×

Method and system for dynamic and comprehensive vulnerability management

  • US 9,516,064 B2
  • Filed: 12/15/2015
  • Issued: 12/06/2016
  • Est. Priority Date: 10/14/2013
  • Status: Active Grant
First Claim
Patent Images

1. A system for dynamic and comprehensive vulnerability management comprising:

  • at least one processor; and

    at least one memory unit coupled to the at least one processor, the at least one memory unit having stored therein instructions which when executed by any set of the one or more processors, perform a process for dynamic and comprehensive vulnerability management, the process for dynamic and comprehensive vulnerability management including;

    obtaining vulnerability management data, the vulnerability management data including one or more levels of security that must be associated with one or more accounts or assets;

    amending, following receiving modifications specified by one or more parties associated with an asset being managed by the vulnerability management data, the vulnerability management data;

    obtaining scanner data representing one or more scanners configured to detect and monitor vulnerabilities and vulnerability characteristics reflected in the vulnerability management data, at least one scanner of the scanner data including a plurality of scanner tests configured to detect a plurality of vulnerabilities;

    obtaining remedy data representing two or more remedies associated with vulnerabilities scanned for by the scanners, the two or more remedies including a first remedy of automatic re-sizing of buffers and buffer pools and a second remedy of automatic re-setting or changing a response time;

    correlating the remedy data with vulnerabilities discoverable by the scanner tests;

    obtaining asset data associated with an asset;

    analyzing the vulnerability management data and the asset data to automatically identify a relevant scanner test in the scanner data to be applied to the asset;

    determining an ideal time to deploy the relevant scanner test on the asset;

    automatically deploying the relevant scanner test on the asset at, or before, the ideal time;

    identifying, by the relevant scanner test, a vulnerability of the asset;

    identifying a remedy in the remedy data, the identified remedy being associated with the identified vulnerability;

    automatically applying the identified remedy to the asset;

    automatically re-deploying the relevant scanner on the asset to determine whether the identified vulnerability is still present; and

    upon a determination that the identified vulnerability is present after the identified remedy has been applied, taking protective action to mitigate the vulnerability.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×