Network appliance for vulnerability assessment auditing over multiple networks
First Claim
1. A system for managing an audit of a computing asset over a network comprising:
- an audit extension device comprising;
program code that is operative to cause the audit extension device to perform actions, comprising;
receiving through a security perimeter an audit request to be performed on the computing asset, which audit request comprises, at least in part, a request for information to be provided by the computing asset;
reflecting the audit based on the request towards the computing asset; and
sending a result of the audit through the security perimeter; and
an audit device comprising;
program code that is operative to cause the audit device to perform actions, comprising;
sending the audit request through the security perimeter to the audit extension device;
receiving the result of the audit from the audit extension device through the security perimeter; and
based at least in part on a security policy, performing a remediation action.
3 Assignments
0 Petitions
Accused Products
Abstract
An apparatus, system, and method are directed towards enabling auditing of network vulnerabilities from multiple network vantage points virtually simultaneously. Multiple network vantage points may include, but are not limited to, remote/branch enterprise sites, devices on an enterprise perimeter, on either side of a security perimeter, and even through the security perimeter. In one embodiment, an auditor performs reflected audits thereby extending auditing of network vulnerabilities to provide a comprehensive 360 degree audit of internal, external, and remote enterprise network sites. In one embodiment, the present invention may be implemented employing a single auditing device, and one or more audit extension devices that are configured to extend the auditing device'"'"'s audit reach. The auditing device and one or more audit extension devices may communicate using an encrypted network channel through a security perimeter and/or across multiple networks.
38 Citations
15 Claims
-
1. A system for managing an audit of a computing asset over a network comprising:
-
an audit extension device comprising; program code that is operative to cause the audit extension device to perform actions, comprising; receiving through a security perimeter an audit request to be performed on the computing asset, which audit request comprises, at least in part, a request for information to be provided by the computing asset; reflecting the audit based on the request towards the computing asset; and sending a result of the audit through the security perimeter; and an audit device comprising; program code that is operative to cause the audit device to perform actions, comprising; sending the audit request through the security perimeter to the audit extension device; receiving the result of the audit from the audit extension device through the security perimeter; and based at least in part on a security policy, performing a remediation action. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A network device for managing an audit of a computing asset over a network, comprising:
-
a transceiver configured to send and receive data over the network; and an audit extension component that is programmed to perform actions comprising; receiving, from another device, through a security perimeter an audit request to be performed on the computing asset, which audit request comprises, at least in part, a request for information to be provided by the computing asset; reflecting the audit based on the request towards the computing asset; receiving a response to the audit; and sending the response of the audit through the security perimeter towards the other device. - View Dependent Claims (9)
-
-
10. A network device for managing an audit of a computing asset over a network, comprising:
-
a transceiver configured to send and receive data over the network; and an audit component that is programmed to perform actions comprising; sending an audit request through a security perimeter to an audit extension device that is configured to reflect the audit request towards the computing asset, which audit request comprises, at least in part, a request for information to be provided by the computing asset; receiving a result of the audit from the audit extension device through the security perimeter; and based at least in part on a security policy, performing a remediation action. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method for managing an audit of a computing asset over a network, comprising:
-
sending through a security perimeter, to a network device, an audit request of the computing asset, wherein the computing asset is on a different side of the security perimeter as the network device and which audit request comprises, at least in part, a request for information to be provided by the computing asset; enabling the audit to be performed based on the request upon the computing asset; and
using the network device to reflect the audit towards the computing asset.
-
Specification