×

Methods and systems for controlling access to computing resources based on known security vulnerabilities

DC CAFC
  • US 8,955,038 B2
  • Filed: 08/16/2012
  • Issued: 02/10/2015
  • Est. Priority Date: 12/21/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method for controlling the operation of an endpoint, comprising:

  • providing a user interface, at a computing system remote from the end point, configured to allow configuration of a plurality of policies;

    maintaining the plurality of policies in a data store on the computing system;

    identifying, from the plurality of policies, a plurality of operating conditions on the endpoint to monitor;

    configuring one or more software agents on the endpoint to monitor the plurality of operating conditions;

    receiving, across a network, at the computing system, status information about the plurality of operating conditions on the endpoint gathered by the one or more software agents;

    determining, by the computing system, a compliance state of the endpoint based on the status information and a plurality of compliance policies in the data store; and

    initiating, by the computing system, based on the compliance state, an action identified in at least one rule in the data store, wherein the action is carried out by a processor on the endpoint.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×