System and method for securing a computer system connected to a network from attacks
First Claim
1. A network security system for protecting computing devices connected to a communication network from an identified security threat, the system comprising:
- a network security module interposed between a computing device and the communication network; and
a security service that publishes security information for network security modules, the security information comprising security measures, which, when implemented by the network security module, protect the corresponding computing device from an identified security threat.
2 Assignments
0 Petitions
Accused Products
Abstract
A network security system for protecting computing devices connected to a communication network from identified security threats is presented. A security service published security information intended for network security modules in the communication network. A network security module is interposed, either logically or physically, between a computer and the communication network. The security information comprises security measures which, when implemented by a network security module, protect the corresponding computer from an identified security threat to the computer.
-
Citations
21 Claims
-
1. A network security system for protecting computing devices connected to a communication network from an identified security threat, the system comprising:
-
a network security module interposed between a computing device and the communication network; and
a security service that publishes security information for network security modules, the security information comprising security measures, which, when implemented by the network security module, protect the corresponding computing device from an identified security threat. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for securing computing devices in a communication network from an identified security threat delivered over the communication network, the method comprising:
-
obtaining information relating to the identified security threat to computing devices in the communication network; and
publishing security information relating to the identified security threat to network security modules in the communication network, wherein each network security module in the communication network is interposed between a computing device and the communication network, and wherein the security information includes protective security measures which, when enforced by a network security module, secure at-risk network activities between the computing device and the communication network from the identified security threat. - View Dependent Claims (17, 18, 19)
-
-
20. A computer-readable medium having computer-executable instructions which, when executed, carry out a method for securing computing devices in a communication network from an identified security threat delivered over the communication network, the method comprising:
-
obtaining information relating to the identified security threat to computing devices in the communication network; and
publishing a security information relating to the identified security threat to network security modules in the communication network, wherein each network security module in the communication network is interposed between a computing device and the communication network, and wherein the security information includes protective security measures which, when enforced by a network security module, secure at-risk network activities between the computing device and the communication network from the identified security threat.
-
-
21. A network security system for protecting a computing device connected to a communication network from a network-delivered security threat, the network security system comprising:
-
a security service that obtains information relating to a network-delivered security threat to the computing device, and publishes a security bulletin including protective security measures corresponding to network activities between the computing device and the communication network which, if implemented, protect the computing device from the network-delivered security threat; and
a network security module interposed between the computing device and the communication network, wherein the network security module obtains the security bulletin published by the security service and selectively implements the protective security measure thereby securing the computing device from the network-delivered security threat.
-
Specification