-
公开(公告)号:US11632398B2
公开(公告)日:2023-04-18
申请号:US16929404
申请日:2020-07-15
Applicant: SECUREWORKS CORP.
Inventor: Timothy Vidas , Jon Ramsey , Aaron Hackworth , Robert Danford , William Urbanski
Abstract: Methods and systems for building security applications can be provided. Data policies for accessing security data can be set, and a module pipeline including one or more modules selected from a plurality of modules can be generated. The modules can include at least one module operable to apply a predictive security application or model for detection or identification of security threats. Module execution policies governing execution of the one or more modules in the module pipeline also can be set. Upon receipt of a request to initiate execution of the module pipeline, it can be determined if the execution thereof would violate the data policies or the module execution policies. If so, execution of the module pipeline can be blocked, otherwise the module pipeline can be executed to process the portion of the security data.
-
公开(公告)号:US20210067562A1
公开(公告)日:2021-03-04
申请号:US17095376
申请日:2020-11-11
Applicant: SECUREWORKS CORP.
Inventor: Ross Rowland Kinder , William Urbanski , Ryan James Leavengood , Timothy Vidas , Jon Ramsey
IPC: H04L29/06
Abstract: Systems and methods for reversibly remediating security risks, which monitor a network or system for security risks, and upon detection of one or more of risks, apply a remedial action applicable to at least partially remedy or mitigate the one or more detected risk. The network or system is monitored for a change to the detected risk(s), and upon detection of a change to the detected risk(s), the applied remediation action is automatically reversed.
-
3.
公开(公告)号:US20200351307A1
公开(公告)日:2020-11-05
申请号:US16929404
申请日:2020-07-15
Applicant: SECUREWORKS CORP.
Inventor: Timothy Vidas , Jon Ramsey , Aaron Hackworth , Robert Danford , William Urbanski
Abstract: Methods and systems for building security applications can be provided. Data policies for accessing security data can be set, and a module pipeline including one or more modules selected from a plurality of modules can be generated. The modules can include at least one module operable to apply a predictive security application or model for detection or identification of security threats. Module execution policies governing execution of the one or more modules in the module pipeline also can be set. Upon receipt of a request to initiate execution of the module pipeline, it can be determined if the execution thereof would violate the data policies or the module execution policies. If so, execution of the module pipeline can be blocked, otherwise the module pipeline can be executed to process the portion of the security data.
-
4.
公开(公告)号:US20190141079A1
公开(公告)日:2019-05-09
申请号:US15804109
申请日:2017-11-06
Applicant: SECUREWORKS CORP.
Inventor: Timothy Vidas , Jon Ramsey , Aaron Hackworth , Robert Danford , William Urbanski
Abstract: Methods and systems for developing and distributing applications and data for building security applications can be provided. A plurality of data policies can be set for access and/or filtering security data based on selected parameters. One or more modules can be generated for processing the security data, with each of the modules governed by one or more module policies. Upon receipt of a request to initiate execution of the one or more modules to access and process a selected portion or filtered set of the security data, it can be determined if the request violates the data policies and/or the module policies applicable for processing the selected portion or filtered set of the security data, and if the data policies and/or the module policies are not violated, the one or more modules can be executed to process the selected portion or filtered set of the security data.
-
5.
公开(公告)号:US20180152480A1
公开(公告)日:2018-05-31
申请号:US15816133
申请日:2017-11-17
Applicant: SECUREWORKS CORP.
Inventor: Ross Rowland Kinder , William Urbanski , Ryan James Leavengood , Timothy Vidas , Jon Ramsey
IPC: H04L29/06
CPC classification number: H04L63/20 , H04L63/1433
Abstract: Systems and methods for reversibly remediating security risks, which monitor a network or system for security risks, and upon detection of one or more of risks, apply a remedial action applicable to at least partially remedy or mitigate the one or more detected risk. The network or system is monitored for a change to the detected risk(s), and upon detection of a change to the detected risk(s), the applied remediation action is automatically reversed.
-
公开(公告)号:US11665201B2
公开(公告)日:2023-05-30
申请号:US17095376
申请日:2020-11-11
Applicant: SECUREWORKS CORP.
Inventor: Ross Rowland Kinder , William Urbanski , Ryan James Leavengood , Timothy Vidas , Jon Ramsey
CPC classification number: H04L63/20 , H04L63/1433
Abstract: Systems and methods for reversibly remediating security risks, which monitor a network or system for security risks, and upon detection of one or more of risks, apply a remedial action applicable to at least partially remedy or mitigate the one or more detected risk. The network or system is monitored for a change to the detected risk(s), and upon detection of a change to the detected risk(s), the applied remediation action is automatically reversed.
-
公开(公告)号:US10735470B2
公开(公告)日:2020-08-04
申请号:US15804109
申请日:2017-11-06
Applicant: SECUREWORKS CORP.
Inventor: Timothy Vidas , Jon Ramsey , Aaron Hackworth , Robert Danford , William Urbanski
Abstract: Methods and systems for developing and distributing applications and data for building security applications can be provided. A plurality of data policies can be set for access and/or filtering security data based on selected parameters. One or more modules can be generated for processing the security data, with each of the modules governed by one or more module policies. Upon receipt of a request to initiate execution of the one or more modules to access and process a selected portion or filtered set of the security data, it can be determined if the request violates the data policies and/or the module policies applicable for processing the selected portion or filtered set of the security data, and if the data policies and/or the module policies are not violated, the one or more modules can be executed to process the selected portion or filtered set of the security data.
-
-
-
-
-
-