SYSTEMS AND METHODS FOR ZERO-FOOTPRINT EMAIL AND BROWSER LIFECYCLE

    公开(公告)号:US20200293649A1

    公开(公告)日:2020-09-17

    申请号:US16353261

    申请日:2019-03-14

    IPC分类号: G06F21/53 G06F21/57

    摘要: Systems and methods for zero-footprint email and browser lifecycle, dependency, and configuration management are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for implementing zero-footprint email and browser lifecycle management may include: (1) launching a restricted sandbox with no dependencies installed; (2) executing an email client or browser session with no dependencies in the restricted sandbox; (3) receiving a request for a dependency from the email client or browser; (4) halting initialization of the request; (5) validating the request; (6) retrieving an approved configuration for the dependency; (7) resuming initialization of the request; and (8) destroying contents of the restricted sandbox when the email client or browser session is complete.

    System and method for implementing a vulnerability management module

    公开(公告)号:US11799896B2

    公开(公告)日:2023-10-24

    申请号:US17537947

    申请日:2021-11-30

    IPC分类号: H04L9/40

    CPC分类号: H04L63/1433

    摘要: Various methods, apparatuses/systems, and media for implementing a vulnerability management module are provided. A receiver receives a request for dynamically scanning vulnerability of a target computing device based on testable vulnerability criteria extracted from a database. A processor dynamically executes the testable vulnerability criteria from the SCCM based on the received request; creates a static SCCM advertisement with a dynamic pre/post validation check capability based on a result of the dynamically executing the testable vulnerability criteria; reports a success or a failure of the static SCCM advertisement related to the testable vulnerability criteria to indicate whether a vulnerability exists within the target computing device; and automatically remediates the vulnerability when it is determined that the vulnerability exists within the target computing device.

    System and method for implementing a vulnerability management module

    公开(公告)号:US11218503B2

    公开(公告)日:2022-01-04

    申请号:US16517064

    申请日:2019-07-19

    IPC分类号: H04L29/06

    摘要: Various methods, apparatuses/systems, and media for implementing a vulnerability management module are provided. A receiver receives a request for dynamically scanning vulnerability of a target computing device based on testable vulnerability criteria extracted from a database. A processor dynamically executes the testable vulnerability criteria from the SCCM based on the received request; creates a static SCCM advertisement with a dynamic pre/post validation check capability based on a result of the dynamically executing the testable vulnerability criteria; reports a success or a failure of the static SCCM advertisement related to the testable vulnerability criteria to indicate whether a vulnerability exists within the target computing device; and automatically remediates the vulnerability when it is determined that the vulnerability exists within the target computing device.

    Systems and methods for zero-footprint email and browser lifecycle

    公开(公告)号:US11244042B2

    公开(公告)日:2022-02-08

    申请号:US16353261

    申请日:2019-03-14

    IPC分类号: G06F21/53 G06F21/57

    摘要: Systems and methods for zero-footprint email and browser lifecycle, dependency, and configuration management are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for implementing zero-footprint email and browser lifecycle management may include: (1) launching a restricted sandbox with no dependencies installed; (2) executing an email client or browser session with no dependencies in the restricted sandbox; (3) receiving a request for a dependency from the email client or browser; (4) halting initialization of the request; (5) validating the request; (6) retrieving an approved configuration for the dependency; (7) resuming initialization of the request; and (8) destroying contents of the restricted sandbox when the email client or browser session is complete.