Recommended security action feature sets

    公开(公告)号:US10320845B2

    公开(公告)日:2019-06-11

    申请号:US15206632

    申请日:2016-07-11

    Applicant: SPLUNK INC.

    Abstract: Systems, methods, and software described herein provide for identifying recommended feature sets for new security applications. In one example, a method of providing recommended feature sets for a new security application includes identifying a request for the new security application, and determining a classification for the new security application. The method further provides identifying related applications to the new security application based on the classification, and identifying a feature set for the new security application based on features provided in the related applications.

    Selecting actions responsive to computing environment incidents based on action impact information

    公开(公告)号:US10986120B2

    公开(公告)日:2021-04-20

    申请号:US16568949

    申请日:2019-09-12

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein provide enhancements for implementing security actions in a computing environment. In one example, a method of operating an advisement system to provide actions in a computing environment includes identifying a security incident in the computing environment, identifying a criticality rating for the asset, and obtaining enrichment information for the security incident from one or more internal or external sources. The method also provides identifying a severity rating for the security incident based on the enrichment information, and determining one or more security actions based on the enrichment information. The method further includes identifying effects of the one or more security actions on operations of the computing environment based on the criticality rating and the severity rating, and identifying a subset of the one or more security actions to respond to the security incident based on the effects.

    IDENTIFYING SECURITY ACTIONS BASED ON COMPUTING ASSET RELATIONSHIP DATA

    公开(公告)号:US20200259858A1

    公开(公告)日:2020-08-13

    申请号:US16863557

    申请日:2020-04-30

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein provide for identifying and implementing security actions within a computing environment. In one example, a method of operating an advisement system to provide security actions in a computing environment includes identifying communication interactions between a plurality of computing assets and, after identifying the communication interactions, identifying a security incident in a first computing asset. The method further provides identifying at least one related computing asset to the first asset based on the communication interactions, and determining the security actions to be taken in the first computing asset and the related computing asset.

    Incident response using asset configuration data

    公开(公告)号:US10158663B2

    公开(公告)日:2018-12-18

    申请号:US15699454

    申请日:2017-09-08

    Applicant: SPLUNK INC.

    Abstract: Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of implementing security actions for a computing environment comprising a plurality of computing assets includes identifying a security action in a command language for the computing environment. The method further provides identifying one or more computing assets related to the security action, and obtaining hardware and software characteristics for the one or more computing assets. The method also includes translating the security action in the command language to one or more action procedures based on the hardware and software characteristics, and initiating implementation of the one or more action procedures in the one or more computing assets.

    Security action verification in a computing network

    公开(公告)号:US12074901B1

    公开(公告)日:2024-08-27

    申请号:US18177620

    申请日:2023-03-02

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein provide for validating security actions before they are implemented in a computing network. In one example, a computing network may include a plurality of computing assets that provide a variety of different operations. During the operations of the network, administration systems may generate and provide security actions to prevent or mitigate the effect of a security threat on the network. However, prior to implementing the security actions within the network, computing assets may exchange security parameters with the administration systems to verify that the security actions are authentic.

Patent Agency Ranking