Splunk Inc.
Identifying security actions for responding to security threats based on threat state information

Last updated:

Abstract:

Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.

Status:
Grant
Type:

Utility

Filling date:

7 Jan 2020

Issue date:

1 Jun 2021