×

Computer program product and apparatus for multi-path remediation

DC
  • US 10,609,063 B1
  • Filed: 05/30/2017
  • Issued: 03/31/2020
  • Est. Priority Date: 07/01/2003
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer-readable media storing instructions that, when executed by one or more processors, cause the one or more processors to:

  • receive first vulnerability information from at least one first data storage that is generated utilizing second vulnerability information from at least one second data storage that is used to identify a plurality of potential vulnerabilities;

    said first vulnerability information generated utilizing the second vulnerability information, by;

    identifying at least one configuration associated with a plurality of devices including a first device, a second device, and a third device, anddetermining that the plurality of devices is vulnerable to at least one accurately identified vulnerability based on the identified at least one configuration, utilizing the second vulnerability information that is used to identify the plurality of potential vulnerabilities;

    identify an occurrence in connection with at least one of the plurality of devices, utilizing one or more network monitors;

    based on a packet analysis, determine that the at least one accurately identified vulnerability of the at least one of the plurality of devices is susceptible to being taken advantage of by the occurrence identified in connection with the at least one of the plurality of devices, utilizing the first vulnerability information; and

    allow selective utilization of different occurrence mitigation actions of diverse occurrence mitigation types, including a firewall-based occurrence mitigation type and an intrusion prevention system-based occurrence mitigation type, across the plurality of devices for occurrence mitigation by preventing advantage being taken of accurately identified vulnerabilities utilizing the different occurrence mitigation actions of the diverse occurrence mitigation types across the plurality of devices;

    wherein the at least one configuration involves at least one operating system.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×