Security appliances
First Claim
Patent Images
1. A device comprising:
- a first communications interface to a wide area network;
a second communications interface to a corporate network;
a processor executing a security engine, the security engine adapted to communicate over the corporate network to perform a security audit, scan the corporate network for attached devices, dynamically detect changes to attached devices, and prepare a network based asset list, the security engine further adapted to reconfigure INFOSEC countermeasures based upon at least one cyber-threat and at least one vulnerability profile of a network based asset in the network based asset list, and the security engine further adapted to communicate over the wide area network to received updated security tests and provide updates to a remote location;
a memory storing the network based asset list; and
an appliance housing substantially enclosing the first communications interface, the second communications interface, the processor, and the memory.
2 Assignments
0 Petitions
Accused Products
Abstract
A security micro-appliance provides dynamic, reconfigurable threat protection. The micro-appliance may be deployed as a standalone system, or as a component in a distributed security system management from a central administrative location. In another aspect, a security appliance or micro-appliance employs RSS feeds and XML-based tests, alerts, and the like for monitoring and dynamic reconfiguration.
-
Citations
21 Claims
-
1. A device comprising:
-
a first communications interface to a wide area network;
a second communications interface to a corporate network;
a processor executing a security engine, the security engine adapted to communicate over the corporate network to perform a security audit, scan the corporate network for attached devices, dynamically detect changes to attached devices, and prepare a network based asset list, the security engine further adapted to reconfigure INFOSEC countermeasures based upon at least one cyber-threat and at least one vulnerability profile of a network based asset in the network based asset list, and the security engine further adapted to communicate over the wide area network to received updated security tests and provide updates to a remote location;
a memory storing the network based asset list; and
an appliance housing substantially enclosing the first communications interface, the second communications interface, the processor, and the memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21-50. -50. (canceled)
Specification