-
公开(公告)号:US20210250373A1
公开(公告)日:2021-08-12
申请号:US17242165
申请日:2021-04-27
Applicant: Splunk Inc.
Inventor: Sourabh SATISH , Oliver FRIEDRICHS , Atif MAHADIK , Govind SALINAS
IPC: H04L29/06 , G06F16/28 , G06F21/55 , H04L12/851
Abstract: Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.
-
2.
公开(公告)号:US20230388338A1
公开(公告)日:2023-11-30
申请号:US18228982
申请日:2023-08-01
Applicant: Splunk Inc.
Inventor: Sourabh SATISH , Oliver FRIEDRICHS , Atif MAHADIK , Govind SALINAS
CPC classification number: H04L63/1441 , H04L63/20 , H04L63/1416 , G06F21/554 , G06F16/285 , H04L63/1433 , H04L63/0236 , H04L63/1425 , H04L47/2425
Abstract: Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.
-
公开(公告)号:US20210258340A1
公开(公告)日:2021-08-19
申请号:US17306703
申请日:2021-05-03
Applicant: Splunk Inc.
Inventor: Sourabh SATISH , Oliver FRIEDRICHS , Atif MAHADIK , Govind SALINAS
Abstract: Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of implementing security actions for a computing environment comprising a plurality of computing assets includes identifying a security action in a command language for the computing environment. The method further provides identifying one or more computing assets related to the security action, and obtaining hardware and software characteristics for the one or more computing assets. The method also includes translating the security action in the command language to one or more action procedures based on the hardware and software characteristics, and initiating implementation of the one or more action procedures in the one or more computing assets.
-
公开(公告)号:US20190007448A1
公开(公告)日:2019-01-03
申请号:US16107972
申请日:2018-08-21
Applicant: Splunk Inc.
Inventor: Sourabh SATISH , Oliver FRIEDRICHS , Atif MAHADIK , Govind SALINAS
CPC classification number: H04L63/1441 , G06F16/285 , G06F21/554 , H04L47/2425 , H04L63/0236 , H04L63/1416 , H04L63/1425 , H04L63/1433 , H04L63/20
Abstract: Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of implementing security actions for a computing environment comprising a plurality of computing assets includes identifying a security action in a command language for the computing environment. The method further provides identifying one or more computing assets related to the security action, and obtaining hardware and software characteristics for the one or more computing assets. The method also includes translating the security action in the command language to one or more action procedures based on the hardware and software characteristics, and initiating implementation of the one or more action procedures in the one or more computing assets.
-
公开(公告)号:US20240348644A1
公开(公告)日:2024-10-17
申请号:US18754090
申请日:2024-06-25
Applicant: Splunk Inc.
Inventor: Sourabh SATISH , Oliver FRIEDRICHS , Atif MAHADIK , Govind SALINAS
IPC: H04L9/40 , G06F16/28 , G06F21/55 , H04L47/2425
CPC classification number: H04L63/1441 , G06F16/285 , G06F21/554 , H04L63/0236 , H04L63/1416 , H04L63/1425 , H04L63/1433 , H04L63/20 , H04L47/2425
Abstract: Aspects described herein provide security actions based on a current state of a security threat. In one example, a computer-implemented method includes identifying a security threat within a computing environment comprising a plurality of computing assets. The method further includes obtaining state information for the security threat within the computing environment from computing assets of the plurality of computing assets in the computing environment. The method further includes determining a current state for the security threat within the computing environment based on the state information. The method further includes obtaining enrichment information for the security threat that relates kill-state information to an identity of the security threat. The method further includes determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.
-
6.
公开(公告)号:US20200287930A1
公开(公告)日:2020-09-10
申请号:US16736120
申请日:2020-01-07
Applicant: Splunk Inc.
Inventor: Sourabh SATISH , Oliver FRIEDRICHS , Atif MAHADIK , Govind SALINAS
Abstract: Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.
-
7.
公开(公告)号:US20190020677A1
公开(公告)日:2019-01-17
申请号:US16107979
申请日:2018-08-21
Applicant: Splunk Inc.
Inventor: Sourabh SATISH , Oliver FRIEDRICHS , Atif MAHADIK , Govind SALINAS
Abstract: Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.
-
公开(公告)号:US20190014144A1
公开(公告)日:2019-01-10
申请号:US16107975
申请日:2018-08-21
Applicant: Splunk Inc.
Inventor: Sourabh SATISH , Oliver FRIEDRICHS , Atif MAHADIK , Govind SALINAS
CPC classification number: H04L63/1441 , G06F16/285 , G06F21/554 , H04L47/2425 , H04L63/0236 , H04L63/1416 , H04L63/1425 , H04L63/1433 , H04L63/20
Abstract: Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of implementing security actions for a computing environment comprising a plurality of computing assets includes identifying a security action in a command language for the computing environment. The method further provides identifying one or more computing assets related to the security action, and obtaining hardware and software characteristics for the one or more computing assets. The method also includes translating the security action in the command language to one or more action procedures based on the hardware and software characteristics, and initiating implementation of the one or more action procedures in the one or more computing assets.
-
-
-
-
-
-
-