TRIPWIRE, INC. Patent applications |
Patent application number | Title | Published |
20140096181 | EVENT INTEGRATION FRAMEWORKS - Disclosed herein are representative embodiments of methods, apparatus, and systems for processing and managing information from a compliance and configuration control (“CCC”) tool and generating information for a security information and event management (“SIEM”) tool based on the information from the CCC tool. For example, in one exemplary embodiment, information from a CCC tool is transferred to a SIEM tool or logging tool by receiving the information from the CCC tool in a format that is not recognized by the SIEM tool or logging tool, and generating an output message in a message format that is recognized by the SIEM tool or logging tool. In particular embodiments, the message format is a customizable message format that is adaptable to multiple different SIEM tools or logging tools. In further embodiments, the data transferred to the SIEM tool comprises data indicative of compliance policy changes. | 04-03-2014 |
20140082620 | SYSTEMS AND METHODS FOR TRIGGERING SCRIPTS BASED UPON AN ALERT WITHIN A VIRTUAL INFRASTRUCTURE - Embodiments of the present disclosure provide methods and systems for triggering scripts based upon an alert within a virtual infrastructure. Other embodiments may be described and claimed. | 03-20-2014 |
20140053145 | OPERATING SYSTEM PATCHING AND SOFTWARE UPDATE RECONCILIATION - Apparatus and methods are disclosed for implementing software reconciliation frameworks to process changes detected to software installed on computer hosts. According to one embodiment, a method includes receiving change data describing changes to one or more software components stored on a computer-readable storage device, determining installed software on a computer associated with the computer-readable storage device, receiving a manifest comprising a description of file changes associated with a software patch or update for the installed software, and comparing the change data to the manifest. Based on the comparing, if the change data matches the manifest, the changes are promoted, and if the change data does not match the manifest, the changes are marked for further analysis. | 02-20-2014 |
20130073893 | METHODS AND APPARATUS FOR REMEDIATION WORKFLOW - Disclosed herein are methods, systems, and articles associated with remediation workflow. A method may include determining one or more test failures related to a policy test within a computer network, and reviewing the one or more test failures. The method may further include, based upon a result of the reviewing, creating a remediation work order that includes at least one of the one or more test failures. Each test failure within the remediation work order may be approved or denied. For each test failure that is approved for remediation, a remediation process may be executed. | 03-21-2013 |
20130073892 | METHODS AND APPARATUS FOR REMEDIATION EXECUTION - Disclosed herein are methods, systems, and articles associated with remediation execution. In embodiments, a set of policy test failures may be selected for remediation. The set of policy test failures may be associated with a computer network with a number of nodes. For each failure within the set of policy test failures, a remediation script may be obtained to remediate a corresponding policy test failure. The remediation scripts may be selectively provided to nodes that are affected by policy test failures, for execution by the nodes. A remediation script result for each remediation script executed may be received. Based upon the remediation script results, it may be determined whether or not execution of the remediation scripts was successful. | 03-21-2013 |
20130073715 | METHODS AND APPARATUS FOR REMEDIATING POLICY TEST FAILURES, INCLUDING CORRELATING CHANGES TO REMEDIATION PROCESSES - Disclosed herein are methods, systems, and articles associated with correlating detected changes within a computer network with remediation processes performed in response to policy test failures. In embodiments, on determination that a failure of a policy test has occurred within a computer network having a number of nodes, a remediation process may be executed to remediate the failure. Change at a node may be detected. Further, the detected change may be correlated with the execution of the remediation process, and the correlation may be identified. | 03-21-2013 |
20130073704 | METHODS AND APPARATUS FOR REMEDIATING POLICY TEST FAILURES, INCLUDING PROMOTING CHANGES FOR COMPLIANCE REVIEW - Disclosed herein are methods, systems, and articles for promoting changes that result from remediation performed within a computer network, for compliance review. Policy tests may be provided within the computer network, which comprises a number of nodes. The policy tests may relate to configuration parameters and compliance requirements for various nodes within the computer network. At least one pattern relating to nodes within the computer network that may be affected by execution of a remediation script is determined. Nodes within the computer network may be identified, based at least in part on the at least one pattern. Subsequent to execution of the remediation script, a list of nodes whose state has changed may be promoted for compliance review. | 03-21-2013 |
20130054601 | MANAGING AND CLASSIFYING ASSETS IN AN INFORMATION TECHNOLOGY ENVIRONMENT USING TAGS - Disclosed below are representative embodiments of methods, apparatus, and systems for managing and classifying assets in an information technology (“IT”) environment using a tag-based approach. The disclosed tag-based classification techniques can be implemented through a graphical user interface. Embodiments of the disclosed tag-based classification techniques can be used to allow a user to easily and quickly select and perform actions on groups of one or more assets (e.g., monitor policies, perform upgrades, etc.). For example, the tag-based classification techniques can automatically classify assets into “tag sets” (or “tagged sets”) based on node properties or user-selected criteria or conditions (e.g., criteria or conditions that are established in a user-created tagging profile or rule). The tagged assets can then be further filtered to identify even deeper relationships between the assets. | 02-28-2013 |
20120023076 | AUTOMATED CHANGE APPROVAL - An automated method for facilitating management of a data processing environment is disclosed. In various embodiments, the method may include facilitating creation of a first memorialization, in digital form, of first one or more changes made to a first data processing device of the data processing environment. In various embodiments, the method may further include facilitating creation of a second and a third memorialization, both in digital form, of second and third one or more changes made to a second and a third data processing device of the data processing environment, respectively. In various embodiments, the method may still further include facilitating automated approval of the second and third changes made to the second and third data processing devices, using the first, second and third memorializations. Other embodiments of the present invention may include, but are not limited to, apparatus adapted to facilitate practice of the above-described method. | 01-26-2012 |
20110197205 | SYSTEMS AND METHODS FOR MONITORING AND ALERTING EVENTS THAT VIRTUAL MACHINE SOFTWARE PRODUCES IN A VIRTUAL INFRASTRUCTURE - Embodiments of the present disclosure provide methods and systems for generating an alert based upon detection of a pattern of events within a virtual infrastructure. Other embodiments may be described and claimed. | 08-11-2011 |
20110197189 | SYSTEMS AND METHODS FOR TRIGGERING SCRIPTS BASED UPON AN ALERT WITHIN A VIRTUAL INFRASTRUCTURE - Embodiments of the present disclosure provide methods and systems for triggering scripts based upon an alert within a virtual infrastructure. Other embodiments may be described and claimed. | 08-11-2011 |
20110197094 | SYSTEMS AND METHODS FOR VISUAL CORRELATION OF LOG EVENTS, CONFIGURATION CHANGES AND CONDITIONS PRODUCING ALERTS IN A VIRTUAL - Embodiments of the present disclosure provide methods and systems for detecting and correlating log events, configuration changes and conditions producing alerts within a virtual infrastructure. Other embodiments may be described and claimed. | 08-11-2011 |
20110138039 | SCORING AND INTERPRETING CHANGE DATA THROUGH INFERENCE BY CORRELATING WITH CHANGE CATALOGS - Methods, systems, and articles for receiving, by a monitor server, change data associated with a change captured on a target host, are described herein. In various embodiments, the target host may have provided the change data in response to detecting the change, and the change data may include one or more rules, settings, and/or parameters. Further, in some embodiments, the monitor server may then group the change data into clusters and may correlate the clusters with a change catalog in order to provide a possible reason or cause for the cluster of changes. Once the change data have been classified as clusters, a report may be generated providing classification or categorization and cluster information for the various changes. In various embodiments, the generating may comprise generating a report to the target host and/or to an administrative user. | 06-09-2011 |
20110138038 | INTERPRETING CATEGORIZED CHANGE INFORMATION IN ORDER TO BUILD AND MAINTAIN CHANGE CATALOGS - Methods, systems, and articles for receiving, by a monitor server, change data associated with a change captured on a target host, are described herein. In various embodiments, the target host may have provided the change data in response to detecting the change, and the change data may include one or more rules, settings, and/or parameters. Further, in some embodiments, the monitor server may then group the change data into clusters and may correlate the clusters with a change catalog in order to provide a possible reason or cause for the cluster of changes. Once the change data have been classified as clusters, a report may be generated providing classification or categorization and cluster information for the various changes. In various embodiments, the generating may comprise generating a report to the target host and/or to an administrative user. In various embodiments, a reason may be determined for causing a cluster of changes and the change catalog may updated with the reason. | 06-09-2011 |
20110137905 | USE OF INFERENCE TECHNIQUES TO FACILITATE CATEGORIZATION OF SYSTEM CHANGE INFORMATION - Methods, systems, and articles for receiving, by a monitor server, change data associated with a change captured on a target host, are described herein. In various embodiments, the target host may have provided the change data in response to detecting the change, and the change data may include one or more rules, settings, and/or parameters. Further, in some embodiments, the monitor server may analyze the change data in order to group the change data into clusters. Once the change data have been classified as clusters, a report may be generated providing classification or categorization and cluster information for the various changes. In various embodiments, the generating may comprise generating a report to the target host and/or to an administrative user. | 06-09-2011 |
20100005107 | METHOD AND APPARATUS FOR CONTINUOUS COMPLIANCE ASSESSMENT - Methods, systems, and articles for receiving, by a compliance server, change data associated with a change captured on a target host, are described herein. In various embodiments, the target host may have provided the change data in response to detecting the change, and the change data may include one or more rules, settings, and/or parameters. Also, in various embodiments, the compliance server may determine whether the one or more rules, settings, and/or parameters meet one or more compliance policies and generate one or more test results based at least on the results of the determining. Further, in some embodiments, the target host may detect a change to a rule, setting, and/or parameter based on a collection policy defining what change data is to be collected by the target host and provide data associated with the rule, setting, and/or parameter as change data to the compliance server. | 01-07-2010 |