×

Method and system for dynamic and comprehensive vulnerability management

  • US 9,246,935 B2
  • Filed: 10/14/2013
  • Issued: 01/26/2016
  • Est. Priority Date: 10/14/2013
  • Status: Active Grant
First Claim
Patent Images

1. A system for dynamic and comprehensive vulnerability management comprising:

  • at least one processor; and

    at least one memory unit coupled to the at least one processor, the at least one memory unit having stored therein instructions which when executed by any set of the one or more processors, perform a process for dynamic and comprehensive vulnerability management, the process for dynamic and comprehensive vulnerability management including;

    obtaining vulnerability management data;

    obtaining scanner data representing one or more scanner tests configured to discover one or more vulnerabilities in an asset;

    obtaining remedy data representing two or more remedies associated with vulnerabilities scanned for by the one or more scanner tests, the two or more remedies including a first remedy of automatic re-sizing of buffers and buffer pools and a second remedy of automatic re-setting or changing a response time;

    correlating the remedy data with vulnerabilities discoverable by the scanner tests;

    obtaining asset data associated with an asset;

    analyzing the vulnerability management data and the asset data to automatically identify a relevant scanner test in the scanner data to be applied to the asset;

    determining an ideal time to deploy the relevant scanner test on the asset;

    automatically deploying the relevant scanner test on the asset at, or before, the ideal time;

    if a vulnerability is identified by the relevant scanner test, identifying the remedy in the remedy data associated with the identified vulnerability;

    automatically applying the identified remedy to the asset;

    automatically re-deploying the relevant scanner on the asset to determine if the identified vulnerability has been corrected; and

    if the identified vulnerability is present after the remedy associated with the identified vulnerability has been applied taking protective action to mitigate the vulnerability.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×