Safe and efficient vulnerability management system

A vulnerability management and efficient technology, applied in the field of safe and efficient vulnerability management system, can solve problems such as inconsistency of various security detection methods, lack of quantitative means in management process, difficulty in repairing vulnerabilities, etc., and achieve the effect of speeding up repair efficiency

Pending Publication Date: 2020-05-26
CSG EHV POWER TRANSMISSION +1
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the deficiencies of the existing technology, the present invention provides a safe and efficient vulnerability management system, which solves the problems raised in the above-mentioned background technology: 1. The response of vulnerability events is slow; 2. The management process lacks quantification means; 3. The vulnerability repair is difficult; 4. , Various security detection methods cannot be unified, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe and efficient vulnerability management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention.

[0021] In the description of the present invention, unless otherwise stated, the meaning of "plurality" is two or more; the terms "upper", "lower", "left", "right", "inner", "outer" , "front end", "rear end", "head", "tail", etc. indicate the orientation or positional relationship based on the orientation or positional relationship shown in the drawings, and are only for the convenience of describing the present invention and simplifying the description, rather than Nothing indicating or implying that a referenced device or element must have a particular orientation, be constructed, and operate in a particular orientation should therefore not be construed as limiting ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security and high-efficiency vulnerability management system, and relates to the technical field of vulnerability management,, in particular to a security and high-efficiencyvulnerability management system, a threat intelligence system and an internet intelligence intelligent collection system based on big data architecture, which are mainly used for uniformly integrating intelligence searched by company self-research, friend-merchant sharing, industry sharing and the internet, and sharing related intelligence to a third-party system or product according to industrycharacteristics. Te local threat and vulnerability management platform is mainly used for realizing Internet asset auditing, scanning engine centralized management and vulnerability management supportfunctions. According to the safe and efficient vulnerability management system, except for collecting and analyzing the risk data of the scanning missing product, other risk data can be imported forunified analysis, and the management capacity of quick response, ordered repair and continuous optimization is provided for the customer vulnerability management process in combination with local riskcontinuous monitoring and vulnerability management full-process management and control capacity.

Description

technical field [0001] The invention relates to the technical field of vulnerability management, in particular to a safe and efficient vulnerability management system. Background technique [0002] Vulnerability management in various industries has been carried out for many years. In risk management, vulnerability management can prevent problems before they happen. It is the management link with the highest investment and effect ratio. It has been fully understood and extensively built and practiced by various industries. However, with the development of offensive and defensive technologies, traditional security technologies and management processes are beginning to face more and more challenges. [0003] From an external point of view, in the past two years, vulnerabilities have become one of the hot topics in the current IT field. First of all, the speed of vulnerability propagation is accelerated. With the help of major communities and social platforms, vulnerabilities ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 靳晓琪张烜钱方冯子焰
Owner CSG EHV POWER TRANSMISSION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products