CPC H04L 63/205 (2013.01) [G06Q 10/0635 (2013.01); G06Q 10/10 (2013.01); H04L 43/065 (2013.01)] | 20 Claims |
1. A computer-implemented method for improving endpoint security, the computer-implemented method comprising:
requesting security capabilities from one or more endpoints;
analyzing a difference between the security capabilities;
negotiating a security capability supported by the one or more endpoints;
determining if the negotiating succeeded;
responsive to the negotiating succeeding, dynamically changing a security level between the one or more endpoints to a higher security level based on at least one of endpoint hardware or endpoint firmware capabilities;
responsive to the negotiating not succeeding, creating a report describing capabilities associated with the one or more endpoints and suggesting changes for at least one of the one or more endpoints and sending the report to predetermined interested personnel.
|