Abstract: An approach is provided for performing cloud based computer network security services. Security policies are established for each of a number of subscribers. The subscribers are provided access to the security services via a common network cloud managed by the service provider. The security services are administered according to a multi-tenancy format, which enables the subscribers' data communications to be separately processed. The security services include network firewalling and filtering of content originating from or destined to one or more networks associated with the subscribers.
Abstract: A method, apparatus, program, and storage medium, for managing a network device by communicating with an information processing device and the network device via a network and managing the network device in response to a request from the information processing device. If a request for execution of a process, which needs particular authorization, upon the network device, is received from the information processing device, it is determined whether a command to invalidate a password of said network device has been received together with the process execution request. When the password of the network device is to be invalidated, a password invalidation request is transmitted to the network device. This technique makes it possible for an administrator of a network device to use it even when the administrator forgets the device password assigned to the network device without having to perform initialization which would cause all setting data to be lost.