DISCOVERY AND CLASSIFICATION OF ENTERPRISE ASSETS VIA HOST CHARACTERISTICS
First Claim
Patent Images
1. A computer-implemented method for managing a plurality of computing assets, the method comprising:
- for one or more of the computing assets;
identifying, by operation of at least one computer processor, one or more attributes associated with a digital certificate installed on the computing asset, andassigning a classification to the computing asset based on the attributes of the identified digital certificate, wherein the classification is used to prioritize security incidents occurring on the plurality of computing assets.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques are presented herein for classifying a variety of enterprise computing resources based on asset characteristics. In particular, a computing asset, e.g., a server, may be classified based on any digital certificates provisioned on that server. That is, the properties of a digital certificate may be used to determine a measure of business value or importance of a server (or data hosted on that server). Once classified, a monitoring system may use the assigned classifications to prioritize security incidents for review.
38 Citations
20 Claims
-
1. A computer-implemented method for managing a plurality of computing assets, the method comprising:
for one or more of the computing assets; identifying, by operation of at least one computer processor, one or more attributes associated with a digital certificate installed on the computing asset, and assigning a classification to the computing asset based on the attributes of the identified digital certificate, wherein the classification is used to prioritize security incidents occurring on the plurality of computing assets. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A computer-readable storage medium storing instructions, which, when executed on a processor, performs an operation for managing a plurality of computing assets, the operation comprising:
for one or more of the computing assets; identifying, by operation of at least one computer processor, one or more attributes associated with a digital certificate installed on the computing asset, and assigning a classification to the computing asset based on the attributes of the identified digital certificate, wherein the classification is used to prioritize security incidents occurring on the plurality of computing assets. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A system, comprising:
-
a processor; and a memory hosting an application, which, when executed on the processor, performs an operation for an operation for managing a plurality of computing assets, the operation comprising; for one or more of the computing assets; identifying, by operation of at least one computer processor, one or more attributes associated with a digital certificate installed on the computing asset, and assigning a classification to the computing asset based on the attributes of the identified digital certificate, wherein the classification is used to prioritize security incidents occurring on the plurality of computing assets. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification