SYSTEM AND METHOD FOR CLOUD BASED SCANNING FOR COMPUTER VULNERABILITIES IN A NETWORK ENVIRONMENT
First Claim
1. A method comprising:
- establishing a first secure tunnel between a configuration manager and a scanner, and a second secure tunnel between a scan controller and the scanner, wherein the scanner is located in a public network and the configuration manager and the scan controller are located in a private network;
communicating scanner configuration information between the scanner and the configuration manager over the first secure tunnel; and
communicating scan information between the scanner and the scan controller over the second secure tunnel.
10 Assignments
0 Petitions
Accused Products
Abstract
A method in one embodiment includes establishing a first secure tunnel between a scanner and a configuration manager, and a second secure tunnel between the scanner and a scan controller, where the scanner is located in a public network and the configuration manager and the scan controller are located in a private network, communicating scanner configuration information between the scanner and the configuration manager over the first secure tunnel, and communicating scan information between the scanner and the scan controller over the second secure tunnel. The secure tunnels may be established from within the private network, by forwarding a first origination port and a second origination port to a first destination port and a second destination port, respectively. The first and second origination ports may be located in the public network, and the first and second destination ports may be located in the private network.
83 Citations
22 Claims
-
1. A method comprising:
-
establishing a first secure tunnel between a configuration manager and a scanner, and a second secure tunnel between a scan controller and the scanner, wherein the scanner is located in a public network and the configuration manager and the scan controller are located in a private network; communicating scanner configuration information between the scanner and the configuration manager over the first secure tunnel; and communicating scan information between the scanner and the scan controller over the second secure tunnel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus comprising:
-
a scan engine; a configuration agent; a first port; a second port; a memory element configured to store data; and a processor operable to execute instructions associated with the data, wherein the apparatus is configured for; establishing a first secure tunnel between a configuration manager and the configuration agent, and a second secure tunnel between a scan controller and the scan engine, wherein the apparatus is located in a public network and the configuration manager and the scan controller are located in a private network; communicating scanner configuration information between the configuration agent and the configuration manager over the first secure tunnel; and communicating scan information between the scan engine and the scan controller over the second secure tunnel. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. Logic encoded in non-transitory media that includes code for execution and when executed by a processor is operable to perform operations comprising:
-
establishing a first secure tunnel between a configuration manager and a scanner, and a second secure tunnel between a scan controller and the scanner, wherein the scanner is located in a public network and the configuration manager and the scan controller are located in a private network; communicating scanner configuration information between the scanner and the configuration manager over the first secure tunnel; and communicating scan information between the scanner and the scan controller over the second secure tunnel. - View Dependent Claims (18, 19, 20, 21, 22)
-
Specification