Juniper Networks, Inc.
Deployment of a security policy based on network topology and device capability

Last updated:

Abstract:

A device may include one or more processors to receive network topology information of a network and device capability information of devices in the network; detect a threat to the network; determine threat information associated with the threat; select a security policy and an enforcement device of the network to enforce the security policy based on the network topology information, the device capability information, and the threat information; and perform an action associated with the threat based on the security policy and the enforcement device.

Status:
Grant
Type:

Utility

Filling date:

31 Jul 2017

Issue date:

8 Sep 2020