Implementing security actions in an advisement system based on obtained software characteristics

    公开(公告)号:US10425440B2

    公开(公告)日:2019-09-24

    申请号:US16107972

    申请日:2018-08-21

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of implementing security actions for a computing environment comprising a plurality of computing assets includes identifying a security action in a command language for the computing environment. The method further provides identifying one or more computing assets related to the security action, and obtaining hardware and software characteristics for the one or more computing assets. The method also includes translating the security action in the command language to one or more action procedures based on the hardware and software characteristics, and initiating implementation of the one or more action procedures in the one or more computing assets.

    Managing security actions in a computing environment based on communication activity of a security threat

    公开(公告)号:US10193920B2

    公开(公告)日:2019-01-29

    申请号:US15886183

    申请日:2018-02-01

    Applicant: SPLUNK INC.

    Abstract: Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.

    Management of security actions based on computing asset classification

    公开(公告)号:US10063587B2

    公开(公告)日:2018-08-28

    申请号:US14956589

    申请日:2015-12-02

    Applicant: SPLUNK INC.

    Abstract: Systems, methods, and software described herein provide for responding to security threats in a computing environment based on the classification of computing assets in the environment. In one example, a method of operating an advisement computing system includes identifying a security threat for an asset in the computing environment, and identifying a classification for the asset in relation to other assets within the computing environment. The method further provides determining a rule set for the security threat based on the classification for the asset and initiating a response to the security threat based on the rule set.

    Runtime credential requirement identification for incident response

    公开(公告)号:US11784996B2

    公开(公告)日:2023-10-10

    申请号:US16934915

    申请日:2020-07-21

    Applicant: Splunk Inc.

    CPC classification number: H04L63/083 H04L63/105

    Abstract: Described herein are systems, methods, and software to enhance incident response in an information technology (IT) environment. In one example, an incident service identifies a course of action to respond to an incident in the IT environment. The incident service further identifies a particular step in the course of action associated with a credential requirement based on traits associated with the particular step, and generates a credential request to obtain credentials to support the credential requirement.

    Identifying suggested actions for responding to incidents in an it environment

    公开(公告)号:US11755405B1

    公开(公告)日:2023-09-12

    申请号:US17713971

    申请日:2022-04-05

    Applicant: Splunk Inc.

    CPC classification number: G06F11/0793 G06F9/451 G06F11/0769 G06Q10/06316

    Abstract: An information technology (IT) operations platform is described that enables users to execute one or more executable actions from a set of executable actions presented in a prioritized order based on historical data. In response to identifying an occurrence of a type of incident in an IT environment, the IT operations platform generates a workbook based on a customizable workbook template. The customizable workbook template includes a plurality of tasks grouped into a plurality of phases for responding to occurrences of the type of incident, and each task of the plurality of tasks is associated with a respective set of suggested executable actions for completing the corresponding task. The IT operations platform then causes the display of a graphical user interface (GUI) including a representation of the workbook, including interface elements representing the respective set of suggested executable actions displayed in the prioritized order.

    Extension framework for an information technology and security operations application

    公开(公告)号:US11695803B2

    公开(公告)日:2023-07-04

    申请号:US17163318

    申请日:2021-01-29

    Applicant: Splunk Inc.

    CPC classification number: H04L63/20 H04L41/22 H04L63/0281 H04L63/1433

    Abstract: Techniques are described for providing an extension framework for an IT and security operations application. The described extension framework allows various types of users to extend the user interfaces, data content, and functionality of an IT and security operations application to enhance and enrich users' workflow and investigative experiences. Example types of extensions enabled by the extension framework include modifying or supplementing GUI elements and other components, where users can implement these extensions at pre-defined extension points of the IT and security operations application. The extension framework further includes a data integration system that provides users with mechanisms to integrate data from external applications, services, or other data sources into their plugins.

Patent Agency Ranking