Systems and methods for intelligently configuring computer security
First Claim
1. A method for configuring computer security of a subject entity at a computer security platform, the method comprising:
- monitoring a security environment maintained by the subject entity;
collecting a corpus of security data, the security data comprising security environment data relating to one or more security configurations of a network maintained by the subject entity;
analyzing the corpus of security data to determine one or more vulnerability factors and one or more security behaviors relating to the subject entity;
generating a security assessment for the subject entity based on the analysis of the corpus of security data;
generating a computer security policy for the security environment based on the security assessment, comprising one or more computer security configurations;
providing, to the subject entity, a security policy recommendation incorporating at least a subset of the generated computer security policy;
receiving a recommendation response from the subject entity declining to accept the security policy recommendation; and
responsive to the recommendation response declining to accept the security policy recommendation, providing an alternative security policy recommendation to the subject entity based on the recommendation response.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method that enables the configuration of computer security of a subject entity at a computer security platform includes collecting a corpus of security data relating to one or more security configurations of the network maintained by the subject entity, analyzing the corpus of security data to determine one or more vulnerability factors and one or more security behaviors relating to the subject entity, generating a security assessment for the subject entity based on the analysis of the corpus of security data, generating a computer security policy for the security environment based on the security assessment, and providing, to the subject entity, a security policy recommendation incorporating at least a subset of the generated computer security policy.
469 Citations
16 Claims
-
1. A method for configuring computer security of a subject entity at a computer security platform, the method comprising:
-
monitoring a security environment maintained by the subject entity; collecting a corpus of security data, the security data comprising security environment data relating to one or more security configurations of a network maintained by the subject entity; analyzing the corpus of security data to determine one or more vulnerability factors and one or more security behaviors relating to the subject entity; generating a security assessment for the subject entity based on the analysis of the corpus of security data; generating a computer security policy for the security environment based on the security assessment, comprising one or more computer security configurations; providing, to the subject entity, a security policy recommendation incorporating at least a subset of the generated computer security policy; receiving a recommendation response from the subject entity declining to accept the security policy recommendation; and responsive to the recommendation response declining to accept the security policy recommendation, providing an alternative security policy recommendation to the subject entity based on the recommendation response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for configuring computer security of a subject entity, the system comprising:
-
a security environment maintained by the subject entity; and a computer security platform implemented via one or more web servers or a distributed computing system, the one or more web servers or the distributed computing system comprising a non-transitory computer-readable medium storing computer instructions that when executed by one or more computer processors enables the computer security platform to; collect a corpus of security data, the security data comprising security environment data relating to one or more security configurations of the security environment maintained by the subject entity; analyze the corpus of security data to determine one or more vulnerability factors and one or more security behaviors relating to the subject entity; generate a security assessment for the subject entity based on the analysis of the corpus of security data; generate a computer security policy for the security environment based on the security assessment, comprising one or more computer security configurations; and provide, to the subject entity, a security policy recommendation incorporating at least a subset of the generated computer security policy; receive a recommendation response from the subject entity declining to accept the security policy recommendation; and responsive to the recommendation response declining to accept the security policy recommendation, provide one or more alternative security policy recommendations to the subject entity based on the recommendation response.
-
Specification