Risk-Based Vulnerability Assessment, Remediation and Network Access Protection
First Claim
Patent Images
1. A method of assessing risk on a client computing device managed in an enterprise by a system administrator, the method comprising:
- defining a vulnerability for the client computing device;
defining a level of risk associated with the vulnerability;
assessing the level of risk for the vulnerability on the client machine; and
reporting data regarding the level of risk on the client computing device to the system administrator.
2 Assignments
0 Petitions
Accused Products
Abstract
A system administrator may define a vulnerability and vulnerability setting for the client machine and may associate a level of risk with the vulnerability. The client may assess the level of risk associated with the vulnerability setting on the client machine and may report data regarding the level of risk to the system administrator.
55 Citations
20 Claims
-
1. A method of assessing risk on a client computing device managed in an enterprise by a system administrator, the method comprising:
-
defining a vulnerability for the client computing device; defining a level of risk associated with the vulnerability; assessing the level of risk for the vulnerability on the client machine; and reporting data regarding the level of risk on the client computing device to the system administrator. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. One or more computer-readable media comprising executable instructions that, when executed:
-
define one or more vulnerability settings, each vulnerability setting based on a vulnerability on a client computing device in an enterprise; define a level of risk associated with the vulnerability setting; associate a customized priority with the vulnerability setting and the level of risk, the customized priority for determining the importance of each vulnerability setting relative to other vulnerability settings; and assess the overall level of risk in the enterprise associated with each vulnerability setting and the customized priority. - View Dependent Claims (13, 14, 15, 16)
-
- 17. A system comprising one or more modules that are configured to assess a level of risk associated with a vulnerability setting on a client computing device in an enterprise.
Specification