Real-time network malware protection
First Claim
1. One or more computer-readable media comprising computer-executable instructions for managing risk in a network, the computer-executable instructions directed to steps comprising:
- obtaining, from a first computing device associated with a first aspect of a target computing device, a first set of information regarding the first aspect of the target computing device and relevant to the target computing device'"'"'s health;
obtaining, from a second computing device associated with a second aspect of the target computing device, a second set of information regarding the second aspect of the target computing device and relevant to the target computing device'"'"'s health;
notifying a first set of subscriber computing devices of the first set of information, wherein at least some of the first set of subscriber computing devices reference a network policy to determine a first response to the first set of information; and
notifying a second set of subscriber computing devices of the second set of information, wherein at least some of the second set of subscriber computing devices reference the network policy to determine a second response to the first set of information, the second response being consistent with the first response.
2 Assignments
0 Petitions
Accused Products
Abstract
A Network State Database (NSD) can comprise information regarding the network-centric state of one or more computing devices connected to a network. The information contained in the NSD can be passively received by the NSD, or it can be actively obtained by the NSD. Additionally the NSD can comprise either a centralized collection of information, or a distributed collection of information independently maintained and conceptualized as a single entity. The information of the NSD can be used by a Network Risk Management Service (NRMS) to appropriately respond and protect the network. The NRMS can provide relevant information from the NSD to subscribers, which can independently act to protect the network. The NRMS can likewise itself instruct computing devices regarding an appropriate action, or it can itself instruct the performance of such action.
-
Citations
20 Claims
-
1. One or more computer-readable media comprising computer-executable instructions for managing risk in a network, the computer-executable instructions directed to steps comprising:
-
obtaining, from a first computing device associated with a first aspect of a target computing device, a first set of information regarding the first aspect of the target computing device and relevant to the target computing device'"'"'s health; obtaining, from a second computing device associated with a second aspect of the target computing device, a second set of information regarding the second aspect of the target computing device and relevant to the target computing device'"'"'s health; notifying a first set of subscriber computing devices of the first set of information, wherein at least some of the first set of subscriber computing devices reference a network policy to determine a first response to the first set of information; and notifying a second set of subscriber computing devices of the second set of information, wherein at least some of the second set of subscriber computing devices reference the network policy to determine a second response to the first set of information, the second response being consistent with the first response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for managing risk in a network comprising the steps of:
-
obtaining, from a first computing device associated with a first aspect of a target computing device, a first set of information regarding the first aspect of the target computing device and relevant to the target computing device'"'"'s health; obtaining, from a second computing device associated with a second aspect of the target computing device, a second set of information regarding the second aspect of the target computing device and relevant to the target computing device'"'"'s health; and determining a responsive action with respect to the target computing device based on at least some of the first set of information and the second set of information. - View Dependent Claims (11, 12, 13, 14)
-
- 15. A system comprising a network state database and a network risk management service, the network state database comprising information regarding an aspect of a target computing device, the information being relevant to the target computing device'"'"'s health, and the network risk management service comprising a communication module for receiving and transmitting the information and an analysis module for analyzing the information to determine a responsive action.
Specification