SYSTEM AND METHOD FOR PROTECTING A WEBSITE FROM HACKING ATTACKS
First Claim
Patent Images
1. A system for protecting at least one server in communication with a computer network from hacking attacks, the system comprising:
- at least one scanner operable to monitor activity of said server, to identify at least one security vulnerability, and further operable to produce an automated report; and
at least one report processor operable to analyze said automated report.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for protecting at least one server, in communication with a computer network, from hacking attacks including a scanner, a report processor and a control center. The scanner may monitor activity of the server, identify at least one security vulnerability, produce an automated report. The report processor may analyze the automated report and generate fixes for identified vulnerabilities.
-
Citations
24 Claims
-
1. A system for protecting at least one server in communication with a computer network from hacking attacks, the system comprising:
-
at least one scanner operable to monitor activity of said server, to identify at least one security vulnerability, and further operable to produce an automated report; and at least one report processor operable to analyze said automated report. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for protecting a plurality of servers in communication with a computer network from hacking attacks, the system comprising:
-
at least one aggregator configured to receive data relating to activity of said plurality of servers; at least one data processor operable to analyze said data relating to activity of said plurality of servers and to identify at least one security vulnerability common to at least a selection of said plurality of servers. - View Dependent Claims (19, 20)
-
-
21. A method for protecting at least one server in communication with a computer network from hacking attacks, comprising:
-
executing an agent application on said at least one server; monitoring activity of said at least one server; identifying at least one security vulnerability; producing an automated report; analyzing said automated report; and providing at least one software based protective element. - View Dependent Claims (22, 23, 24)
-
Specification