Implementing security actions in an advisement system based on obtained software characteristics

    公开(公告)号:US10425440B2

    公开(公告)日:2019-09-24

    申请号:US16107972

    申请日:2018-08-21

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of implementing security actions for a computing environment comprising a plurality of computing assets includes identifying a security action in a command language for the computing environment. The method further provides identifying one or more computing assets related to the security action, and obtaining hardware and software characteristics for the one or more computing assets. The method also includes translating the security action in the command language to one or more action procedures based on the hardware and software characteristics, and initiating implementation of the one or more action procedures in the one or more computing assets.

    Managing security actions in a computing environment based on communication activity of a security threat

    公开(公告)号:US10193920B2

    公开(公告)日:2019-01-29

    申请号:US15886183

    申请日:2018-02-01

    Applicant: SPLUNK INC.

    Abstract: Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.

    Management of security actions based on computing asset classification

    公开(公告)号:US10063587B2

    公开(公告)日:2018-08-28

    申请号:US14956589

    申请日:2015-12-02

    Applicant: SPLUNK INC.

    Abstract: Systems, methods, and software described herein provide for responding to security threats in a computing environment based on the classification of computing assets in the environment. In one example, a method of operating an advisement computing system includes identifying a security threat for an asset in the computing environment, and identifying a classification for the asset in relation to other assets within the computing environment. The method further provides determining a rule set for the security threat based on the classification for the asset and initiating a response to the security threat based on the rule set.

Patent Agency Ranking