the level of false-positive and false-negativeidentifications of security incidents in the enterprise network. Theglobal SCM service can thus extend the advantages and benefits of ESASto users who are outside the enterprise network while also increasingthe number of ESAS-enabled endpoints that are available to detectpotential security threats.

In addition to security functionality, the global SCM service may bearranged for user-profiling where user clicks captured by SCM serviceenable the generation of user profile. User-specific (orprofile-specific) content or processes may then be selected and providedto the user based on the profile.

The global SCM service may be provided under a variety of businessmodels. For businesses, the global SCM service may be included in thepurchase price of on-premise security solutions, or provided as attachedservice which complements the on-premise solution, typically on asubscription basis. For consumer users, the global SCM service may beintegrated as a complementary offering to bundled security services thattypically provide anti-virus, anti-spyware, and firewall protection.

This Summary is provided to introduce a selection of concepts in asimplified form that are further described below in the DetailedDescription. This Summary is not intended to identify key features oressential features of the claimed subject matter, nor is it intended tobe used as an aid in determining the scope of the claimed subjectmatter.

DESCRIPTION OF THE DRAWINGS

FIG. 1 shows an illustrative business-computing environment in which thepresent global SCM service may operate;

FIG. 2 shows an illustrative consumer-computing environment in which thepresent global SCM service may operate;

FIG. 3 shows a physical architecture of an illustrative global SCMservice which is configured to use a plurality of points-of-presence,hubs, and an operations center;

FIG. 4 shows an illustrative logical architecture for the global SCMservice;

FIG. 5 shows details of illustrative access arrangements by which globalSCM service client devices access the global SCM service;

FIG. 6 is a flowchart of an illustrative method by which global SCMservice client devices access the global SCM service;

FIG. 7 shows an illustrative enterprise security assessment sharing(“ESAS”) arrangement in an enterprise network;

FIG. 8 is a diagram of a first illustrative scenario in which aplurality of ESAS-enabled endpoints are coupled to a security assessmentchannel and a detected incident at one endpoint triggers responses atmultiple other endpoints;

FIG. 9 is a diagram of a second illustrative scenario in which a lowfidelity security assessment is sent over the security assessmentchannel that triggers the generation of a new high fidelity assessmentby a receiving ESAS-enabled endpoint which also performs cross-objectmapping;

FIG. 10 is a diagram of a third illustrative scenario that shows thetargeted use of remediation techniques;

FIG. 11 shows an illustrative arrangement in which an ESAS securityassessment channel may be extended from an enterprise network using theglobal SCM service;

FIG. 12 shows an illustrative extended ESAS architecture in which alocal action is triggered in a POP in the global SCM service in responseto a security assessment that is generated by an endpoint in theenterprise network;

FIG. 13 shows an illustrative arrangement in which an ESAS architectureis locally implemented in one or more of the POPs in the global SCMservice;

FIG. 14 shows an illustrative arrangement in which an ESAS globalsecurity assessment channel is implemented among POPs in the global SCMservice; and

FIG. 15 shows an illustrative arrangement in which the global SCMservice implements a profiling functionality where user-specific orprofile-specific content is provided.

Like reference numerals indicate like elements in the drawings. Elementsin the drawings are not drawn to scale unless otherwise indicated.

DETAILED DESCRIPTION

FIG. 1 shows an illustrative business-computing environment 100 in whichthe present global SCM service 105 may operate. In this example, theglobal SCM service 105 is provided using a “cloud-based” serviceparadigm. Here, the cloud is implemented as a network of services andconnections that exist on the Internet 109. Cloud-based services areanticipated to grow as a source of distributed and programmable servicesthat may provide significant data, resources, software and functionalityto users over publically accessible networks such as the Internet.Cloud-based services can be expected to provide significant benefits tousers as the service operator can often provide a desired functionalitymore efficiently and at lower costs through specialization and economyof scale. In addition, by receiving a feature or function as a service,significant responsibilities for IT infrastructure, includingacquisition, maintenance, and upgrades, can usually be shifted from abusiness organization or consumer to the service provider.

The global SCM service 105 is described in more detail in the textaccompanying FIGS. 3 and 4.

Clients to the global SCM service 105 establish access, as indicated byreference numerals 121 _(1, 2 . . . N), to the Internet 109 in order tointeract with cloud-based resources 115. These cloud-based resources 115may include, for example, websites, FTP (file transfer protocol) sites,databases, libraries, and the like. As shown in FIG. 1, this interactionis facilitated by the global SCM service 105.

In this illustrative business-computing environment 100, three sets ofbusiness-oriented users are shown: users 121 in an enterprise network125 that generally use fixed IT assets; roaming users 132 using mobileIT assets; and, home-based and/or telecommuting users 135 that can useboth fixed and mobile IT assets. The fixed IT assets typically includepersonal computers (“PCs”), hosts, workstations, and servers. Mobile ITassets may include networkable devices such as laptop PCs, pocket PCs,handheld computers, smartphones, portable e-mail clients like ResearchIn Motion's Blackberry devices, mobile phones, PDAs (personal dataassistants), and the like.

Enterprise network users 121 are subject to security policies 140 whichgovern the utilization of assets in the enterprise network 125. Inparticular, the security policies 140 are typically enforced, at leastin part, by one or more security appliances 145 which are also commonlycalled security gateways which function as network “endpoints” thatoperate within the enterprise network 125. The security policiestypically govern which users may access information, what kinds ofinformation may be accessed and when, permissible and impermissiblebehaviors, auditing practices in the enterprise, etc.

The appliances 145 may include, for example, security products thatmonitor, assess, and take action with respect to different parts ofsecurity-related data within the enterprise. For example, the enterprisenetwork 125 may utilize a combination of security products such as aproduct that protects host computers in the enterprise, an edge firewallproduct, a network intrusion detection system (“NIDS”) product, anetwork access protection (“NAP”) product, one or more specializedline-of-business security gateways, information leakage protectiongateways, and other discrete security products in order to providesecurity for the various different parts of the enterprise network 125.

A commercial example of the host security product is a unified threatmanagement product such as the Microsoft Threat Management Gateway(“TMG”) product which provides unified malware protection for theenterprise's desktops, laptops, and server operating systems. An edgefirewall is a security product that is arranged to protect theenterprise network 125 from Internet-based threats while providing userswith remote access to applications and data. The edge firewall may beembodied by, for example, a Microsoft Internet Security andAcceleration® (“ISA”) server. The NAP security product performs computerhealth policy validation by ensuring ongoing compliance with healthpolicies defined by an administrator. Typically, access is restrictedfor computers monitored by the NAP security product that do not complywith system health requirements. The NIDS security product analyzestraffic. The NIDS security product operates to detect malicious activitysuch as denial of service attacks port scans by monitoring networktraffic inside the enterprise network 125. The line-of-business securityproducts protect various line-of-business applications including, forexample, an e-mail application such as Microsoft Exchange® that is usedin the enterprise to provide anti-virus and anti-spam protection.

Other security products 145 that may typically be utilized in theenterprise network 125 include web application protection products, UTM(Unified Threat Management) products, SEM/SIM (Security EventManagement/Security Incident Management) products, and operational heathmonitoring and configuration management products (e.g., MicrosoftWindows® Software Update Services).

Also operating in the enterprise network 125 are an identity managementservice 152 (e.g., Microsoft Active Directory) and an operationsmanagement console 155. The operations management console 155 may beimplemented, for example, using the Microsoft Operations Manager (“MOM”)to provide event-driven operations monitoring, performance tracking,security policy enforcement, and auditing capabilities. In manyimplementations the operations management console 155 will be connectedto a corresponding functionality that is based in the global SCM serviceto enable a unified management experience that extends across the localand cloud-based security functionalities.

In the present global SCM service arrangement, the securityfunctionality provided by the security appliances 145 may besupplemented or replaced by security functionality enabled through theglobal SCM service 105. The particular balance between local andcloud-based security functionality for a given enterprise network can beselected to meet the needs of that particular implementation.

FIG. 2 shows an illustrative consumer-computing environment 200 in whichthe present global SCM service 105 may operate. There are three sets ofconsumer users in this example who seek to access, as indicated byreference numerals 212 _(1, 2 . . . N), cloud-based resources 215 suchas websites on the Internet 109, consumer users 221 at home using fixedand mobile IT devices such as PCs, laptops, and smartphones; roamingconsumer users 232 who may wish, for example, to surf the Internet tocompare online pricing for a particular product while shopping at ashopping center; and consumer users outside of the home 235 such asstudents who are using a family's laptop or smartphone while at a schoolor library.

Currently, consumer users typically use host-based security applicationssuch as PC-based firewalls and anti-virus products to provide securityprotection rather than rely on dedicated security appliances orendpoints that are commonly used in the business-computing environment100 (FIG. 1). By comparison, in the present consumer-computingenvironment 200 shown in FIG. 2, such host-based security may besupplemented or replaced by security protection that is provided via theglobal SCM service 105.

As shown in FIG. 3, the global SCM service 105 is configured with amultiplicity of POPs 305 _(1, 2 . . . N) that are distributed, in thisexample, over a comparatively large geographic area. As noted above, anddescribed in more detail below in the text accompanying FIG. 4, each POP305 integrates the security functionalities that are typically providedby the SCM appliances 145 in the enterprise network 125 into acloud-based service. Using a multiplicity of POPs 305 in such adistribution enables diversely-located users of the service to be servedby a POP that is substantially co-located. The term “co-location” asused here means that a given POP is close enough to the user to providea degree of optimization of network operations, to minimize latency forexample, while also providing for appropriate localization of the userexperience.

In this example, the global SCM service 105 is configured to servemultiple users and user types, including both the business-based andconsumer users shown respectively in FIGS. 1 and 2. In alternativeconfigurations, it may be desirable to have SCM service 105 serve only aspecific user type, or otherwise be tailored to that user type. Usersreach the global SCM service 105 by accessing the Internet 109, asindicated by reference numerals 312 _(1, 2 . . . N).

In most implementations of the present global SCM service two or morePOPs 305 will be distributed over an area or region that is large enoughthat a single POP would not provide satisfactory network performance orlocalization. That is, as the distance to a POP increases, networklatency typically increases. In addition, as each POP uses forward proxyservers, it can become difficult to maintain appropriate localization ofthe user experience when, for example, a user is located in one countrywhile the POP is located in another. Accordingly, the term “global” asused here refers to multiple POPs 305 that are distributed to servemultiple local areas. However, the term does not necessarily implyworldwide or unlimited coverage in all implementations. The size of thefootprint for the distribution of POPs 305, the number of POPs utilized,and their geographic location may vary to meet the requirements of aparticular implementation.

The POPs 305 are backed by hubs 315 _(1 . . . N) that provide additionalfunctionality and support for the global SCM service 105. Typically, thehubs 315 will be deployed in fewer numbers compared with the POPs 305 sothat each hub will support multiple POPs. While the precise ratio ofPOPs to hubs can be expected to vary according to the needs of aspecific implementation, in a typical large-scale roll out, if hundredsof POPs are utilized, then perhaps dozens of hubs could be deployed. Anoperations center 322 is also utilized in the global SCM service 105.While a single operations center is shown in FIG. 1, this is merelyillustrative, as more than one operations center may be utilizeddepending upon the requirements of a specific application of the presentarrangement.

FIG. 4 is a logical architecture 400 for the global SCM service 105 thatshows details of the POPs 305, hubs 315, and operations center 322. EachPOP 305 supporting the global SCM service 105 is typically configured toinclude a suite of security appliances or products 410 _(1, 2 . . . N).While the particular mix of security products 410 can vary byimplementation, typically they will replicate the security functionalityprovided by similar products that are deployable in an enterprisenetwork (e.g., enterprise network 125). For example, the securityproducts 410 may include a host security product (e.g., a TMG gateway),an edge firewall, a NIDS product, a NAP product, and one or morespecialized security products for typical line of business applicationssuch as e-mail. In addition, UTM, SEM/SIM, information leakageprevention, and operational health monitoring and configurationmanagement products may also be utilized where required. Although mostPOPs 305 will be similarly configured, there is no requirement that theidentical mix of security products 410 be utilized in each and everyPOP.

In this example, each POP 305 includes a Microsoft ISA server 412 thatprovides integrated firewall, forward proxy, and network performanceenhancement features. The firewall function includes, for example, HTTPapplication layer filtering to govern HTTP inbound and outbound accessto the cloud-based resources 115 (FIG. 1) according to rules orpolicies, as described below. URL (Universal Resource Locator) filteringand anti-virus functions may also be directly supported in the firewall.As a forward proxy, the ISA server 412 stands in the way of the Internet109 and receives data from users bound for the Internet 109 and forwardsit on their behalf. The network performance features of the ISA servers412 include, among others, object caching, HTTP compression to eliminateredundant data during transmission of HTTP packets, and packetprioritization using quality of service (“QoS”) enforcementmethodologies. Configuration and management information for the ISAservers 412 are stored in the enterprise management system (“EMS”)servers 414 _(1 . . . N) in the hubs 315.

POPs 305 are also configured to include policy databases 416_(1, 2 . . . N) which contain security policies that govern access to,and interaction with, cloud-based resources by users of the global SCMservice 105. In accordance with the present cloud-based serviceparadigm, the policies can be tailored to specific users, and groups ofusers. Thus, for example, a company operating IT assets in thebusiness-computing environment 100 shown in FIG. 1 can duplicate itspolicies from its own enterprise network 125 onto the Internet cloud 109via the global SCM service 105. The duplicated polices would then beenforced, for example, for roaming users 132 and home-based and/ortelecommuting users 135 when they access the cloud-based resources 115when outside the perimeter of the enterprise network 125. In analternative configuration, the policy databases 416, or portionsthereof, may be centralized within one or more of the hubs 315, asindicated by the dashed lines. The policies in databases 416 may also bemanaged by the EMS servers 414 in the hubs. However, the POPs 305 willgenerally be configured to replicate all functionality necessary toimplement security and policy enforcement in case a connection to a hub315 is broken.

In this example, operations management consoles 423 _(1, 2 . . . N) aresupported in the POPs 305. The functions provided by the consoles 423are essentially similar to those provided by their counterparts in theenterprise network 125. Operation management consoles 423 enable thesecurity products 410 and policies 416 in a POP 305 to be configured,monitored, and audited according to an enterprise networkadministrator's instructions or service agreement with the enterprise.While supported in the POPs 305, the operations management consoles 423can typically be expected to be operated from the hubs 315. In someimplementations, the operations management consoles 423 will either besolely deployed in the hubs, or replicated in the hubs so that theoperations management functionality is replicated in both the POPs 305and the hubs 315. As noted above, the operations management consolefunctionalities can be extended and unified to enable administrativefunctions to be performed on remote devices as if they were co-locatedon the premises of a given enterprise.

In some implementations, the operations management functionalities, orsubsets thereof, can be configured for remote access by administrators.In other implementations, operations management functionalities in thePOPs 305 are reserved for use by global SCM service provider personnel.

User-profiling 426 _(1, 2 . . . N) functions are also supported in thePOPs 305. User-profiling 426 is described in more detail below in thetext accompanying FIG. 15.

Hubs 315 _(1 . . . N) may include active directory servers 430_(1 . . . N) or other types of identity stores that support respectiveActive Directory and other identity management services for managingidentities and relationships for users in the business-computingenvironment 100 shown in FIG. 1. The Active Directory service enables,for example, user authorization and authentication, as well as singlesign-on capabilities for cross-domain resource access. Typically, ActiveDirectory data will be synchronized with the Active Directory server 152in the enterprise network 125 to a hub 315. In this case,synchronization between the servers can be implemented using a one-wayor two-way trust arrangement to enable policies and reports, forexample, to be expressed using the same user name and groups.

Active Directory services may also be utilized to support authenticationand authorization for users in the consumer computing environment 200shown in FIG. 2 who use or subscribe to the global SCM service 105.Alternatively, user and/or subscription information may be supported insubscriber databases 435 _(1 . . . N) in the hubs 315 as required toimplement identity management for the consumer users 450 of the globalSCM service 105 using for example, the Microsoft Live ID service(formerly known as Microsoft .NET Passport), or federated identificationservices.

The hubs 315 are supported by the operations center 322 which containsone or more operations servers 440 to facilitate the overallconfiguration, management, and monitoring of the global SCM service 105from a central location.

FIG. 5 shows details of an illustrative access arrangement by whichglobal SCM service client devices access the global SCM service 105. Twoillustrative arrangements are shown: one in which mobile device usersaccess the Internet 109 using a wireless mobile data network 515; and,the second in which Internet access is facilitated by an ISP 522. Themethods are generally applicable to both users in the business-computingenvironment 100 and consumer-computing environment 200.

In the first arrangement, roaming users are respectively using asmartphone 525 and laptop 531 that uses an intermediate device such as awireless PC card or mobile phone 536, as shown, as a modem. The wirelessmobile data network could be, for example, one of GPRS (General PacketRadio Service), EVDO (Evolution Data Optimized), or UMTS (UniversalMobile Telecommunications System). The devices wirelessly connectthrough a nearby cell tower 540 to the data network 515 to establishaccess to the Internet 109 as indicated by reference numeral 512 ₁.

In the second arrangement, a roaming laptop user 543 establishesInternet access, as indicated by reference numeral 512 _(N), through apublic Wi-Fi hotspot which provides a network bridge 548 to a networkgateway 550 operated by the ISP 522. A home-based PC user 554 on a localarea network running Ethernet, for example, makes an Internet connectionthrough a network bridge 559 like a cable modem or DSL (digitalsubscriber line) connection to the ISP gateway 550. Although a singleISP and gateway are shown in FIG. 5, it is noted that the present globalSCM service can work with any form of Internet access that a particularIT device or user employs. Accordingly, multiple different ISPs can beutilized depending on the requirements of a given implementation. ISPscommonly provide Internet access to both consumers and businesses,although the equipment, connection type, and service agreements for theservice will typically vary.

As shown in the flowchart shown in FIG. 6, in both access arrangementsshown in FIG. 5, once an Internet connection is established (610), auser may access the global SCM service 105 by pre-provisioning unifiedhost name, for example HTTP://scmproxy.com (620). This host name isresolved, using a DNS (Domain Name System) lookup, to an IP (InternetProtocol) address (630) for a global load balancer (not shown in thedrawings). The global load balancer ascertains the geographical locationof the user (640) so that the user may be redirected (650) to the anappropriate POP 305 (FIG. 3). It is noted that location may be one ofseveral factors that may be utilized in determining to which particularPOP a user is redirected. For example, restrictions imposed by licensingand other commercial considerations, security consideration, and otherfactors may also be used in various implementations.

The location of the user may be determined in a variety of differentways. For users who gain Internet access using the wireless mobile datanetwork 515 in FIG. 5, the location of the user can be determined bycoordinates of the cell tower 540. Alternatively, some mobile devicesare equipped with GPS (Global Positioning System) features which canalso be utilized to identify the location of a user.

For users gaining access using an ISP, a number of techniques exist foridentifying a geographical location of the user based on IP addresssupplied by the ISP. Typically, a geographical location at the countryor region level may be readily determined by mapping the IP address tolocations contained in a geo-location database. While location may beresolved with even more specificity (e.g., to the city or ISP), locationaccuracy typically falls off, and not all geo-location databases arecomplete and reliable for all locations in the world. However, accuracyis typically sufficient to redirect the user to a co-located POP 305 forpurposes of network optimization and localization.

Another technique for locating a user based on IP address uses the LOCrecord for an ISP's server as described in RFC 1876 (Request for Commentby the Internet Engineering Task Force, or “IETF”). More particularly,location information of a server, including latitude and longitude isoften placed on the DNS registration page. By performing a reverse DNSlookup, a server associated with a given IP address can be determinedand the LOC record for that server retrieved. While not all servers haveLOC records, this technique may still be useful in some implementationsor to supplement other IP address geo-location techniques. However, itis noted that such techniques are intended to be illustrative and thatother techniques and methods may also be used depending on therequirements of a particular implementation.

Once redirected to an appropriate POP, the user is authenticated andauthorized, for example using the Active Directory service (660), asdescribed above, or via a Live ID service or federated identitymanagement service. The user may then take advantage of the features andfunctionalities provided by the global SCM service 105 including, forexample, security, policy enforcement, and profiling which can beapplied to every user interaction or “click” on the cloud-basedresources 115 shown in FIG. 1 (670).

An illustrative example in which an ESAS arrangement is implementedusing the present global SCM service is now presented. In an enterprisecomputing environment, for example, an office of a business, a number ofpersonal computers, workstations, servers and the like, along with otherdevices such as mass storage subsystems, internal network interfaces,and external network interfaces, are typically interconnected to providean integrated environment in which information may be generated,accessed from external sources, and shared among various users.Commonly, users perform a variety of operations including order receipt,manufacturing, shipping, billing, inventory control, documentpreparation and management, e-mail, web browsing, and other operationsin which creation, access, and sharing of data is beneficial.

Currently, security is typically provided for an enterprise using avariety of different security products (e.g., security products 145 inFIG. 1) that are each normally arranged to monitor only a partialportion of enterprise-wide data. That is, security products are arrangedas separate local “islands” where each product monitors, assesses, andtakes action with respect to different parts of the data within theenterprise. For example, the host security product, edge firewallproduct, NIDS product, NAP product, and other discrete security productstypically provide security for the various different parts of theenterprise.

While these security products often perform satisfactorily in manyapplications, detection of security incidents often suffers fromundesirably high levels of false-positive and false-negative occurrencesas a result of the monitoring of only partial enterprise security data.It has also been difficult to provide effective common management acrossall the enterprise security product islands. Current attempts tocorrelate enterprise-wide security data have high management andmaintenance costs and have problems in scaling. Accordingly, ESASprovides a single enterprise-wide view to enable security administratorsto define and enforce clear, simple, and unified enterprise-widepolicies for automatic responses to security incidents.

As noted in the Summary section above, ESAS relies upon a semanticabstraction, called a security assessment that enables sharing ofsecurity-related information between different security products, calledendpoints, in an enterprise security environment. A security assessmentis defined as a tentative assignment by an endpoint of broadercontextual meaning to information (i.e., data in some context) that iscollected about an object of interest in the environment such as acomputer, user, service (e.g., a website), data, or the enterprise as awhole. The security assessment utilizes a concise vocabulary for anendpoint to declare that an object in the environment falls into aparticular assessment category such as “compromised” or “under attack”along with the severity (e.g., low, medium, high, critical) of thedetected incident.

A security assessment is tentative because it is subject to someuncertainty and is valid for a limited period of time. The tentativenature of a security assessment is reflected in two of its components: afidelity field which expresses the level of confidence the endpoint hasin its assignment of contextual meaning, and a time-to-live (“TTL”)field which reflects the endpoint's estimate of the time period forwhich the security assessment is expected to be valid. Thus, forexample, a security assessment may be used by an endpoint to declare, inlight of that endpoint's current understanding of one or more securityincidents, that a particular machine is compromised, with a criticallevel of severity, with medium fidelity, and having a TTL of 30 minutes.A variety of types of security assessments may be used in any givenenterprise security environment having, for example, variouscombinations of assessment category and object type.

Endpoints are enabled with functionality to publish security assessmentsonto a security assessment channel operating in the environment, as wellas subscribe to a subset of available security assessments published byother endpoints. The security assessments existing in the environmentthat are active (i.e., those having a TTL which indicates theassessments are still valid) function to provide a security context thatgives such ESAS-enabled endpoint a new way to look at its ownlocally-available information. That is, the security context enables theESAS-enabled endpoint to combine or correlate evidence from securityassessments received from a variety of different sources, and acrossobject types, in order to significantly enhance the quality of itsdetection of potential security incidents. The ESAS-enabled endpointthen makes a decision as to what local action or response is appropriatefor each type of security assessment (whether received from anotherendpoint or internally generated by the endpoint itself) in accordancewith a set of response policies. Incident detection is both efficientand cost-effective because the security context enables distributedprocessing of enterprise-wide information, in the form of securityassessments, without the burden of sharing large amounts of raw datathroughout the enterprise (most of which is completely irrelevant due tothe lack of any context). ESAS-enabled endpoints are further arranged toroll-back the local action upon expiration of the security assessmentthat prompted the local action (i.e., when the security assessmentexceeds the time-to-live specified in the TTL field).

In most typical ESAS implementations, a specialized endpoint called anESAS central server is utilized. The ESAS central server is coupled tothe security assessment channel and performs as a centralized auditpoint by subscribing to all security assessments, logging the securityassessments, and also logging the local actions taken by endpoints inresponse to security incidents in the environment. The ESAS centralserver provides administrators with a comprehensive view of the historyand current status of the enterprise as a whole and of each ESAS-enabledendpoint. The utilization of the security assessments enables anadministrator to compactly and efficiently configure response policiesto incidents that are detected across the entire enterprise. Thesecurity assessments function as natural anchors, or starting points, todefine enterprise-wide security response policies. A streamlined andconsistent management interface is thus enabled to define the desiredresponses for each type of security assessment across the entireenterprise.

The ESAS arrangement provides a number of advantages. By employing asecurity assessment having a concise vocabulary, overall data complexityin the enterprise is drastically reduced and only meaningful informationis shared between endpoints. Use of the security assessment alsoeliminates the need to collect large amounts of raw data in a centralstorage location, and thereby enables highly scalable enterprisesecurity solutions to be built on a very cost effective basis. Inaddition, a new endpoint may be readily deployed with on-demandextensibility. Security assessments may be shared between the newendpoint and existing endpoints without the need to reconfigure any ofthe response policies within existing endpoints. The new endpoint simplyfunctions as a new source of security assessments using a semanticabstraction that the existing endpoints already understand. Theutilization of security assessments also enables enterprise-widesecurity policies to be established using a very compact and clearmethodology, without needing to understand all of the possible securityevents that every endpoint may generate in the enterprise, and then tryto describe the responsive action for each event.

Turning now to FIG. 7, an illustrative ESAS arrangement 700 deployed inthe enterprise network 125 is shown in which a security assessmentchannel 702 is provided to enable a security assessment to be sharedamong multiple endpoints using a language/protocol that iscommonly-utilized at each endpoint. The security assessment channel 702facilitates a publish/subscribe model used by the endpoints forconnecting the sources of security assessments (publishers) to theconsumers of the security assessments (subscribers). As shown, both thepublishers and subscribers on the security assessment channel 702 areendpoints 705.

The endpoints 705 are isolated from the mechanics of the actualtransport and management of the publish/subscribe model through asemantic abstraction layer that is arranged to simplify interactionswith the security assessment channel 702. The abstraction layercomprises tables describing the security assessment types to which theendpoints subscribe, and tables describing the security assessment typesthat endpoints publish (as described below, not all endpoints generallysubscribe to all security assessment types). In addition, theabstraction layer provides an API (application programming interface)for reading received security assessments, and an API for generatingsecurity assessments.

A specialized endpoint, ESAS central server 716, is coupled to thesecurity assessment channel 702 and performs as a centralized auditpoint for the ESAS arrangement 700. Accordingly, the ESAS central server716 subscribes to all security assessments and permanently logs them.ESAS central server 716 also receives and logs messages from theendpoints that indicate the local actions that are taken by an endpoint.The ESAS central server 716 thus provides administrators with securityassessment monitoring functionality that gives a comprehensive view ofthe history and current status of the enterprise as a whole, and eachESAS-enabled endpoint.

FIG. 8 is a diagram of a first illustrative scenario in which aplurality of ESAS-enabled endpoints are coupled to the securityassessment channel 702, and a detected incident at one endpoint triggersresponses at multiple other endpoints. This illustrative scenario isdescribed in three stages. As indicated by reference numeral 810, theedge firewall 705 ₂ first identifies a potentially compromised client,for example, because it creates so many connections to the perimeternetwork that the most likely explanation for the behavior is theexistence of a security compromise. Second, the edge firewall 705 ₂sends a security assessment that indicates the particular client is“compromised” with high severity and high fidelity, as indicated byreference numeral 820, over the security assessment channel 702 tosubscribing endpoints.

Third, the subscribing endpoints 705 _(1, 2, 3 . . . N) and the ESAScentral server 716 which receive the security assessment apply theirspecific security expertise through the application of their owncorrelation rules and locally-available data to trigger an appropriateaction. As collectively indicated by reference numeral 830 in FIG. 8,the host security endpoint 705 ₁ performs an on-demand scan. The NAPendpoint 705 ₃ revokes the IP security certificate for the identifiedcompromised client and implements a port shutdown. The line-of-businesssecurity endpoint 705 _(N) temporarily suspends instant messaging (“IM”)traffic to the compromised client based on the received securityassessment. The ESAS central server 716 raises an alert for a securityanalyst (e.g., an administrator) and also logs all of the securityassessments and actions invoked.

The first illustrative scenario described above provides a case wherethe endpoint detecting the suspicious incident generates a securityassessment with high severity and high fidelity (i.e., the endpoint hasa high degree of confidence that it has validly detected a seriousincident). By comparison, FIG. 9 is a diagram of a second illustrativescenario in which a low fidelity security assessment is sent over thesecurity assessment channel 702 that triggers the generation of a highfidelity assessment by a receiving endpoint which also performscross-object mapping.

This second illustrative scenario is also described in three stages. Asindicated by reference numeral 910, the edge firewall 705 ₂ firstdetects a large number of client connections to the perimeter network112 (FIG. 1). However, unlike the first illustrative scenario shown inFIG. 8 and described in the accompanying text, the number of connectionsbeing established by the client is not so high that the edge firewall705 ₂ can be absolutely certain that the client has been compromised. Incurrent enterprise security systems, when an endpoint sees such data itgenerally just drops the data and takes no action as there is not enoughevidence to warrant the typically harsh response such as disconnectingthe machine. By comparison, in the present scenario, the edge firewall705 ₂ in the second stage sends a security assessment 915 over thesecurity assessment channel 702 that indicates that the particularclient is compromised with medium severity and low fidelity, asindicated by reference numeral 920.

Here, the subscribing endpoints to the particular object referenced inthe security assessment 915 generated by the edge firewall 705 ₂ includethe host security endpoint 705 ₁ and the ESAS central server 716. Whilesuch a low fidelity data normally does not trigger an action to be takenat an endpoint in current security products, in accordance with thepresent enterprise security assessment sharing, the host securityendpoint 705 ₁ looks at its own local data differently in light of thereceived security assessment from the edge firewall 705 ₂. In this case,the local data resulting from an on-demand scan at the host securityendpoint 705 ₁ and the information contained in the security assessmentfrom the edge firewall 705 ₂ are used to generate new assessments 925and 928. Thus, the host security endpoint 705 ₁ has information that, byitself, does not warrant the generation of a new security assessment,but when reinforced with even a low fidelity assessment from anotherendpoint, as in this case, there is sufficient evidence to justify thecreation of the new security assessments 925 and 928 which each havehigh fidelity.

The host security endpoint 705 ₁ places the new security assessments 925and 928 onto the security assessment channel 702. The new securityassessments 925 and 928 are received over the security assessmentchannel 702 by the subscribing endpoints which, in this illustrativescenario, include the edge firewall 705 ₂, and the ESAS central server716 for security assessment 925 and line-of-business endpoint 705 _(N)for security assessment 928.

Note that the line-of-business endpoint 705 _(N) was not a subscriber tothe original security assessment 915 produced by the edge firewall 705 ₂because the reference object type is a machine and the line-of-businessendpoint 705 _(N), by virtue of its role in protecting e-mail, istypically concerned with the users. However, in this second illustrativescenario the host security endpoint 705 ₁ maps from a host object typeto a user object type when it generates a new security assessment 928.Such cross-object mapping capability may be beneficial in many scenariosas it is contemplated that a high severity incident, such as malware ormalicious activity that potentially compromises the data confidentialityor integrity of a host computer, may also potentially compromise theuser as well. A security assessment may be generated that cross-maps thehigh severity incident from the host object type to a user object typewith a certain degree of fidelity. Similarly, a critical severityincident in which malware or malicious activity has actually caused aloss of data integrity on a host computer, a security assessment for auser object type may be generated with even higher fidelity.

In stage three, the new security assessments 925 and 928 trigger avariety of respective actions at the receiving endpoints, ascollectively indicated by reference numeral 930. Specifically, the edgefirewall 705 ₂ blocks all access by the compromised client with theexception of software updates and/or mission-critical access. Theline-of-business endpoint 705 _(N) temporarily suspends outgoinge-mails. And, as with the first illustrative scenario, the ESAS centralserver 716 continues to log all assessments and actions. As noted above,such restrictions are enforced only during the period of time for whichthe TTL associated with the new security assessments 925 and 928 remainsvalid. When the new security assessments expire, the actions taken bythe respective endpoints are rolled-back unless the TTL is extended or anew security assessment which invokes the restrictive actions isreceived.

FIG. 10 is a diagram of a third illustrative scenario that shows thetargeted use of remediation techniques. This third illustrative scenariois described in three stages. As indicated by reference numeral 1010,the edge firewall 705 ₂ first detects a large number of clientconnections to the perimeter network. Second, the edge firewall 705 ₂sends a security assessment 1015 that indicates the particular client is“compromised” with high severity and high fidelity, as indicated byreference numeral 1020, over the security channel 702 to subscribingendpoints. The subscribing endpoints include the host security endpoint705 ₁ the NAP endpoint 705 ₃ and the ESAS central server 716.

The host security endpoint 705 ₁ reviews the received securityassessment and applies its specific security expertise using correlationrules and any relevant locally-available data. In this illustrativeexample, the host security endpoint 705 ₁ responsively generates a newsecurity assessment 1025 containing a user object type to which theline-of-business security endpoint 705 _(N) subscribes.

In the third stage of the scenario, the remediation techniques employedby the endpoints are considered expensive in terms of their potentialimpact on business operations within the enterprise 100 (FIG. 1). Forexample, as indicated by reference numeral 1030, the line-of-businesssecurity endpoint 705 _(N) implements a response policy that entailstemporarily suspending outgoing e-mail. In addition, the host securityendpoint 705 ₁ performs an on-demand scan and if no results areachieved, performs a deep scan. While such remediation techniques can bevery effective in addressing malware, malicious users, and otherproblems, they typically impart significant expense to the enterprise.For example a user whose outgoing e-mail is suspended will be lessproductive, and deep scanning typically requires one or more rebootswhich will remove the machine from service for a period of time.

The ESAS arrangement advantageously enables these effective, albeitexpensive, remediation techniques to be applied in a targeted manner andnot merely in a general way or across-the-board which can be unjustifiedfor some machines and/or users. Only objects in the environment that aredeemed suspicious, using pre-defined criteria, will be subject to theseparticular remediation techniques.

As shown in FIG. 11, the global SCM service 105 may be advantageouslyutilized to optionally extend and expand the ESAS security channel 702shown in FIGS. 7-10 and described in the accompanying text. Inparticular, the security assessment channel may be extended into theInternet cloud to couple to security endpoints (i.e., security products)that are located in the POPs 305 as indicated by reference numeral 1105.While FIG. 11 shows the POPs 305 _(1 . . . N) being coupled to theextended ESAS security channel 1 105, there is no requirement that eachand every POP used in a particular implementation of the global SCMservice 105 be so coupled. In addition, it may also be possible to use adedicated ESAS security channel that is not an extension from anexisting ESAS security channel in an enterprise.

The global SCM service 105 enables the extension of ESAS to includesecurity assessments to be both sent and received by security endpointsthat are located in the POPs 305. The enhanced security that ESASprovides can thus be applied to the enterprise's IT assets that arelocated outside the perimeter of the enterprise network 125 includingthe home-based and/or telecommuting users 135 and roaming users 132. Inaddition, the ESAS system itself may be enhanced by increasing thenumber of deployed sensors that are available to detect potentialsecurity threats.

In this illustrative example, the ISA server 412 ₁ in POP 305 ₁generates a security assessment 1112 when it detects, for example, apotentially compromised laptop being operated by one of the roamingusers 132. The security assessment 1112 indicates that the laptop is“compromised” with high severity and high fidelity with a TTL value of30 minutes. The security assessment is published into the extended ESASsecurity assessment channel 1105 and received by the subscribingendpoints including endpoints 705 and the ESAS central server 716 in theenterprise network 125, as well as those in other POPs as indicated bythe arrows in FIG. 1 1. The security assessment 1112 will also typicallybe shared locally among endpoints in the POP 305 ₁ over a locallydeployed security assessment channel as shown in more detail in FIG. 13and described in the accompanying text. Endpoints receiving the securityassessment 1112 will take responsive local actions, perform cross-objectmapping, implement targeted remediation, etc . . . as described above inthe text accompanying FIGS. 7-10, according to local response policies.

As shown in FIG. 12, endpoints in POPs 305 may use the extended ESASsecurity channel 1105 to subscribe to, and receive security assessmentsthat are generated by security endpoints 705 in the enterprise network125. Here, an illustrative security assessment 1212 is generated by theedge firewall 705 ₂ when a security incident affecting a computer in theenterprise network 125 is detected. The security assessment 1212indicates that the computer is “compromised” with high severity and highfidelity with a TTL value of 30 minutes.

Subscribing endpoints in the enterprise network 125 and in the POPs 305receive the security assessment 1212 from the security assessmentchannel 702, as extended by the global SCM service 105. In this example,in accordance with response policies, the host security products in theenterprise network 125 and POPs 305 perform on-demand scans of the ITassets respectively used by users 121 in the enterprise network 125, thehome-based and/or telecommuting users 135, and the roaming users 132.

FIG. 13 shows an illustrative arrangement in which an ESAS architectureis locally implemented in several POPs 305 in the global SCM service105. A security assessment sharing channel 1302 enables securityassessments, such as an illustrative security assessment 1312, to begenerated and shared by security endpoints 410 according to the ESASpublish and subscribe model described above.

In addition to being usable to complement the extended ESASfunctionality described above in the text accompanying FIGS. 11 and 12,the local ESAS arrangement may be used independently of ESASimplementations used in an enterprise network environment. For example,as shown in FIG. 13, multiple households or groups of consumer users1320 _(1, 2 . . . N) are connected to the global SCM service 105. Eachhousehold 1320 can take advantage of ESAS by virtue of the comprehensivesuite of security products in the POP 305 and the widespreaddistribution of sensors for detecting security incidents thataccompanies the global scale of the SCM service.

As the global SCM infrastructure is shared among the consumer usergroups 1320, and the individual households can be aggregated as ESASclients, consumers gain the benefit of improved security incidentdetection and handling in a cost-effective manner. For example, asecurity incident detected affecting an IT device in one household 1320₁ can trigger a scan of IT devices in a second household 1320 ₂. Withoutthe aggregation provided through the global SCM service 105 and thebenefits of ESAS it allows, the IT devices in the second household mightotherwise be vulnerable.

In some implementations where an ESAS architecture is locallyimplemented in one or more POPs 305 in the global SCM service 105,security assessments and local responses can take into account suchfactors or characteristics, for example, as demographics, user-profile,Internet use habits, or user-preferences. Such factors may provideadditional security context or affect how a particular local response isimplemented. In addition, consumers having similar characteristics maybe grouped for purposes of security assessment generation and sharing sothat security detection and responses are well tailored to meetparticular consumer needs.

The ESAS architecture that is locally implemented in a POP as shown inFIG. 13 may also be extended to other POPs in the global SCM service105, as shown in FIG 14. In this illustrative example, a global securityassessment channel 1402 is established between two or more POPs 305.Security assessments, such as an illustrative security assessment 1412,may be generated and shared among security endpoints 410 in differentPOPs 305. Utilization of security assessments over the global securityassessment channel 1402 enables ESAS to be distributed among users 1420_(1, 2 . . . N) over larger geographic area than is served by a singlePOP 305.

FIG. 15 shows an illustrative arrangement in which the global SCMservice 105 implements a profiling functionality 426 in one or more POPs305 where user-specific or profile-specific content or processes areprovided to users 1520 _(1, 2 . . . N). The profiling functionality maybe implemented as a complement to the security features described above,or in some applications be used independently or in combination withother features or services (such as Internet or web searching, forexample).

In this example, the user accesses and interacts with cloud-basedresources 115 through the global SCM service 105 as described above.Because each interaction or “click” is monitored by the global SCMservice 105 through the POP 305 as indicated by reference numeral 1510,a user-profile for users of the service may be generated and stored.User-specific or profile-specific content may be responsively generatedand provided to the user, as indicated by reference numeral 1516. Suchcontent and processes may include, for example, targeted advertising andsearch results, advanced caching such as pre-fetching on apersonalized/user-profile basis, or personalized web-based experiences.By having the ability to see every user click on the Internet, moreaccurate user-profiles can be generated so that the provided content orprocesses are better suited to the specific user.

Although the subject matter has been described in language specific tostructural features and/or methodological acts, it is to be understoodthat the subject matter defined in the appended claims is notnecessarily limited to the specific features or acts described above.Rather, the specific features and acts described above are disclosed asexample forms of implementing the claims.

1. An infrastructure for providing a security protection service to anIT device, comprising: a plurality of POPs, each POP including a suiteof security products, each product in the suite arranged for providingone or more security functionalities, one of the security productscomprising a forward proxy server for forwarding traffic from the ITdevice to resource servers on the Internet; a hub operatively coupled toone or more POPs, the hub providing configuration management for forwardproxy servers disposed in the hub, and further providing identitymanagement to authenticate and authorize a user of the IT device for thesecurity protection service; and a management operations centeroperatively coupled to the hub for implementing centralized managementfor the infrastructure, the centralized management including monitoringand auditing.
 2. The infrastructure of claim 1 further including atleast one of edge firewall, host security gateway product, NIDs securityproduct, NAP security product, SEM product, SIM product, UTM product,operational health monitoring product, configuration management product,anti-virus product, anti-spyware product, anti-malware product,information leakage prevention, or anti-spam product among the securityproducts in the suite.
 3. The infrastructure of claim 2 furtherincluding an administrator console functionality in one or more of thePOPs.
 4. The infrastructure of claim 3 in which the security products inthe suite are operated in response to security policies.
 5. Theinfrastructure of claim 4 in which the securities policies are disposedin a database located in either a POP or the hub.
 6. The infrastructureof claim 5 in which the user accesses the security protection serviceusing a connection to the Internet.
 7. A method for providing a securityprotection service for IT devices, the method comprising the steps of:utilizing an infrastructure that is accessible by users from theInternet, the infrastructure including a plurality of POPs, each POP inthe plurality including at least a forward proxy server for forwardingtraffic from the IT devices to resource servers that are accessible onthe Internet; authenticating and authorizing users of the IT devices forthe security protection service; and securing user interactions to theresource servers using one or more security products located in the POP.8. The method of claim 7 including a further step of monitoring clicksperformed by the user on web content hosted by the resource servers 9.The method of claim 8 including a further step of generating a profileof the user based on the monitoring.
 10. The method of claim 8 includinga further step of providing content or processes to the user based onthe profile.
 11. The method of claim 10 in which the content orprocesses are personalized to the user.
 12. The method of claim 11 inwhich the content or processes comprise one of advertising, searchresults, or web-based experience.
 13. The method of claim 12 in whichthe search results are cleaned by the security protection service. 14.The method of claim 13 in which the security protection service issubscription based.
 15. A method for providing a security protectionservice for IT devices, the method comprising the steps of: utilizing aninfrastructure that is accessible by users from the Internet, theinfrastructure including a plurality of POPs, each POP in the pluralityincluding at least a forward proxy server for forwarding traffic fromthe IT devices to resource servers that are accessible on the Internet;authenticating and authorizing users of the IT devices for the securityprotection service; redirecting a user to a co-located POP, a POP beingco-located when a set of parameters is optimized including networklatency compared with non-co-located POPs and localization of a userexperience may be implemented; and managing the forward proxy servers inthe POPs using an enterprise management subsystem located in a hub thatis coupled to one or more POPs
 16. The method of claim 15 in which thesecuring is performed according to predefined security policies, atleast a subset of such security policies being part of security policiespertaining to an enterprise.
 17. The method of claim 15 including afurther step of managing the security protection service through one ormore centralized management centers, at least one of the centralizedmanagement centers being operatively coupled to the hub.
 18. The methodof claim 17 including a further step of performing network optimizationin a POP, the network optimization including one of caching, HTTPcompression, or QoS enforcement.
 19. The method of claim 15 including afurther step of redirecting a user to a co-located POP, a POP beingco-located when network latency is minimized compared withnon-co-located POPs and localization of a user experience may beimplemented.
 20. The method of claim 19 in which the localization isperformed with at least one of language, time zone, currency, orcharacter set.