Patents Assigned to EADS NA Defense Security and Systems Solutions Inc
  • Patent number: 8532970
    Abstract: Systems and methods for monitoring and analyzing components and operation of a simulated network environment including a module configured for storing a predetermined baseline for the simulated network environment, monitoring the simulated network environment during one or more operations, analyzing the monitored operations and the impact of the operations on one or more components of the simulated network environment, and comparing at least one of the monitored operations and impacts of the operations against the predetermined baseline.
    Type: Grant
    Filed: June 19, 2009
    Date of Patent: September 10, 2013
    Assignee: EADS NA Defense Security and Systems Solutions, Inc.
    Inventors: Christopher Dyson White, Chester Randolph Ratcliffe, III, John Christian Espinosa, Joel Alan Vickery, Aaron Randal Moate, Ronald David Parker, Jr., Marc Anthony Crawford
  • Publication number: 20100058114
    Abstract: A system or method for automated management of compliance of a target asset to a predetermined requirement including receiving a predetermined requirement for compliance testing of one of a plurality of assets, comparing the received predetermined requirement to one or more stored compliance requirements to identify whether one or more stored compliance requirements corresponds to the received predetermined requirement, selecting a target asset from among the plurality of assets, transmitting the new compliance requirement, receiving results responsive to the transmitted new compliance requirement, and validating the received results to determine compliance of the target asset with the predetermined requirement as identified in the received results.
    Type: Application
    Filed: August 31, 2009
    Publication date: March 4, 2010
    Applicant: EADS NA Defense Security and Systems Solutions, Inc.
    Inventors: Richard A. Perkins, Larry Galvin
  • Publication number: 20090319249
    Abstract: Systems and methods for monitoring and analyzing components and operation of a simulated network environment including a module configured for storing a predetermined baseline for the simulated network environment, monitoring the simulated network environment during one or more operations, analyzing the monitored operations and the impact of the operations on one or more components of the simulated network environment, and comparing at least one of the monitored operations and impacts of the operations against the predetermined baseline.
    Type: Application
    Filed: June 19, 2009
    Publication date: December 24, 2009
    Applicant: EADS NA Defense Security and Systems Solutions Inc.
    Inventors: Christopher Dyson White, Chester Randolph Ratcliffe, III, John Christian Espinosa, Joel Alan Vickery, Aaron Randal Moate, Ronald David Parker, JR., Marc Anthony Crawford
  • Publication number: 20090319247
    Abstract: Methods and Systems for simulating a network environment includes simulating network components and network architecture of a user network, simulating real-world network traffic on the simulated user network, simulating network events within the simulated real-world traffic on the simulated user network, monitoring the simulated network, the simulated traffic including the simulated network events, and receiving input from a user, such inputs manually controlling/managing the simulated network components of the simulated user network responsive to the monitoring.
    Type: Application
    Filed: June 18, 2009
    Publication date: December 24, 2009
    Applicant: EADS NA Defense Security and Systems Solutions Inc
    Inventors: Chester Randolph Ratcliffe, III, Christopher Dyson White, Stephanie Dianne Harwell, John Christian Espinosa
  • Publication number: 20090320137
    Abstract: Systems and methods for generating a network attack within a simulated network environment including a module configured for creating one or more attack events against network devices within the simulated network environment wherein the attack events include exploitations of published and unpublished vulnerabilities and failures of hardware and software network systems, devices, or applications within the simulated network environment and for executing the created attack event on the simulated network environment and having an interface configured for receiving metadata regarding each attack event and adding the received attack event metadata to each associated attack event.
    Type: Application
    Filed: June 18, 2009
    Publication date: December 24, 2009
    Applicant: EADS NA Defense Security and Systems Solutions Inc.
    Inventors: Christopher Dyson White, Chester Randolph Ratcliffe, III, John Christian Espinosa, Joel Alan Vickery, Aaron Randal Moate, Ronald David Parker, JR., Marc Anthony Crawford
  • Publication number: 20090319906
    Abstract: Systems and methods for automatically restoring any network device in a simulated network environment to a predefined configuration including module is configured for creating one or more network device images for one or more network devices within a user's operating network environment, creating an image set utilizing one or more of the created network device images, and initiating the restoring of the network devices within the simulated network environment utilizing at least one of the created network device images and image sets.
    Type: Application
    Filed: June 18, 2009
    Publication date: December 24, 2009
    Applicant: EADS NA Defense Security and Systems Solutions Inc
    Inventors: Christopher Dyson White, Chester Randolph Ratcliffe, III, John Christian Espinosa, Joel Alan Vickery, Aaron Randal Moate, Ronald David Parker, JR., Marc Anthony Crawford
  • Publication number: 20090319647
    Abstract: Systems and methods for a system for automatically building a simulated network environment creating device profiles with device level metadata, segment profiles that utilize one or more of the created device profiles and that includes segment metadata, and a network environment profile that is created from segment profiles and that includes network environment metadata and a hierarchy based on dependencies with other segments within the network environment profile.
    Type: Application
    Filed: June 18, 2009
    Publication date: December 24, 2009
    Applicant: EADS NA Defense Security and Systems Solutions Inc.
    Inventors: Christopher Dyson White, Chester Randolph Ratcliffe, III, John Christian Espinosa, Joel Alan Vickery, Aaron Randal Moate, Ronald David Parker, Marc Anthony Crawford