×

Assessing security control quality and state in an information technology infrastructure

  • US 9,992,230 B1
  • Filed: 09/29/2014
  • Issued: 06/05/2018
  • Est. Priority Date: 09/27/2013
  • Status: Active Grant
First Claim
Patent Images

1. One or more non-transitory computer-readable media storing computer-executable instructions which when executed by a computer cause the computer to:

  • display a user interface that indicates the number of assets in an information technology (IT) infrastructure that have been discovered by one or more different security controls tools,wherein the user interface includes at least a first visual representation corresponding to a first security control and a second visual representation corresponding to a second security control, the first visual representation partially overlapping with the second visual representation and thereby forming a non-overlapping portion of the first visual representation, a non-overlapping portion of the second visual representation, and an overlapping portion of both the first visual representation and the second visual representation, andwherein the user interface further displays data in each of the non-overlapping portion of the first visual representation, the non-overlapping portion of the second visual representation, and the overlapping portion of both the first visual representation and the second visual representation,the data in the non-overlapping portion of the first visual representation indicating the number of assets in the IT infrastructure that are being monitored by the first security control, the data in the non-overlapping portion of the second visual representation indicating the number of assets in the IT infrastructure that are being monitored by the second security control,the data in the overlapping portion of both the first visual representation and the second representation indicating the number of assets in the IT infrastructure that are monitored by both the first security control and the second security control, andwherein the user interface further includes a separate visual representation that is separate from the first visual representation and the second visual representation and that displays a number specifying the total number of assets in the IT infrastructure that have been discovered but that are not currently monitored by any of the first security control or the second security control,wherein the first visual representation is for one of a vulnerability assessment security control, a policy compliance security control, a change data security control, or a log event data security control, andwherein the second visual representation is for a different security control than the first visual representation and is for one of the vulnerability assessment security control, the policy compliance security control, the change data security control, or the log event data security control.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×