Juniper Networks, Inc.
Deployment of a security policy based on network topology and device capability
Last updated:
Abstract:
A device may include one or more processors to receive network topology information of a network and device capability information of devices in the network; detect a threat to the network; determine threat information associated with the threat; select a security policy and an enforcement device of the network to enforce the security policy based on the network topology information, the device capability information, and the threat information; and perform an action associated with the threat based on the security policy and the enforcement device.
Status:
Grant
Type:
Utility
Filling date:
31 Jul 2017
Issue date:
8 Sep 2020