-
公开(公告)号:US20220245258A1
公开(公告)日:2022-08-04
申请号:US17237381
申请日:2021-04-22
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Suhas SHIVANNA
IPC: G06F21/57
Abstract: Aspects of vulnerability scanning are disclosed. In one example, configuration and context information of a first device for which vulnerability scanning is to be performed is obtained. The configuration information includes telemetry data of the first device. A second device is provisioned based on the configuration information to create a cloned first device. The vulnerability scanning is performed on the cloned first device based on the context information to obtain a scan report.
-
公开(公告)号:US20220321568A1
公开(公告)日:2022-10-06
申请号:US17464877
申请日:2021-09-02
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Suhas SHIVANNA
Abstract: Examples disclosed herein relate to systems and methods for generating and implementing a security profile. Disclosed methods may include the steps of generating a customer intent interface configured to receive input comprising a value associated with an intent parameter; receiving, via the customer intent interface, security intent information comprising the value and the intent parameter; generating a configuration file based on the security intent information; based on the configuration file, generating a security profile for a target device; and generating, by code generator framework, one or more scripts based on the security profile.
-
3.
公开(公告)号:US20190236271A1
公开(公告)日:2019-08-01
申请号:US15883519
申请日:2018-01-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Suhas SHIVANNA
Abstract: Examples disclosed herein relate to performing a security action based on a comparison of digital signatures. An intrusion detection mode is initiated by a baseboard management controller. A first digital signature of hardware devices is calculated during the activation of the intrusion detection mode. The first digital signature is stored. Upon detection of a trigger, a second digital signature is calculated for the current hardware devices. The digital signatures are compared. A security action is performed based on the comparison.
-
公开(公告)号:US20210400076A1
公开(公告)日:2021-12-23
申请号:US17226173
申请日:2021-04-09
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Suhas SHIVANNA , Narsimha Nikhil Raj PADAL , Nalamati SAI RAJESH
Abstract: Systems and methods are provided for implementing an adaptive machine learning platform for security penetration and risk assessment. For example, the system can receive publicly-available information associated with a client computer system, process the information to identify an input feature, and implement a machine learning model to identify the corresponding risk associated with the input feature . The system can recommend a penetration test for discovered weaknesses associated with the input feature and help make changes to the client computer system to improve security and reduce risk overall.
-
公开(公告)号:US20180096154A1
公开(公告)日:2018-04-05
申请号:US15715020
申请日:2017-09-25
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Suhas SHIVANNA , Patrick L GIBBONS , Shiva R DASARI , Luis E LUCIANI, JR. , Kevin G DEPEW
IPC: G06F21/57
CPC classification number: G06F21/577 , G06F21/572 , G06F21/575 , G06F2221/034
Abstract: An example computing system in accordance with an aspect of the present disclosure includes a first controller and a second controller. The first controller is to verify integrity of a first root of trust (ROT), and generate an integrity signal indicating the results. The second controller is to verify integrity of a second ROT, write the firmware image to the first controller, and verify integrity of the written firmware image.
-
-
-
-