Docoh
Loading...

TENB Tenable

APP
Utility
Mapping a Vulnerability to a Stage of an Attack Chain Taxonomy
25 Nov 21
In an embodiment, a semantic model and a semantic model training method that obtains a textual description of one or more features associated with a first vulnerability that has been used in one or more attacks.
Aditya KUPPA, Lamine AOUAD, Thomas PARSONS
Filed: 21 May 20
APP
Utility
System and Method for Strategic Anti-malware Monitoring
4 Nov 21
The system and method described herein may leverage active network scanning and passive network monitoring to provide strategic anti-malware monitoring in a network.
Marcus J. RANUM, Ron GULA
Filed: 2 Jul 21
APP
Utility
Elastic Asset-based Licensing Model for Use In a Vulnerability Management System
19 Aug 21
The disclosure generally relates to a vulnerability management system configured to implement an asset-based identification algorithm to identify, update, and otherwise reconcile assets in a network according to various identification attributes that are ordered on a spectrum from authoritative to speculative based on an ability that each identification attribute has to accurately link a host to a given asset.
Philippe J. MOORE, Matthew NEHRBASS, Daniel KAHAN
Filed: 16 Apr 21
APP
Utility
Detecting Untracked Software Components on an Asset
22 Jul 21
In an embodiment, an asset may utilize one or more scanning techniques to detect a first set of software components that is not being natively tracked by an operating system of the asset, the one or more scanning techniques comprising one or more of an evaluation of metadata associated with one or more running processes of the asset, and an evaluation of file system information that characterizes the first set of software components.
Tony HUFFMAN, Nicholas MILES
Filed: 22 Jan 20
APP
Utility
Interactive Web Application Scanning
8 Jul 21
Techniques, methods and/or apparatuses are disclosed that enable facilitation of remediation of one or more vulnerabilities detected in a web application.
Fergus Cooney, Greg Kuruc
Filed: 20 Feb 20
GRANT
Utility
System and method for strategic anti-malware monitoring
6 Jul 21
The system and method described herein may leverage active network scanning and passive network monitoring to provide strategic anti-malware monitoring in a network.
Marcus J. Ranum, Ron Gula
Filed: 21 Jan 20
GRANT
Utility
Elastic asset-based licensing model for use in a vulnerability management system
11 May 21
The disclosure generally relates to a vulnerability management system configured to implement an asset-based identification algorithm to identify, update, and otherwise reconcile assets in a network according to various identification attributes that are ordered on a spectrum from authoritative to speculative based on an ability that each identification attribute has to accurately link a host to a given asset.
Philippe J. Moore, Matthew Nehrbass, Daniel Kahan
Filed: 8 May 18
APP
Utility
Managing Supersedence of Solutions for Security Issues Among Assets of an Enterprise Network
18 Nov 20
In an embodiment, a security auditing component obtains a solution set that is based upon a security audit of an enterprise network, the solution set characterizing a set of solutions associated with a set of security issues associated with one or more assets of the enterprise network, detects that the solution set can be condensed into a condensed solution set that mitigates the set of security issues to the same degree as the solution set, the detection being based at least in part upon (i) one or more rules applied to one or more solution texts and/or (ii) asset-specific metadata and/or (iii) static metadata, and condenses, based on the detecting, the solution set into the condensed solution set by combining two or more subsets of related solutions and/or filtering the solution set to remove one or more subsets of redundant or superseded solutions.
Katherine Alice SEXTON, Nicholas MILES, Nicholas POUVESLE, Renaud DERAISON, Clint MERRILL, John WALKER, Charles Joseph BACON
Filed: 13 May 20
GRANT
Utility
System and method for strategic anti-malware monitoring
28 Sep 20
The system and method described herein may leverage active network scanning and passive network monitoring to provide strategic anti-malware monitoring in a network.
Marcus J. Ranum, Ron Gula
Filed: 26 Nov 18
APP
Utility
Threat Score Prediction Model
1 Jul 20
In an embodiment, a threat score prediction model is generated for assigning a threat score to a software vulnerability.
Bryan Peter DOYLE, Vincent GILCREEST, Wei TAI, Damien McPARLAND, Renaud DERAISON
Filed: 27 Dec 18
APP
Utility
System and Method for Strategic Anti-malware Monitoring
20 May 20
The system and method described herein may leverage active network scanning and passive network monitoring to provide strategic anti-malware monitoring in a network.
Marcus J. RANUM, Ron GULA
Filed: 20 Jan 20
APP
Utility
Rule-based Assignment of Criticality Scores to Assets and Generation of a Criticality Rules Table
29 Apr 20
In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party.
Barry SHERIDAN, Vincent GILCREEST, Anthony BETTINI, Matthew Ray EVERSON, Wei TAI, Renaud DERAISON
Filed: 25 Oct 18
GRANT
Utility
Reconstructing user-level information from intercepted communication-protocol primitives
2 Mar 20
A method includes holding multiple primitives of a communication protocol, which is used for managing a controller that controls one or more field devices in an industrial control network.
Dan Shmidt
Filed: 16 Jan 16
GRANT
Utility
System and method for strategic anti-malware monitoring
2 Mar 20
The system and method described herein may leverage active network scanning and passive network monitoring to provide strategic anti-malware monitoring in a network.
Marcus J. Ranum, Ron Gula
Filed: 26 Nov 18
GRANT
Utility
System and method for facilitating data leakage and/or propagation tracking
14 Oct 19
In some embodiments, a set of hashes that are associated with files of a user system, and a reference set of hashes that are associated with files of a reference system, may be obtained.
Ron Gula, Marcus Ranum
Filed: 27 Sep 17
  • 1
Patents are sorted by USPTO publication date, most recent first