METHODS AND SYSTEMS FOR CONTROLLING ACCESS TO COMPUTING RESOURCES BASED ON KNOWN SECURITY VULNERABILITIES
8 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for fine tuning access control by remote, endpoint systems to host systems. Multiple conditions/states of one or both of the endpoint and host systems are monitored, collected and fed to an analysis engine. Using one or more of many different flexible, adaptable models and algorithms, an analysis engine analyzes the status of the conditions and makes decisions in accordance with pre-established policies and rules regarding the security of the endpoint and host system. Based upon the conditions, the policies, and the analytical results, actions are initiated regarding security and access matters. In one described embodiment of the invention, the monitored conditions include software vulnerabilities.
90 Citations
63 Claims
-
1-30. -30. (canceled)
-
31. A method for controlling the operation of an endpoint, comprising:
-
providing a user interface, at a computing system remote from the end point, configured to allow configuration of a plurality of policies; maintaining the plurality of policies in a data store on the computing system; identifying, from the plurality of policies, a plurality of conditions on the endpoint to monitor; configuring one or more agents on the endpoint to monitor the plurality of conditions; receiving, across a network, at the computing system, status information about the plurality of conditions on the endpoint gathered by the one or more agents; determining, by the computing system, a compliance state of the endpoint based on the status information and a plurality of compliance policies in the data store; and initiating, by the computing system, based on the compliance state, an action identified in at least one rule in the data store. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
-
42. A non-transitory computer readable medium containing computer instructions for controlling the operation of an endpoint, comprising:
-
providing a user interface, at a computing system remote from the end point, configured to allow configuration of a plurality of policies; maintaining the plurality of policies in a data store on the computing system; identifying, from the plurality of policies, a plurality of conditions on the endpoint to monitor; configuring one or more agents on the endpoint to monitor the plurality of conditions; receiving, across a network, at the computing system, status information about the plurality of conditions on the endpoint gathered by the one or more agents; determining, by the computing system, a compliance state of the endpoint based on the status information and a plurality of compliance policies in the data store; and initiating, by the computing system, based on the compliance state, an action identified in at least one rule in the data store. - View Dependent Claims (43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
-
-
53. A system for controlling the operation of an endpoint, comprising:
-
a user interface, provided by a computing system remote from the end point, configured to allow configuration of a plurality of policies; a data store, at the computing system, that contains the plurality of policies; one or more agents on the endpoint configured to monitor a plurality of conditions identified in the plurality of policies; and one or more processors at the computing system configured to; receive, across a network, status information about the plurality of conditions on the endpoint gathered by the one or more agents, determine a compliance state of the endpoint based on the status information and a plurality of compliance policies in the data store, and initiate, based on the compliance state, an action identified in at least one rule in the data store. - View Dependent Claims (54, 55, 56, 57, 58, 59, 60, 61, 62, 63)
-
Specification