×

Managing requests for security services

  • US 9,076,013 B1
  • Filed: 02/28/2011
  • Issued: 07/07/2015
  • Est. Priority Date: 02/28/2011
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for analyzing network security from a remote geographic location, the method comprising:

  • accessing, by or more physical computing systems under control of a program execution service, a request from a user of a computing service to analyze a target network located at the remote geographic location from the computing service, the computing service comprising a plurality of computing nodes, the request received via a computing interface;

    automatically allocating, by the one or more physical computing systems, a computing node from the plurality of computing nodes of the computing service at the remote geographic location from the target network in response to the user'"'"'s request, the computing node configured to analyze network security of the target network at the remote geographic location from the computing service;

    automatically establishing, by the one or more physical computing systems, a secure connection between the allocated computing node and a location within the target network, the secure connection providing the allocated computing node with network access to the target network at least substantially similar to network access provided to a computing node located at the location, the allocated computing node configured to gather network security data from the target network using the secure connection; and

    automatically determining, by the one or more physical computing systems, a security status of the target network based at least partly on the network security data gathered by the allocated computing node using the secure connection.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×