×

Method and system for managing computer system vulnerabilities

  • US 8,756,698 B2
  • Filed: 08/10/2012
  • Issued: 06/17/2014
  • Est. Priority Date: 08/10/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for vulnerability risk management of an enterprise computing system, comprising the steps of:

  • instantiating, by a cloud computing system employing a software-as-a-service multi-tenant architecture, a vulnerability risk management module and an expert system coupled to the vulnerability risk management module, the vulnerability risk management module configured for;

    receiving from an end user a type of vulnerability;

    determining a list of potential vulnerabilities of the enterprise computing system based on a non-intrusive scan of the enterprise computing system for the received type of vulnerability, wherein the scan includes a scan of an asset of the enterprise computing system associated with the type of vulnerability and wherein the scan is based on a preference of the end user regarding a specified date and time to conduct the scan;

    transmitting the list of potential vulnerabilities to the expert system;

    receiving from the expert system a refined list of potential vulnerabilities; and

    reporting the refined list of vulnerabilities to the end user.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×