×

Anti-vulnerability system, method, and computer program product

DC
  • US 9,225,686 B2
  • Filed: 03/16/2015
  • Issued: 12/29/2015
  • Est. Priority Date: 07/01/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system, comprising:

  • a firewall occurrence mitigation system component;

    an intrusion prevention system component; and

    a platform including at least one hardware processor that is configured to communicatively couple with the firewall occurrence mitigation system component, the intrusion prevention system component, and at least one data storage;

    said at least one hardware processor stores, in the at least one data storage, first information associated with a plurality of actual vulnerabilities, the first information being based on second information associated with a plurality of potential vulnerabilities as a result of a determination that one or more of a plurality of devices is actually vulnerable based on the second information and at least one of an operating system or an application;

    said at least one hardware processor, based on the first information, displays one or more options for selection by at least one user to selectively utilize a firewall-related occurrence mitigation action and an intrusion prevention system-related occurrence mitigation action in connection with one or more of the plurality of actual vulnerabilities;

    said firewall-related occurrence mitigation action including sending a firewall update resulting in utilization of the firewall occurrence mitigation system component for preventing an actual vulnerability addressed by the firewall update from being taken advantage of in response to identification of an occurrence capable of taking advantage of the actual vulnerability addressed by the firewall update;

    said intrusion prevention system-related occurrence mitigation action including sending an intrusion prevention system update resulting in utilization of the intrusion prevention system component for preventing an actual vulnerability addressed by the intrusion prevention system update from being taken advantage of in response to identification of an occurrence capable of taking advantage of the actual vulnerability addressed by the intrusion prevention system update;

    said at least one hardware processor, in response to first user input, sends the firewall update utilizing at least one network;

    said firewall occurrence mitigation system component receives the firewall update and, after the receipt of the firewall update and in response to identification of the occurrence capable of taking advantage of the actual vulnerability addressed by the firewall update, prevents the actual vulnerability addressed by the firewall update from being taken advantage of;

    said at least one hardware processor, in response to second user input, sends the intrusion prevention system update utilizing the at least one network;

    said intrusion prevention system component receives the intrusion prevention system update and, after the receipt of the intrusion prevention system update and in response to identification of the occurrence capable of taking advantage of the actual vulnerability addressed by the intrusion prevention system update, prevents the actual vulnerability addressed by the intrusion prevention system update from being taken advantage of.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×