Enterprise Information Security Management Software For Prediction Modeling With Interactive Graphs
First Claim
Patent Images
1. A method comprising:
- receiving security assessment information for information technology assets of an organization, the security assessment information being representative of an existing risk exposure of the organization;
presenting the security assessment information to a user for the user to alter;
receiving altered security assessment information from the user, the altered security assessment information being representative of a hypothetical risk exposure of the organization;
determining first and second data points, wherein the first data point is determined using the security assessment information and is representative of the existing risk exposure, and the second data point is determined using the altered security assessment information and is representative of the hypothetical risk exposure; and
displaying a graph on an electronic screen and animating a plurality of successive visual representations in the graph, wherein an initial visual representation indicates the first data point, a final visual representation indicates the second data point, and the graph comprises a background comprising a first region having a first color and a second region having a second color, different from the first color.
1 Assignment
0 Petitions
Accused Products
Abstract
Various baseline security measurements of assets are collected and calculated by the system. A user creates a what-if scenario by changing one or more baseline security measurements. The system generates interactive, animated graphs that compare the baseline security measurements against the what-if scenario.
-
Citations
18 Claims
-
1. A method comprising:
-
receiving security assessment information for information technology assets of an organization, the security assessment information being representative of an existing risk exposure of the organization; presenting the security assessment information to a user for the user to alter; receiving altered security assessment information from the user, the altered security assessment information being representative of a hypothetical risk exposure of the organization; determining first and second data points, wherein the first data point is determined using the security assessment information and is representative of the existing risk exposure, and the second data point is determined using the altered security assessment information and is representative of the hypothetical risk exposure; and displaying a graph on an electronic screen and animating a plurality of successive visual representations in the graph, wherein an initial visual representation indicates the first data point, a final visual representation indicates the second data point, and the graph comprises a background comprising a first region having a first color and a second region having a second color, different from the first color. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
in a computer screen, providing a first portion of the screen with a plurality of user-adjustable options; in the computer screen, providing a second portion of the screen with a graph having a first axis, a second axis, and a background comprising a first region having a first color and a second region having a second color, different from the first color, wherein a first shortest distance between the first axis and a first edge of the first region is from the first axis to a leftmost edge of the first region, a second shortest distance between the second axis and a second edge of the first region is from the second axis to a bottommost edge of the first region, and the first region is between the second region and first and second axes; and after a first user-selectable option is selected, animating a first plurality of visual representations in the graph. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
Specification