ANTI-VULNERABILITY SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT
0 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided including client and server code configured to cooperate, resulting in display, via at least one user interface, of a plurality of user options for causing different actions of different types in connection with at least one of the networked devices that is actually vulnerable to at least one of a plurality of actual vulnerabilities for at least mitigating an occurrence. The user options include a first user option for causing a first action for dropping packets in connection with the at least one networked device for mitigating the occurrence and a second user option for causing a second action for installation of a patch on the at least one networked device for removing the at least one vulnerability from the at least one networked device. Based on receipt of first user input selecting the first option via the at least one user interface, the first action is caused for dropping packets in connection with the at least one networked device for mitigating the occurrence. Based on receipt of second user input selecting the second option via the at least one user interface, the second action is caused for installation of the patch on the at least one networked device, utilizing the client code, for removing the at least one vulnerability from the at least one networked device.
-
Citations
21 Claims
-
1-2. -2. (canceled)
-
3. A computer program product embodied on a non-transitory computer readable medium, comprising:
-
code for; identifying at least one aspect of the at least one networked device; accessing at least one data structure including particular weakness information related to a plurality of particular weaknesses, a portion of the particular weakness information related to each of the particular weaknesses being associated with at least one of a plurality of techniques capable of removing the corresponding particular weakness from the at least one network device when the at least one network device actually has the corresponding particular weakness, such that; a first portion of the particular weakness information related to a first particular weakness is associated with a first technique for completing an installation of software for removing the first particular weakness, a second portion of the particular weakness information related to a second particular weakness is associated with a second technique for affecting a service for removing the second particular weakness, and a third portion of the particular weakness information related to a third particular weakness is associated with a third technique for checking a configuration for removing the third particular weakness; determining whether the at least one networked device actually has one or more of the particular weaknesses, based on the at least one data structure and the at least one aspect of the at least one networked device; performing one or more actions based on the determination, such that; when it is determined that the at least one networked device actually has the first particular weakness; the first technique is applied on the at least one networked device by automatically completing the installation of the software on the at least one networked device for removing the first particular weakness from the at least one networked device; when it is determined that the at least one networked device actually has the second particular weakness; the second technique is applied on the at least one networked device by automatically affecting the service in connection with the at least one networked device for removing the second particular weakness from the at least one networked device; when it is determined that the at least one networked device actually has the third particular weakness; the third technique is applied on the at least one networked device by automatically checking the configuration of the at least one networked device for removing the third particular weakness from the at least one networked device; generating status information that is based on a completion of the one or more actions; communicating the status information; said computer program product further operable for; identifying a request for a network resource by the at least one networked device; receiving the status information from the at least one networked device; after the identification of the request for the network resource, determining a reaction to the request for the network resource, based the status information; and causing the reaction. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product embodied on a non-transitory computer readable medium, comprising:
-
code for identifying at least one aspect of the at least one networked device; code for accessing at least one data structure describing a plurality of techniques capable of at least mitigating a plurality of particular weaknesses, each of the techniques capable of at least mitigating a corresponding particular weakness, where; a first technique is described which is capable of removing a first particular weakness by completing an installation of software for at least mitigating the first particular weakness, a second technique is described which is capable of removing a second particular weakness by affecting a service for at least mitigating the second particular weakness, and a third technique is described which is capable of removing a third particular weakness by checking a configuration for at least mitigating the third particular weakness; code for determining whether the at least one networked device actually has one or more of the particular weaknesses, based on the at least one data structure and the at least one aspect of the at least one networked device; code for performing one or more actions based on the determination, such that; when it is determined that the at least one networked device actually has the first particular weakness; the first technique is applied on the at least one networked device by automatically completing the installation of the software on the at least one networked device for at least mitigating the first particular weakness from the at least one networked device; when it is determined that the at least one networked device actually has the second particular weakness; the second technique is applied on the at least one networked device by automatically affecting the service in connection with the at least one networked device for at least mitigating the second particular weakness from the at least one networked device; when it is determined that the at least one networked device actually has the third particular weakness; the third technique is applied on the at least one networked device by automatically checking the configuration of the at least one networked device for at least mitigating the third particular weakness from the at least one networked device; code for generating information indicating whether at least one of the first technique, the second technique, or the third technique has been applied; and code for communicating the information such that, in response to an identification of a request for a network resource by the at least one networked device, a reaction to the request for the network resource is capable of being caused, based the information.
-
-
20. A computer program product embodied on at least one non-transitory computer readable medium, comprising:
-
code for deploying a single client agent to at least one of a plurality of devices, the single client agent being capable of both identifying a plurality of aspects of the at least one device that are the bases for a plurality of weaknesses and applying a plurality of remediation techniques that remediate the weaknesses based on at least one data structure residing at the at least one device and identifying the remediation techniques that remediate the weaknesses, where; each of at least a portion of the remediation techniques remediates at least one of the plurality of weaknesses; each of at least a portion of the remediation techniques has a remediation type including at least one of installation of software, a policy setting, or a configuration; said at least one data structure identifies; a first remediation technique that remediates a first particular weakness by automatically installing software for at least mitigating the first particular weakness, a second remediation technique that remediates a second particular weakness by automatically affecting a service for at least mitigating the second particular weakness, and a third remediation technique that remediates a third particular weakness by automatically changing a configuration or policy setting for at least mitigating the third particular weakness; and code for; identifying at least one of a first aspect, a second aspect, or a third aspect of the at least one device that is a basis for at least one of the first particular weakness, the second particular weakness, or the third particular weakness, utilizing the single client agent, determining whether the at least one device is subject to at least one of the first particular weakness, the second particular weakness, or the third particular weakness, based on the at least one data structure and at least one of the first aspect, the second aspect, or the third aspect of the at least one device, conditionally applying at least one of the first remediation technique, the second remediation technique, or the third remediation technique to the at least one device, utilizing the single client agent, based on the determination whether the at least one device is subject to the at least one of the first particular weakness, the second particular weakness, or the third particular weakness, and reporting to at least one server, utilizing the single client agent, at least one of first information relating to the application of the first remediation technique, second information relating to the application of the second remediation technique, or third information relating to the application of the third remediation technique. - View Dependent Claims (21)
-
Specification