Abstract: Among other things, information is obtained by computer about Internet-related assets of organizations. The information is used to identify relationships between the organizations with respect to the assets. The information about the identified relationships is made available for display or analysis or both.
Type:
Grant
Filed:
February 16, 2016
Date of Patent:
November 23, 2021
Assignee:
BitSight Technologies, Inc.
Inventors:
Nagarjuna Venna, David Feinzeig, Amy Eastment, Daniel Dahlberg, Stephen Boyer, Philip John Steuart Gladstone, Mathew Cherian
Abstract: Among other things, information is obtained by computer about Internet-related assets of organizations. The information is used to identify relationships between the organizations with respect to the assets. The information about the identified relationships is made available for display or analysis or both.
Type:
Grant
Filed:
April 1, 2016
Date of Patent:
January 8, 2019
Assignee:
BitSight Technologies, Inc.
Inventors:
Nagarjuna Venna, David Feinzeig, Amy Eastment, Daniel Dahlberg, Stephen Boyer, Philip John Steuart Gladstone, Mathew Cherian
Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.
Type:
Application
Filed:
September 22, 2011
Publication date:
July 14, 2016
Applicant:
BITSIGHT TECHNOLOGIES, INC.
Inventors:
Stephen Wayne Boyer, Nagarjuna Venna, Megumi Ando
Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.
Type:
Grant
Filed:
October 13, 2020
Date of Patent:
October 3, 2023
Assignee:
BitSight Technologies, Inc.
Inventors:
Stephen Wayne Boyer, Nagarjuna Venna, Megumi Ando
Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.
Type:
Grant
Filed:
September 5, 2023
Date of Patent:
January 23, 2024
Assignee:
BitSight Technologies, Inc.
Inventors:
Stephen Wayne Boyer, Nagarjuna Venna, Megumi Ando
Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.
Type:
Grant
Filed:
November 18, 2015
Date of Patent:
May 15, 2018
Assignee:
BitSight Technologies, Inc.
Inventors:
Stephen Boyer, Nagarjuna Venna, Megumi Ando
Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.
Type:
Grant
Filed:
September 22, 2011
Date of Patent:
October 13, 2020
Assignee:
BitSight Technologies, Inc.
Inventors:
Stephen Wayne Boyer, Nagarjuna Venna, Megumi Ando
Abstract: A number of techniques facilitate generation of data points from observations about network traffic. An inferencing system can use these data points to determine whether a relationship exists between two entities or whether an existing relationship has terminated, without any external knowledge of the existence of or termination of such a relationship.
Abstract: The invention relates to object storage and methods systems for storing data objects that overcome the pitfalls of using traditional object storage systems. Advantages include an easily searchable database and multiversion concurrency control meaning one version of the database may be read from and written to at the same time.
Abstract: A number of techniques facilitate generation of data points from observations about network traffic. An inferencing system can use these data points to determine whether a relationship exists between two entities or whether an existing relationship has terminated, without any external knowledge of the existence of or termination of such a relationship.
Abstract: Among other things, customer account data is received from a service provider. The customer account data is representative of relationships that exist at successive times between digital assets provided by the service provider and respective entities to whom the digital assets are provided by the service provider. The received data is used to update a database to represent mappings of digital assets to respective entities to whom the digital assets are provided at one of the successive times, changes in the mappings between successive times, or both.
Abstract: A system for discovering digital assets and determining an association between the assets and an entity analyzes publicly available information about entities of interest and dataset(s) generated via network observations from devices using the digital assets. Additional attributes included in the network observations dataset(s) and metadata from such observations may be used to enhance the correctness of the identified entity-asset associations. Network observations dataset(s) may be monitored on an on-going basis to provide current entity-asset associations.