-
公开(公告)号:US11632398B2
公开(公告)日:2023-04-18
申请号:US16929404
申请日:2020-07-15
Applicant: SECUREWORKS CORP.
Inventor: Timothy Vidas , Jon Ramsey , Aaron Hackworth , Robert Danford , William Urbanski
Abstract: Methods and systems for building security applications can be provided. Data policies for accessing security data can be set, and a module pipeline including one or more modules selected from a plurality of modules can be generated. The modules can include at least one module operable to apply a predictive security application or model for detection or identification of security threats. Module execution policies governing execution of the one or more modules in the module pipeline also can be set. Upon receipt of a request to initiate execution of the module pipeline, it can be determined if the execution thereof would violate the data policies or the module execution policies. If so, execution of the module pipeline can be blocked, otherwise the module pipeline can be executed to process the portion of the security data.
-
2.
公开(公告)号:US20200351307A1
公开(公告)日:2020-11-05
申请号:US16929404
申请日:2020-07-15
Applicant: SECUREWORKS CORP.
Inventor: Timothy Vidas , Jon Ramsey , Aaron Hackworth , Robert Danford , William Urbanski
Abstract: Methods and systems for building security applications can be provided. Data policies for accessing security data can be set, and a module pipeline including one or more modules selected from a plurality of modules can be generated. The modules can include at least one module operable to apply a predictive security application or model for detection or identification of security threats. Module execution policies governing execution of the one or more modules in the module pipeline also can be set. Upon receipt of a request to initiate execution of the module pipeline, it can be determined if the execution thereof would violate the data policies or the module execution policies. If so, execution of the module pipeline can be blocked, otherwise the module pipeline can be executed to process the portion of the security data.
-
3.
公开(公告)号:US20190141079A1
公开(公告)日:2019-05-09
申请号:US15804109
申请日:2017-11-06
Applicant: SECUREWORKS CORP.
Inventor: Timothy Vidas , Jon Ramsey , Aaron Hackworth , Robert Danford , William Urbanski
Abstract: Methods and systems for developing and distributing applications and data for building security applications can be provided. A plurality of data policies can be set for access and/or filtering security data based on selected parameters. One or more modules can be generated for processing the security data, with each of the modules governed by one or more module policies. Upon receipt of a request to initiate execution of the one or more modules to access and process a selected portion or filtered set of the security data, it can be determined if the request violates the data policies and/or the module policies applicable for processing the selected portion or filtered set of the security data, and if the data policies and/or the module policies are not violated, the one or more modules can be executed to process the selected portion or filtered set of the security data.
-
公开(公告)号:US10735470B2
公开(公告)日:2020-08-04
申请号:US15804109
申请日:2017-11-06
Applicant: SECUREWORKS CORP.
Inventor: Timothy Vidas , Jon Ramsey , Aaron Hackworth , Robert Danford , William Urbanski
Abstract: Methods and systems for developing and distributing applications and data for building security applications can be provided. A plurality of data policies can be set for access and/or filtering security data based on selected parameters. One or more modules can be generated for processing the security data, with each of the modules governed by one or more module policies. Upon receipt of a request to initiate execution of the one or more modules to access and process a selected portion or filtered set of the security data, it can be determined if the request violates the data policies and/or the module policies applicable for processing the selected portion or filtered set of the security data, and if the data policies and/or the module policies are not violated, the one or more modules can be executed to process the selected portion or filtered set of the security data.
-
公开(公告)号:US20180288100A1
公开(公告)日:2018-10-04
申请号:US15994655
申请日:2018-05-31
Applicant: SECUREWORKS CORP.
Inventor: Ross R. Kinder , Jon R. Ramsey , Timothy M. Vidas , Robert Danford
Abstract: A method of configuring a network security device includes receiving a changed set of network rules to replace a current set of network rules; using a plurality of network traffic events to perform a first simulation of according to the current set of network rules and a second simulation according to the changed set of network rules; comparing the results of the first and second simulation to identify changes in network traffic allowed and denied between the current set and the changed set of network rules; displaying the changes in allowed and denied traffic for review of the changed set of network rules; receiving an instruction to implement the changed set of network rules based on the review; and filtering network traffic according to the changed set of network rules.
-
公开(公告)号:US10659498B2
公开(公告)日:2020-05-19
申请号:US15994655
申请日:2018-05-31
Applicant: SECUREWORKS CORP.
Inventor: Ross R. Kinder , Jon R. Ramsey , Timothy M. Vidas , Robert Danford
Abstract: A method of configuring a network security device includes receiving a changed set of network rules to replace a current set of network rules; using a plurality of network traffic events to perform a first simulation of according to the current set of network rules and a second simulation according to the changed set of network rules; comparing the results of the first and second simulation to identify changes in network traffic allowed and denied between the current set and the changed set of network rules; displaying the changes in allowed and denied traffic for review of the changed set of network rules; receiving an instruction to implement the changed set of network rules based on the review; and filtering network traffic according to the changed set of network rules.
-
-
-
-
-