System and Method for Evaluation in a Collaborative Security Assurance System
First Claim
Patent Images
1. A method of evaluating a protected network, the method comprising:
- selecting in a security assurance system a network security product, wherein the security product is associated with the protected network;
selecting a threat from a plurality of threats stored on the security assurance system;
launching on the security assurance system an evaluation of the security product based upon the threat; and
reporting to a user of the security assurance system a result of the evaluation.
12 Assignments
0 Petitions
Accused Products
Abstract
A security assurance system includes a back-end application and a computing resource. The back-end application receives a selection of a network security product that is associated with a protected network, and receives a selection of a threat from a plurality of threats stored on the security assurance system. The computing resource launches an evaluation of the security product based upon the threat, and reports to a user of the security assurance system a result of the evaluation.
17 Citations
20 Claims
-
1. A method of evaluating a protected network, the method comprising:
-
selecting in a security assurance system a network security product, wherein the security product is associated with the protected network; selecting a threat from a plurality of threats stored on the security assurance system; launching on the security assurance system an evaluation of the security product based upon the threat; and reporting to a user of the security assurance system a result of the evaluation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A security assurance system comprising:
-
a back-end application; and a computing resource; wherein the back-end application is operable to; receive a selection of a network security product, wherein the security product is associated with a protected network; and receive a selection of a threat from a plurality of threats stored on the security assurance system; and wherein the computing resource is operable to; launch an evaluation of the security product based upon the threat; and report to a user of the security assurance system a result of the evaluation. - View Dependent Claims (11, 12, 13)
-
-
14. Machine-executable code for an information handling system, wherein the machine-executable code is embedded in a non-transitory storage medium and includes instructions for carrying out a method, the method comprising:
-
selecting in a security assurance system a network security product, wherein the security product is associated with the protected network; selecting a threat from a plurality of threats stored on the security assurance system; launching on the security assurance system an evaluation of the security product based upon the threat; and reporting to a user of the security assurance system a result of the evaluation. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification