System and method for providing remediation management
First Claim
1. Software for remediation management, the software operable to:
- automatically identify an asset in an enterprise network upon entrance of the asset to the enterprise network; and
automatically identify one or more vulnerabilities of the identified asset by comparing the identified asset to content, at least a portion of the content collected from a plurality of third party content providers.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, software for remediation management is operable to automatically identify an asset in an enterprise network. One or more vulnerabilities of the identified asset is automatically identified based on comparing the identified asset to content associated with the one or more vulnerabilities. At least a portion of the content is collected from a plurality of third party content providers. Other example software for remediation management may be operable to identify one or more vulnerabilities of an asset based on comparing the asset to content associated with the one or more vulnerabilities and automatically generate remediations for the asset based on the content associated with the one or more vulnerabilities.
-
Citations
38 Claims
-
1. Software for remediation management, the software operable to:
-
automatically identify an asset in an enterprise network upon entrance of the asset to the enterprise network; and
automatically identify one or more vulnerabilities of the identified asset by comparing the identified asset to content, at least a portion of the content collected from a plurality of third party content providers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. Software for remediation management, the software operable to:
-
identify one or more vulnerabilities of an asset based on comparing the asset to local stored content, the asset communicably coupled to an enterprise network and at least a portion of the content collected from a plurality of third party content providers;
automatically generate one or more remediations for the asset based on the content associated with the one or more vulnerabilities; and
communicate the generated remediations to the asset. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A method, comprising:
-
identifying one or more vulnerabilities of an asset based on comparing the asset to local stored content, the asset communicably coupled to an enterprise network and at least a portion of the content collected from a plurality of third party content providers;
automatically generating one or more remediations for the asset based on the content associated with the one or more vulnerabilities; and
communicating the generated remediations to the asset. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
Specification