Splunk Inc.
Management of actions in a computing environment based on asset classification

Last updated:

Abstract:

Systems, methods, and software described herein provide for responding to security threats in a computing environment based on the classification of computing assets in the environment. In one example, a method of operating an advisement computing system includes identifying a security threat for an asset in the computing environment, and identifying a classification for the asset in relation to other assets within the computing environment. The method further provides determining a rule set for the security threat based on the classification for the asset and initiating a response to the security threat based on the rule set.

Status:
Grant
Type:

Utility

Filling date:

23 Jul 2018

Issue date:

1 Dec 2020