MANAGING SECURITY ACTIONS IN A COMPUTING ENVIRONMENT BASED ON INFORMATION GATHERING ACTIVITY OF A SECURITY THREAT

    公开(公告)号:US20210250373A1

    公开(公告)日:2021-08-12

    申请号:US17242165

    申请日:2021-04-27

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.

    USER ROLE-BASED INTERFACE LAYOUT PROFILES IN AN INFORMATION TECHNOLOGY (IT) AND SECURITY OPERATIONS APPLICATION

    公开(公告)号:US20210326032A1

    公开(公告)日:2021-10-21

    申请号:US17358777

    申请日:2021-06-25

    Applicant: Splunk Inc.

    Abstract: An information technology (IT) and security operations application is described that stores data reflecting customizations that users make to GUIs displaying information about various types of incidents, and further uses such data to generate “popular” interface profiles indicating popular GUI modifications. The analysis of the GUI customizations data is performed using data associated with multiple tenants of the IT and security operations application to develop profiles that may represent a general consensus on a collection and arrangement of interface elements that enable analysts to efficiently respond to certain types of incidents. Users of the IT and security operations application can then optionally apply these popular interface profiles to various GUIs during their use of the application. Among other benefits, the ability to generate and provide popular interface profiles can help analysts and other users more efficiently investigate and respond to a wide variety of incidents within IT environments, thereby improving the operation and security of those environments.

    EXTENSION FRAMEWORK FOR AN INFORMATION TECHNOLOGY AND SECURITY OPERATIONS APPLICATION

    公开(公告)号:US20220247784A1

    公开(公告)日:2022-08-04

    申请号:US17163318

    申请日:2021-01-29

    Applicant: Splunk Inc.

    Abstract: Techniques are described for providing an extension framework for an IT and security operations application. The described extension framework allows various types of users to extend the user interfaces, data content, and functionality of an IT and security operations application to enhance and enrich users' workflow and investigative experiences. Example types of extensions enabled by the extension framework include modifying or supplementing GUI elements and other components, where users can implement these extensions at pre-defined extension points of the IT and security operations application. The extension framework further includes a data integration system that provides users with mechanisms to integrate data from external applications, services, or other data sources into their plugins.

    TRANSLATING SECURITY ACTIONS INTO COMPUTING ASSET-SPECIFIC ACTION PROCEDURES

    公开(公告)号:US20210258340A1

    公开(公告)日:2021-08-19

    申请号:US17306703

    申请日:2021-05-03

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of implementing security actions for a computing environment comprising a plurality of computing assets includes identifying a security action in a command language for the computing environment. The method further provides identifying one or more computing assets related to the security action, and obtaining hardware and software characteristics for the one or more computing assets. The method also includes translating the security action in the command language to one or more action procedures based on the hardware and software characteristics, and initiating implementation of the one or more action procedures in the one or more computing assets.

    INCIDENT RESPONSE AUTOMATION ENGINE
    6.
    发明申请

    公开(公告)号:US20190007448A1

    公开(公告)日:2019-01-03

    申请号:US16107972

    申请日:2018-08-21

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of implementing security actions for a computing environment comprising a plurality of computing assets includes identifying a security action in a command language for the computing environment. The method further provides identifying one or more computing assets related to the security action, and obtaining hardware and software characteristics for the one or more computing assets. The method also includes translating the security action in the command language to one or more action procedures based on the hardware and software characteristics, and initiating implementation of the one or more action procedures in the one or more computing assets.

    IDENTIFYING SECURITY ACTIONS FOR RESPONDING TO SECURITY THREATS BASED ON THREAT STATE INFORMATION

    公开(公告)号:US20200287930A1

    公开(公告)日:2020-09-10

    申请号:US16736120

    申请日:2020-01-07

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.

    MANAGING SECURITY ACTIONS IN A COMPUTING ENVIRONMENT BASED ON COMMUNICATION ACTIVITY OF A SECURITY THREAT

    公开(公告)号:US20190020677A1

    公开(公告)日:2019-01-17

    申请号:US16107979

    申请日:2018-08-21

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.

    INCIDENT RESPONSE AUTOMATION ENGINE
    10.
    发明申请

    公开(公告)号:US20190014144A1

    公开(公告)日:2019-01-10

    申请号:US16107975

    申请日:2018-08-21

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of implementing security actions for a computing environment comprising a plurality of computing assets includes identifying a security action in a command language for the computing environment. The method further provides identifying one or more computing assets related to the security action, and obtaining hardware and software characteristics for the one or more computing assets. The method also includes translating the security action in the command language to one or more action procedures based on the hardware and software characteristics, and initiating implementation of the one or more action procedures in the one or more computing assets.

Patent Agency Ranking