Computer program product and apparatus for multi-path remediation
First Claim
1. An apparatus, comprising:
- at least one data storage; and
at least one platform communicatively coupled to the at least one data storage;
said at least one data storage configured to store data on a plurality of mitigation techniques that mitigate effects of attacks that take advantage of vulnerabilities, where;
each mitigation technique is capable of mitigating an effect of an attack that takes advantage of a corresponding vulnerability, andeach mitigation technique has a mitigation type including at least one of a patch, a policy setting, or a configuration option;
said at least one platform configured to;
cause display of at least one mitigation technique for mitigating an effect of at least one attack that takes advantage of at least one vulnerability, andallow receipt of user input for selecting the at least one mitigation technique to be applied for mitigating the effect of the at least one attack that takes advantage of the at least one vulnerability;
said apparatus configured to identify information in connection with at least one of a plurality of devices for use in identifying an attack in connection with the at least one device that takes advantage of the at least one vulnerability so that the at least one mitigation technique is utilized in at least mitigating an effect of the identified attack;
said apparatus configured such that one or more of the plurality of mitigation techniques is capable of being identified based on an identification of an operating system.
0 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques.
-
Citations
58 Claims
-
1. An apparatus, comprising:
-
at least one data storage; and at least one platform communicatively coupled to the at least one data storage; said at least one data storage configured to store data on a plurality of mitigation techniques that mitigate effects of attacks that take advantage of vulnerabilities, where; each mitigation technique is capable of mitigating an effect of an attack that takes advantage of a corresponding vulnerability, and each mitigation technique has a mitigation type including at least one of a patch, a policy setting, or a configuration option; said at least one platform configured to; cause display of at least one mitigation technique for mitigating an effect of at least one attack that takes advantage of at least one vulnerability, and allow receipt of user input for selecting the at least one mitigation technique to be applied for mitigating the effect of the at least one attack that takes advantage of the at least one vulnerability; said apparatus configured to identify information in connection with at least one of a plurality of devices for use in identifying an attack in connection with the at least one device that takes advantage of the at least one vulnerability so that the at least one mitigation technique is utilized in at least mitigating an effect of the identified attack; said apparatus configured such that one or more of the plurality of mitigation techniques is capable of being identified based on an identification of an operating system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58)
-
-
16. A method, comprising:
-
identifying a plurality of mitigation techniques that mitigate effects of attacks that take advantage of vulnerabilities associated with an operating system, where; each mitigation technique is capable of mitigating an effect of an attack that takes advantage of a corresponding vulnerability, and each mitigation technique has a mitigation type including at least one of a patch, a policy setting, or a configuration option; causing display of at least two of the mitigation techniques for mitigating an effect of at least one attack that takes advantage of at least one vulnerability, and allowing receipt of at least one user input in connection with one or more of the at least two mitigation techniques; and automatically applying the one or more of the at least two of the plurality of mitigation techniques including at least one first mitigation technique of a first mitigation type and at least one second mitigation technique of a second mitigation type to at least one device to at least mitigate the effect of at least one attack that is identified in connection with the at least one device; wherein the at least two mitigation techniques are displayed based on an identification of an operating system. - View Dependent Claims (17)
-
-
18. An apparatus, comprising:
-
at least one data storage; and at least one hardware processor configured for being communicatively coupled to the at least one data storage; said at least one data storage configured to store data on a plurality of mitigation techniques that mitigate effects of attacks that take advantage of vulnerabilities, where; each mitigation technique is capable of mitigating an effect of an attack that takes advantage of a corresponding vulnerability, and each mitigation technique has a mitigation type including at least one of a patch, a policy setting, or a configuration option; said apparatus configured to; cause display of at least one mitigation technique for mitigating an effect of at least one attack that takes advantage of at least one vulnerability, and allow receipt of user input for selecting the at least one mitigation technique to be applied for mitigating the effect of the at least one attack that takes advantage of the at least one vulnerability; said apparatus further configured to identify information in connection with at least one of a plurality of devices for use in identifying an attack in connection with the at least one device that takes advantage of the at least one vulnerability so that the at least one mitigation technique at least mitigates an effect of the identified attack; said apparatus further configured such that one or more of the plurality of mitigation techniques is capable of being identified based on an identification of an operating system. - View Dependent Claims (19, 20, 21, 22)
-
Specification