A system and process for addressing computer security vulnerabilities.
The system and process generally comprise aggregating vulnerability
information on a plurality of computer vulnerabilities; constructing a
remediation database of said plurality of computer vulnerabilities;
constructing a remediation signature to address the computer
vulnerabilities; and deploying said remediation signature to a client
computer. The remediation signature essentially comprises a sequence of
actions to address a corresponding vulnerability. A managed automated
approach to the process is contemplated in which the system is capable of
selective deployment of remediation signatures; selective resolution of
vulnerabilities; scheduled deployment of remediation signatures; and
scheduled scanning of client computers for vulnerabilities.