Vulnerability management and tracking system (VMTS)
First Claim
Patent Images
1. A method of managing vulnerabilities, the method comprising:
- receiving a vulnerability message describing a profile of a computer system vulnerable to a threat;
identifying one or more vulnerable systems with the profile described in the received vulnerability message, the vulnerable systems having a vulnerability that may be exploited by the threat; and
generating a display that includes a list of the identified vulnerable systems.
3 Assignments
0 Petitions
Accused Products
Abstract
Vulnerabilities may be managed by receiving a vulnerability message describing a profile of a computer system vulnerable to a threat, identifying one or more vulnerable systems with the profile described in the received vulnerability message, the vulnerable systems having a vulnerability that may be exploited by the threat, and generating a display that includes a list of the identified vulnerable systems.
137 Citations
48 Claims
-
1. A method of managing vulnerabilities, the method comprising:
-
receiving a vulnerability message describing a profile of a computer system vulnerable to a threat;
identifying one or more vulnerable systems with the profile described in the received vulnerability message, the vulnerable systems having a vulnerability that may be exploited by the threat; and
generating a display that includes a list of the identified vulnerable systems. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A system configured to managing vulnerabilities, the system comprising:
-
a communications interface structured and arranged to receive a vulnerability message describing a profile of a computer system vulnerable to a threat;
a first processor structured and arranged to identify one or more vulnerable systems with the profile described in the received vulnerability message, the vulnerable systems having a vulnerability that may be exploited by the threat; and
a second processor structured and arranged to generate a display that includes a list of the identified vulnerable systems. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. A system for managing vulnerabilities, the method comprising:
-
means for receiving a vulnerability message describing a profile of a computer system vulnerable to a threat;
means for identifying one or more vulnerable systems with the profile described in the received vulnerability message, the vulnerable systems having a vulnerability that may be exploited by the threat; and
means for generating a display that includes a list of the identified vulnerable systems.
-
-
48. A computer program configured to managing vulnerabilities, the system comprising:
-
a first code segment structured and arranged to receive a vulnerability message describing a profile of a computer system vulnerable to a threat;
a second code segment structured and arranged to identify one or more vulnerable systems with the profile described in the received vulnerability message, the vulnerable systems having a vulnerability that may be exploited by the threat; and
a third code segment structured and arranged to generate a display that includes a list of the identified vulnerable systems.
-
Specification