Abstract: An as-built network is evaluated by analyzing a model of the network by the steps of determining zones within the network, computing the access between zones, summarizing the access between zones to produce a dataset, then inputting a policy set comprising a collection of approvals, typically in the form of simple white-lists of approvals, then comparing the dataset and particularly the access between zones with the policy set of approvals (white-lists) to determine which access fall outside the approvals, and producing therefrom as an output to an end user a report of compliance and noncompliance, and then repeating the steps of determining, computing, and summarizing, and then the comparing step, after a period or after the network has changed. Thus a network operator or auditor can readily and interactively assess whether the infrastructure is in compliance with regulatory or other design requirements.
Type:
Grant
Filed:
August 7, 2009
Date of Patent:
July 2, 2013
Assignee:
Redseal Networks, Inc.
Inventors:
Michael A. Lloyd, Cary D. Jackson, Ralph T. Brenner, Jennifer Gates Durham
Abstract: A computer system method includes receiving a network topology and associated configuration data, wherein the network topology indicates a host location and a threat location, determining a vulnerability associated with the host location, determining a security exposure for the host location with respect to the threat location from the configuration data, the network topology, and to incomplete configuration data for the host location, determining a first vulnerability certainty for the host location with respect the vulnerability in response to incomplete configuration data, thereafter receiving updated network data selected from a group consisting of: updated configuration data, updated network topology, determining an updated security exposure for the host location with respect to the threat location from the updated network data, and to the incomplete configuration data, and displaying a difference between of the first security exposure and the second security exposure on the display.
Type:
Grant
Filed:
June 12, 2007
Date of Patent:
November 27, 2012
Assignee:
RedSeal Networks, Inc.
Inventors:
Alain Jules Mayer, Brian Laing, Michael Lloyd
Abstract: A method for a computer system includes receiving configuration data from a network device in a network, determining a topology for a portion of the network from the configuration data, wherein the topology indicates a server location and a threat server at a threat server location in the network, determining a vulnerability including vulnerability attributes for the first server location, and when configuration data for the first server location is incomplete, the method includes determining a security exposure of the first server location with respect to the threat server in response to the configuration data, the topology, and to the configuration data associated the host server location, determining a vulnerability certainty for the first server location with respect the vulnerability in response to the configuration data associated the host server location, and outputting a visual representation of the security exposure and the vulnerability certainty on a display.
Type:
Grant
Filed:
June 12, 2007
Date of Patent:
November 6, 2012
Assignee:
Redseal Networks, Inc.
Inventors:
Alain Jules Mayer, Brian Laing, Michael Lloyd