A method and apparatus for verifying the integrity of devices on a target network. The apparatus has security subsystems and a master security system hierarchically connected to the security subsystems via a secure link. The target network includes various intrusion detection devices, which may be part of the security subsystem. Each intrusion detection device generates a plurality of event messages when an attack on the network is detected. The security subsystem collects these event messages, correlates, and analyzes them, and performs network scanning processes. If certain events warrant additional scrutiny, they are uploaded to the master security system for review.

 
Web www.patentalert.com

< Integrated business process modeling environment and models created thereby

< Remote administration of smart cards for secure access systems

> Security keys for enhanced downstream access security for electronic file systems and drives

> Prevention of CD-audio piracy using sub-code channels

~ 00232