ENTERPRISE SECURITY MANAGEMENT FOR NETWORK EQUIPMENT
First Claim
1. A system comprising:
- a vulnerability management console displayed on a device in a network, the vulnerability management console providing services to uncover known common vulnerabilities and exposures within the network, and the device including a hardware port for each of a keyboard, a video device, and a mouse; and
a KVM system for accessing the hardware ports of the device, the KVM system providing a TCP/IP interface for accessing the hardware ports from a remote location through the KVM system;
whereby a user can operate the vulnerability management console of the device from a remote network location.
1 Assignment
0 Petitions
Accused Products
Abstract
The inventive device includes a dashboard or graphical user interface (GUI), a security access control (AUTH) and secure communications sub-system (SEC-COMM), network and asset discover and mapping system (NAADAMS), an asset management engine (AME), vulnerability assessment engine (CVE-DISCOVERY), vulnerability remediation engine (CVE-REMEDY), a reporting system (REPORTS), a subscription, updates and licensing system (SULS), a countermeasure communications system (COUNTERMEASURE-COMM), a logging system (LOGS), a database integration engine (DBIE), a scheduling and configuration engine (SCHED-CONFIG), a wireless and mobile devices/asset detection and management engine (WIRELESS-MOBILE), a notification engine (NOTIFY), a regulatory compliance reviewing and reporting system (REG-COMPLY), client-side (KVM-CLIENT) integration with KVM over IP or similar network management equipment, authentication-services (KVM-AUTH) integration with KVM over IP or similar network management equipment and server-side (KVM-SERVER) integration with KVM over IP or similar network management equipment.
180 Citations
5 Claims
-
1. A system comprising:
-
a vulnerability management console displayed on a device in a network, the vulnerability management console providing services to uncover known common vulnerabilities and exposures within the network, and the device including a hardware port for each of a keyboard, a video device, and a mouse; and a KVM system for accessing the hardware ports of the device, the KVM system providing a TCP/IP interface for accessing the hardware ports from a remote location through the KVM system; whereby a user can operate the vulnerability management console of the device from a remote network location.
-
-
2. A method comprising:
-
providing a vulnerability management console on a device in a network, the vulnerability management console providing services to uncover known common vulnerabilities and exposures within the network; connecting a KVM system to the hardware ports of the device for a keyboard, a video device, and a mouse; and accessing the KVM system from a remote location to locally operate the vulnerability management console on the device. - View Dependent Claims (3, 4, 5)
-
Specification