发明授权
US08955038B2 Methods and systems for controlling access to computing resources based on known security vulnerabilities 有权
基于已知安全漏洞控制对计算资源的访问的方法和系统

Methods and systems for controlling access to computing resources based on known security vulnerabilities
摘要:
Methods and systems are provided for fine tuning access control by remote, endpoint systems to host systems. Multiple conditions/states of one or both of the endpoint and host systems are monitored, collected and fed to an analysis engine. Using one or more of many different flexible, adaptable models and algorithms, an analysis engine analyzes the status of the conditions and makes decisions in accordance with pre-established policies and rules regarding the security of the endpoint and host system. Based upon the conditions, the policies, and the analytical results, actions are initiated regarding security and access matters. In one described embodiment of the invention, the monitored conditions include software vulnerabilities.
信息查询
0/0