Invention Grant
- Patent Title: Ranking security scans based on vulnerability information from third party resources
-
Application No.: US15378173Application Date: 2016-12-14
-
Publication No.: US10223535B2Publication Date: 2019-03-05
- Inventor: Elizabeth A. Holz , Hyun Kyu Seo , Ronald B. Williams
- Applicant: International Business Machines Corporation
- Applicant Address: US NY Armonk
- Assignee: International Business Machines Corporation
- Current Assignee: International Business Machines Corporation
- Current Assignee Address: US NY Armonk
- Agency: Law Office of Jim Boice
- Main IPC: G06F21/57
- IPC: G06F21/57 ; H04L29/06

Abstract:
A computer-implemented method improves a computer system's security. A description of real-time trends, for multiple computer security issues from a third party resource is associated with multiple security routines for a computer system. The multiple security routines are sorted according to the real-time trends, such that the sorting establishes an order of priority for running each of the multiple security routines based on the real-time trends. A percentage of sorted security routines to execute on the computer system is executed in their order of priority to identify one or more computer security issues for the computer system. One or more processors then execute a resolution program to resolve the one or more computer security issues that are identified for the computer system.
Public/Granted literature
- US20180165457A1 RANKING SECURITY SCANS BASED ON VULNERABILITY INFORMATION FROM THIRD PARTY RESOURCES Public/Granted day:2018-06-14
Information query