Methods and systems for managing enterprise assets
First Claim
Patent Images
1. A method for managing at least one asset in an Enterprise, the method comprising:
- providing a first server, the first server configured to include at least one asset profile associated with the at least one asset, the first server controlled by the Enterprise, receiving at the first server, in response to a request to a distinct second server, data associated with at least one vulnerability associated with the at least one asset, where the second server is outside the control of the Enterprise.
1 Assignment
0 Petitions
Accused Products
Abstract
The disclosed methods and systems can be used to manage at least one asset in an Enterprise, where the methods and systems include providing a first server, the first server configured to include at least one asset profile associated with the at least one asset, the first server controlled by the Enterprise, and receiving at the first server, in response to a request to a distinct second server, data associated with at least one vulnerability associated with the at least one asset, where the second server is outside the control of the Enterprise.
116 Citations
33 Claims
-
1. A method for managing at least one asset in an Enterprise, the method comprising:
-
providing a first server, the first server configured to include at least one asset profile associated with the at least one asset, the first server controlled by the Enterprise, receiving at the first server, in response to a request to a distinct second server, data associated with at least one vulnerability associated with the at least one asset, where the second server is outside the control of the Enterprise. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A system for managing at least one asset in an Enterprise, the system comprising:
-
a first server controlled by the Enterprise and configured to include at least one asset profile associated with the at least one asset, and, a distinct second server outside the control of the Enterprise, the second server to provide data to the first server in response to a request from the first server, the data associated with at least one vulnerability associated with the at least one asset. - View Dependent Claims (30, 31, 32, 33)
-
Specification