Enterprise security measures
First Claim
Patent Images
1. An electronic computing device comprising:
- a processing unit; and
system memory, the system memory including instructions that, when executed by the processing unit, cause the electronic computing device to;
receive information about a vulnerability associated with computing devices;
generate a user score for each of a plurality of users of the computing devices, wherein the user score is based on a relative priority for each of the plurality of users to receive remediation associated with the vulnerability;
generate a threat score for the vulnerability, wherein the threat score is based upon a relative severity of the vulnerability;
based on the user score and the threat score, determine a sequence of priority of distribution of remediation to the computing devices associated with each of the plurality of users; and
sequentially implement remediation to the computing devices based on the sequence of priority.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for managing security within an enterprise includes a computing device that receives a vulnerability, generates a user score for each user within the enterprise and generates a threat score for the vulnerability. A user device score may also be generated for each device associated with a user. Based on the user score and the threat score, a composite score is generated. After acquiring a security measure, the security measure is implemented based on the composite score and, at times, the user score.
42 Citations
20 Claims
-
1. An electronic computing device comprising:
-
a processing unit; and system memory, the system memory including instructions that, when executed by the processing unit, cause the electronic computing device to; receive information about a vulnerability associated with computing devices; generate a user score for each of a plurality of users of the computing devices, wherein the user score is based on a relative priority for each of the plurality of users to receive remediation associated with the vulnerability; generate a threat score for the vulnerability, wherein the threat score is based upon a relative severity of the vulnerability; based on the user score and the threat score, determine a sequence of priority of distribution of remediation to the computing devices associated with each of the plurality of users; and sequentially implement remediation to the computing devices based on the sequence of priority. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer-implemented method, comprising:
-
generating a user score for each of a plurality of users within an enterprise, wherein the user score is based on a relative priority for each of the plurality of users to receive remediation associated with a vulnerability; generating a user rank using the user score; generating a threat score for the vulnerability, wherein the threat score is based upon a relative severity of the vulnerability, and wherein the threat score is generated based on a third party vulnerability score and an internal vulnerability score; based on the user rank and the threat score, determine a sequence of priority of the remediation across the enterprise; and sequentially implement remediation to computing devices of the enterprise based on the sequence of priority. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A system for managing security within an enterprise, comprising:
-
a computer-readable, non-transitory data storage memory comprising instructions that, when executed by a processing unit of an electronic computing device, cause the processing unit to; receive a vulnerability; generate a user device score for each of a plurality of user devices within the enterprise based on user device data, wherein the user device data includes at least one of; a type of a user device and a type of data processes used by the user device; generate a threat score for the vulnerability, wherein the threat score is generated based on a third party vulnerability score and an internal vulnerability score; based on the user device score and the threat score, generate a composite score; generate a user score for each of a plurality of users within the enterprise; generate a user rank using the user score for each of the plurality of users within the enterprise; and sequentially implement remediation to computing devices of the enterprise in an order according to the composite score and the user rank. - View Dependent Claims (19, 20)
-
Specification