The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Jun. 12, 2012
Filed:
Mar. 31, 2004
Steven G. Andres, Huntington Beach, CA (US);
David M. Cole, Santa Monica, CA (US);
Thomas Gregory Cummings, Laguna Niguel, CA (US);
Roberto Ramon Garcia, San Antonio, TX (US);
Brian Michael Kenyon, Aliso Viejo, CA (US);
George R. Kurtz, Coto de Caza, CA (US);
Stuart Cartier Mcclure, Ladera Ranch, CA (US);
Christopher William Moore, Huntington Beach, CA (US);
Michael J. O'dea, Aliso Viejo, CA (US);
Ken D. Saruwatari, Laguna Niguel, CA (US);
Steven G. Andres, Huntington Beach, CA (US);
David M. Cole, Santa Monica, CA (US);
Thomas Gregory Cummings, Laguna Niguel, CA (US);
Roberto Ramon Garcia, San Antonio, TX (US);
Brian Michael Kenyon, Aliso Viejo, CA (US);
George R. Kurtz, Coto de Caza, CA (US);
Stuart Cartier McClure, Ladera Ranch, CA (US);
Christopher William Moore, Huntington Beach, CA (US);
Michael J. O'Dea, Aliso Viejo, CA (US);
Ken D. Saruwatari, Laguna Niguel, CA (US);
McAfee, Inc., Santa Clara, CA (US);
Abstract
A security risk management system comprises a vulnerability database, an asset database, a local threat intelligence database and a threat correlation module. The vulnerability database comprises data about security vulnerabilities of assets on a network gathered using active or passive vulnerability assessment techniques. The asset database comprises data concerning attributes of each asset. The threat correlation module receives threat intelligence alerts that identify attributes and vulnerabilities associated with security threats that affect classes of assets. The threat correlation module compares asset attributes and vulnerabilities with threat attributes and vulnerabilities and displays a list of assets that are affected by a particular threat. The list can be sorted according to a calculated risk score, allowing an administrator to prioritize preventive action and respond first to threats that affect higher risk assets. The security risk management system provides tools for performing preventive action and for tracking the success of preventive action.