TECHNIQUE FOR USING INFRASTRUCTURE MONITORING SOFTWARE TO COLLECT CYBER-SECURITY RISK DATA
First Claim
Patent Images
1. A method comprising:
- sending first information from a risk manager system to a plurality of agents each associated with a respective device in a computing system, the first information associated with one or more risk-monitoring configurations;
receiving second information by the risk manager system from the agents, the second information identifying vulnerabilities and events associated with the respective devices; and
storing and displaying to a user at least one of the second information and an analysis of the second information.
1 Assignment
0 Petitions
Accused Products
Abstract
This disclosure provides a technique for using infrastructure monitoring software to collect cyber-security risk data. A method includes sending first information from a risk manager system to a plurality of agents each associated with a respective device in a computing system. The first information is associated with one or more risk-monitoring configurations. The method includes receiving second information by the risk manager system from the agents. The second information identifies identified vulnerabilities and events associated with the respective devices. The method includes storing and displaying to a user at least one of the second information and an analysis of the second information.
28 Citations
20 Claims
-
1. A method comprising:
-
sending first information from a risk manager system to a plurality of agents each associated with a respective device in a computing system, the first information associated with one or more risk-monitoring configurations; receiving second information by the risk manager system from the agents, the second information identifying vulnerabilities and events associated with the respective devices; and storing and displaying to a user at least one of the second information and an analysis of the second information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A risk manager system comprising:
-
a controller; and a display, the risk manager system configured to send first information to a plurality of agents each associated with a respective device in a computing system, the first information associated with one or more risk-monitoring configurations; receive second information from the agents, the second information identifying vulnerabilities and events associated with the respective devices; and store and display to a user at least one of the second information and an analysis of the second information. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory machine-readable medium encoded with executable instructions that, when executed, cause one or more processors of a risk manager system to:
-
send first information to a plurality of agents each associated with a respective device in a computing system, the first information associated with one or more risk-monitoring configurations; receive second information from the agents, the second information identifying vulnerabilities and events associated with the respective devices; and store and display to a user at least one of the second information and an analysis of the second information. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification