发明名称 System and method for evaluation in a collaborative security assurance system
摘要 A security assurance system includes a back-end application and a computing resource. The back-end application receives a selection of a network security product that is associated with a protected network, and receives a selection of a threat from a plurality of threats stored on the security assurance system. The computing resource launches an evaluation of the security product based upon the threat, and reports to a user of the security assurance system a result of the evaluation.
申请公布号 US8925091(B2) 申请公布日期 2014.12.30
申请号 US201113224009 申请日期 2011.09.01
申请人 Dell Products, LP 发明人 Thomas Ashley;Paranjpe Ashwin
分类号 H04L29/06;G06F21/57 主分类号 H04L29/06
代理机构 Larson Newman, LLP 代理人 Larson Newman, LLP
主权项 1. A method comprising: storing, by a first developer associated with a first protected network, a first threat, wherein the first threat is stored to a security assurance system, wherein the security assurance system includes a plurality of threats; storing, by a second developer associated with a second protected network, a second threat, wherein the second threat is stored to the security assurance system; providing a first security product to the security assurance system; selecting, by a first administrator associated with the first protected network, the first security product, wherein the first security product is associated with a second security product of the first protected network; selecting, by the first administrator, the first threat; launching on the security assurance system a first evaluation of the first security product based upon the first threat; reporting to the first administrator a first result of the first evaluation; updating the second security product in response to the first result; selecting, by a second administrator associated with the second protected network, the first security product, wherein the first security product is associated with a third security product of the second protected network; selecting, by the second administrator, the second threat, and preventing the selecting, by the second administrator, the first threat; launching on the security assurance system a second evaluation of the first security product based upon the second threat; reporting to the second administrator a second result of the second evaluation; and updating the third security product in response to the second result.
地址 Round Rock TX US