发明名称 NETWORK APPLIANCE FOR VULNERABILITY ASSESSMENT AUDITING OVER MULTIPLE NETWORKS
摘要 An apparatus, system, and method are directed towards enabling auditing of network vulnerabilities from multiple network vantage points virtually simultaneously. Multiple network vantage points may include, but are not limited to, remote/branch enterprise sites, devices on an enterprise perimeter, on either side of a security perimeter, and even through the security perimeter. In one embodiment, an auditor performs reflected audits thereby extending auditing of network vulnerabilities to provide a comprehensive 360 degree audit of internal, external, and remote enterprise network sites. In one embodiment, the present invention may be implemented employing a single auditing device, and one or more audit extension devices that are configured to extend the auditing device's audit reach. The auditing device and one or more audit extension devices may communicate using an encrypted network channel through a security perimeter and/or across multiple networks.
申请公布号 US2016205129(A1) 申请公布日期 2016.07.14
申请号 US201615079224 申请日期 2016.03.24
申请人 CALLAHAN CELLULAR L.L.C. 发明人 WEBB Evan M.;BOSCOLO Christopher D.;GILDE Robert G.
分类号 H04L29/06 主分类号 H04L29/06
代理机构 代理人
主权项 1. A method for managing an audit by an audit device, comprising: initiating, by an audit device, communication between an audit extension device and the audit device for an audit by sending a request for the audit to be performed on a computing asset through a security perimeter to the audit extension device, the request for the audit including a request for information to be provided by the computing asset, wherein the computing asset is separate from the audit device; receiving, by the audit device, an audit result of the audit from the audit extension device through the security perimeter; determining, by the audit device, whether the audit result indicates that the computing asset complies with a security policy; and instructing, by the audit device, the audit extension device to quarantine the computing asset in a quarantined network in response to the computing asset failing to satisfy the security policy.
地址 WILMINGTON DE US