×

Anti-vulnerability system, method, and computer program product

DC CAFC
  • US 8,984,644 B2
  • Filed: 09/28/2014
  • Issued: 03/17/2015
  • Est. Priority Date: 07/01/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer program product embodied on a non-transitory computer readable medium, comprising:

  • code for receiving actual vulnerability information from at least one first data storage that is generated utilizing potential vulnerability information from at least one second data storage that is used to identify a plurality of potential vulnerabilities, by including;

    at least one first potential vulnerability, andat least one second potential vulnerability;

    said actual vulnerability information generated utilizing the potential vulnerability information, in response to code execution by at least one processor, by;

    identifying at least one configuration associated with a plurality of devices including a first device, a second device, and a third device, anddetermining that the plurality of devices is actually vulnerable to at least one actual vulnerability based on the identified at least one configuration, utilizing the potential vulnerability information that is used to identify the plurality of potential vulnerabilities;

    code for identifying an occurrence in connection with at least one of the plurality of devices;

    code for determining that the at least one actual vulnerability of the at least one of the plurality of devices is susceptible to being taken advantage of by the occurrence identified in connection with the at least one of the plurality of devices, utilizing the actual vulnerability information; and

    code for providing a user with one or more options to selectively utilize different occurrence mitigation actions of diverse occurrence mitigation types, including a firewall-based occurrence mitigation type and an intrusion prevention system-based occurrence mitigation type, across the plurality of devices for occurrence mitigation by preventing advantage being taken of actual vulnerabilities utilizing the different occurrence mitigation actions of the diverse occurrence mitigation types across the plurality of devices.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×