Information technology security assessment system

SW Boyer, N Venna, M Ando - US Patent 10,805,331, 2020 - Google Patents
A method and system for creating a composite security rating from security characterization
data of a third party computer system. The security characterization data is derived from …

Security risk management

PJS Gladstone, AJ Kirby, JM Truelove… - US Patent …, 2016 - Google Patents
(51) Int. Cl.(57) ABSTRACT G06F 3/048(2013.01) H04L 29/06(2006.01) Among other things,
traces are received of activities of an G06F 3/0484(2013.01) online user who is associated …

Managing the computer collection of information in an information technology environment

MK Bobak, TA McConnell… - US Patent App. 11 …, 2009 - Google Patents
(21) Appl. No.: 11/965,917 with a batch of requests executed to obtain information is
adjusted in real-time based on whether responses to the requests executed within an …

Adaptive business resiliency computer system for information technology environments

MK Bobak, CS Chang, TA McConnell… - US Patent …, 2013 - Google Patents
(57) ABSTRACT Programmatically adapting an Information Technology (IT) environment to
changes associated with business applications of the IT environment. The programmatically …

Systems and methods for remote detection of software through browser webinjects

TBM Pereira - US Patent 10,521,583, 2019 - Google Patents
7,194,769 B2 3/2007 Lippmann et al. D806. 737 S 12018 Chung et al. 7.290. 275 B2
10/2007 Baudoin et al. D809, 523 S 22018 Lipka et al. D604, 740 S 11/2009 Matheny et al …

Recovery segments for computer business applications

MK Bobak, CS Chang, TA McConnell… - US Patent …, 2012 - Google Patents
US PATENT DOCUMENTS 5,023,873. A 6, 1991 Stevenson et al.............. 371 (8.2 5,386,561
A 1/1995 Huynh et al. 5,452.452 A 9, 1995 Gaetner et al. 5,481,694 A 1/1996 Chao et …

Systems and methods for inferring entity relationships via network communications of users or user devices

D Dahlberg - US Patent 10,749,893, 2020 - Google Patents
A number of techniques facilitate generation of data points from observations about network
traffic. An inferencing system can use these data points to determine whether a relationship …

Use of redundancy groups in runtime computer management of business applications

MK Bobak, CS Chang, TA McConnell… - US Patent App. 11 …, 2009 - Google Patents
US20090172669A1 - Use of redundancy groups in runtime computer management of
business applications - Google Patents US20090172669A1 - Use of redundancy groups in …

Defining a computer recovery process that matches the scope of outage including determining a root cause and performing escalated recovery operations

MK Bobak, TA McConnell, MD Swanson - US Patent 8,826,077, 2014 - Google Patents
6,983.32 B2 1/2006 Trinonet al. 2004/O158777 A1 8, 2004 Bae et al. 6,983,362 B1 1/2006
Kidder et al. 2004/0162741 A1 8/2004 Flaxer et al. 7032, 186 B1 4/2006 Gasser et al …

Defining and using templates in configuring information technology environments

MK Bobak, TA McConnell, MD Swanson… - US Patent …, 2014 - Google Patents
Templates are provided and used in an Information Technol ogy (IT) environment. A
template represents a pattern of resources and resource relationships of the IT environment …