Splunk Inc.
Identifying related communication interactions to a security threat in a computing environment

Last updated:

Abstract:

Systems, methods, and software described herein provide security actions based on related security threat communications. In one example, a method of operating an advisement system includes identifying a security threat within the computing environment, wherein the computing environment comprises a plurality of computing assets. The method further provides obtaining descriptor information for the security threat, and retrieving related communication interactions based on the descriptor information. The method also includes generating a response to the security threat based on the related communication interactions.

Status:
Grant
Type:

Utility

Filling date:

29 Sep 2015

Issue date:

10 Nov 2020