System and method for evaluation in a collaborative security assurance system
First Claim
Patent Images
1. A method comprising:
- storing, by a first developer associated with a first protected network, a first threat, wherein the first threat is stored to a security assurance system, wherein the security assurance system includes a plurality of threats;
storing, by a second developer associated with a second protected network, a second threat, wherein the second threat is stored to the security assurance system;
providing a first security product to the security assurance system;
selecting, by a first administrator associated with the first protected network, the first security product, wherein the first security product is associated with a second security product of the first protected network;
selecting, by the first administrator, the first threat;
launching on the security assurance system a first evaluation of the first security product based upon the first threat;
reporting to the first administrator a first result of the first evaluation;
updating the second security product in response to the first result;
selecting, by a second administrator associated with the second protected network, the first security product, wherein the first security product is associated with a third security product of the second protected network;
selecting, by the second administrator, the second threat, and preventing the selecting, by the second administrator, the first threat;
launching on the security assurance system a second evaluation of the first security product based upon the second threat;
reporting to the second administrator a second result of the second evaluation; and
updating the third security product in response to the second result.
12 Assignments
0 Petitions
Accused Products
Abstract
A security assurance system includes a back-end application and a computing resource. The back-end application receives a selection of a network security product that is associated with a protected network, and receives a selection of a threat from a plurality of threats stored on the security assurance system. The computing resource launches an evaluation of the security product based upon the threat, and reports to a user of the security assurance system a result of the evaluation.
14 Citations
15 Claims
-
1. A method comprising:
-
storing, by a first developer associated with a first protected network, a first threat, wherein the first threat is stored to a security assurance system, wherein the security assurance system includes a plurality of threats; storing, by a second developer associated with a second protected network, a second threat, wherein the second threat is stored to the security assurance system; providing a first security product to the security assurance system; selecting, by a first administrator associated with the first protected network, the first security product, wherein the first security product is associated with a second security product of the first protected network; selecting, by the first administrator, the first threat; launching on the security assurance system a first evaluation of the first security product based upon the first threat; reporting to the first administrator a first result of the first evaluation; updating the second security product in response to the first result; selecting, by a second administrator associated with the second protected network, the first security product, wherein the first security product is associated with a third security product of the second protected network; selecting, by the second administrator, the second threat, and preventing the selecting, by the second administrator, the first threat; launching on the security assurance system a second evaluation of the first security product based upon the second threat; reporting to the second administrator a second result of the second evaluation; and updating the third security product in response to the second result. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A security assurance system comprising:
-
a back-end application; and a hardware computing resource; wherein the back-end application is operable to; store a first threat, wherein the security assurance system includes a plurality of threats, and wherein the first threat is received form a first developer associated with a first protected network; store a second threat, wherein the second threat is received from a second developer associated with a second protected network; receive a first security product; receive a first selection of the first security product from a first administrator associated with the first protected network, wherein the first security product is associated with a second security product of the first protected network; receive a second selection of the first threat from the first administrator; receive a third selection of the first security product from a second administrator associated with the second protected network, wherein the first security product is associated with a third security product of the second protected network; and receive a fourth selection, by the second administrator, of the second threat, and prevent the selecting, by the second administrator, of the first threat; and wherein the computing resource is operable to; launch a first evaluation of the first security product based upon the first threat; report to the first administrator a first result of the first evaluation; update the second security product in response to the first result; launch on the security assurance system a second evaluation of the first security product based upon the second threat; report to the second administrator a second result of the second evaluation; and update the third security product in response to the second result. - View Dependent Claims (7, 8, 9, 10)
-
-
11. Machine-executable code for an information handling system, wherein the machine-executable code is embedded in a non-transitory storage medium and includes instructions for carrying out a method, the method comprising:
-
storing, by a first developer associated with a first protected network, a first threat, wherein the first threat is stored to a security assurance system, wherein the security assurance system includes a plurality of threats; storing, by a second developer associated with a second protected network, a second threat, wherein the second threat is stored to the security assurance system; providing a first security product to the security assurance system; selecting, by a first administrator associated with the first protected network, the first security product, wherein the first security product is associated with a second security product of the first protected network; selecting, by the first administrator, the first threat; launching on the security assurance system a first evaluation of the first security product based upon the first threat; reporting to the first administrator a first result of the first evaluation; updating the second security product in response to the first result; selecting, by a second administrator associated with the second protected network, the first security product, wherein the first security product is associated with a third security product of the second protected network; selecting, by the second administrator, the second threat, and preventing the selecting, by the second administrator, the first threat; launching on the security assurance system a second evaluation of the first security product based upon the second threat; reporting to the second administrator a second result of the second evaluation; and updating the third security product in response to the second result. - View Dependent Claims (12, 13, 14, 15)
-
Specification