Computer program product and apparatus for multi-path remediation
First Claim
1. An apparatus, comprising:
- at least one data storage;
at least one platform communicatively coupled to the at least one data storage; and
at least one agent capable of being communicatively coupled to the at least one platform;
said at least one data storage configured to store data on a plurality of mitigation techniques that mitigate effects of attacks that take advantage of vulnerabilities, where;
each mitigation technique is capable of mitigating an effect of an attack that takes advantage of a corresponding vulnerability, andeach mitigation technique has a mitigation type including at least one of a patch, a policy setting, or a configuration option;
said at least one platform configured to;
cause display of at least one mitigation technique for mitigating an effect of at least one attack that takes advantage of at least one vulnerability, andallow receipt of user input for selecting the at least one mitigation technique to be applied for mitigating the effect of the at least one attack that takes advantage of the at least one vulnerability;
said at least one agent configured to identify information in connection with at least one of a plurality of devices for use in identifying an attack in connection with the at least one device that takes advantage of the at least one vulnerability, so that the at least one mitigation technique is capable of being applied;
said apparatus configured such that one or more of the plurality of mitigation techniques is capable of being identified based on an identification of an operating system.
0 Assignments
0 Petitions
Reexamination
Accused Products
Abstract
A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques.
-
Citations
22 Claims
-
1. An apparatus, comprising:
-
at least one data storage; at least one platform communicatively coupled to the at least one data storage; and at least one agent capable of being communicatively coupled to the at least one platform; said at least one data storage configured to store data on a plurality of mitigation techniques that mitigate effects of attacks that take advantage of vulnerabilities, where; each mitigation technique is capable of mitigating an effect of an attack that takes advantage of a corresponding vulnerability, and each mitigation technique has a mitigation type including at least one of a patch, a policy setting, or a configuration option; said at least one platform configured to; cause display of at least one mitigation technique for mitigating an effect of at least one attack that takes advantage of at least one vulnerability, and allow receipt of user input for selecting the at least one mitigation technique to be applied for mitigating the effect of the at least one attack that takes advantage of the at least one vulnerability; said at least one agent configured to identify information in connection with at least one of a plurality of devices for use in identifying an attack in connection with the at least one device that takes advantage of the at least one vulnerability, so that the at least one mitigation technique is capable of being applied; said apparatus configured such that one or more of the plurality of mitigation techniques is capable of being identified based on an identification of an operating system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 22)
-
-
16. An apparatus, comprising:
-
at least one data storage configured to store at least one data structure identifying a plurality of mitigation techniques that mitigate effects of attacks that take advantage of vulnerabilities, where; each mitigation technique is capable of mitigating an effect of an attack that takes advantage of a corresponding vulnerability, and each mitigation technique has a mitigation type including at least one of a patch, a policy setting, or a configuration option; and at least one platform communicatively coupled to the at least one data storage, the at least one platform configured to; based on user selection, automatically apply at least two of the plurality of mitigation techniques including at least one first mitigation technique of a first mitigation type and at least one second mitigation technique of a second mitigation type; receive information in connection with at least one of a plurality of devices, identify an attack on the at least one device that takes advantage of at least one of the vulnerabilities, based on the information, and mitigate an effect of the attack on the at least one device that takes advantage of the at least one vulnerability, based on the automatic application of the at least two of the plurality of mitigation techniques including the at least one first mitigation technique of the first mitigation type and the at least one second mitigation technique of the second mitigation type to the at least one device; wherein the apparatus is configured such that the at least two of the plurality of mitigation techniques are made available for the user selection, based on an identification of an operating system. - View Dependent Claims (17, 18, 19)
-
-
20. An apparatus, comprising:
-
means for identifying a plurality of mitigation techniques that mitigate effects of attacks that take advantage of vulnerabilities associated with an operating system, where; each mitigation technique is capable of mitigating an effect of an attack that takes advantage of a corresponding vulnerability, and each mitigation technique has a mitigation type including at least one of a patch, a policy setting, or a configuration option; means for; causing display of at least two of the mitigation techniques for mitigating an effect of at least one attack that takes advantage of at least one vulnerability, and allowing receipt of at least one user input in connection with one or more of the at least two mitigation techniques; and means for applying the one or more of the at least two of the plurality of mitigation techniques including at least one first mitigation technique of a first mitigation type and at least one second mitigation technique of a second mitigation type to the at least one device; said apparatus configured such that the at least two mitigation techniques are displayed based on an identification of an operating system. - View Dependent Claims (21)
-
Specification