Onboarding access to remote security control tools
Abstract:
Disclosed below are representative embodiments of methods, apparatus, and systems for managing one or more cybersecurity tools that are deployed to help protect electronic assets in an IT infrastructure—including, for example, one or more security configuration management tools, vulnerability management tools, event logging tools, or other IT infrastructure security or monitoring tools that are used to monitor, secure, and/or control assets in an IT infrastructure. In one example, a request to install local software for access to a remote security control service is received from a remote user at a remote device; and data for installing the local software is transmitted to the remote user. In certain implementations, the data for installing the local software further includes a public cryptographic certificate.
Information query
Patent Agency Ranking
0/0