×

Systems and methods of network security and threat management

  • US 10,091,229 B2
  • Filed: 01/09/2009
  • Issued: 10/02/2018
  • Est. Priority Date: 01/09/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • performing, by one or more computer systems;

    receiving traffic information generated based, at least in part, upon an analysis of packets directed to a plurality of enterprise assets, each of the plurality of enterprise assets coupled to at least one of a plurality of distinct computer networks;

    receiving vulnerability information generated based, at least in part, upon a scan of the plurality of distinct computer networks, the scan configured to detect vulnerabilities associated with one or more of the plurality of enterprise assets;

    receiving vendor alert information provided by one or more third-party vendors, the vendor alert information related to one or more of the plurality of enterprise assets;

    continuously correlating;

    the received traffic information, vulnerability information, and vendor alert information; and

    each of at least one security threat of one or more security threats occurring within a first period of time with at least one similar security threat occurring within a second period of time to assess a threat potential of the respective security threat of the at least one security threat;

    assigning threat points to the one or more security threats based, at least in part, upon the continuous correlation;

    dynamically adjusting a priority of each of the one or more security threats and threat points associated with each of the one or more security threats by escalating a security threat with a highest potential to be successful and modifying a risk associated with other security threats based, at least in part, upon the continuous correlation,wherein escalating the security threat with the highest potential to be successful comprises;

    identifying, based on the received vulnerability information and an age of the vulnerability information, an enterprise asset of the plurality of enterprise assets being vulnerable to the security threat,wherein a potential for the security threat to be successful against the enterprise asset is based on a degree of vulnerability of the enterprise asset with respect to the security threat and the age of the vulnerability information with respect to the security threat;

    associating different security threats of the one or more security threats with different colors, each color being indicative of a different level of priority of a corresponding security threat of the one or more security threats; and

    providing the at least one security threat of the one or more security threats for display, wherein each of the at least one security threat is displayed in a color associated with the respective security threat.

View all claims
  • 13 Assignments
Timeline View
Assignment View
    ×
    ×