Splunk Inc.
Identifying related communication interactions to a security threat in a computing environment
Last updated:
Abstract:
Systems, methods, and software described herein provide security actions based on related security threat communications. In one example, a method of operating an advisement system includes identifying a security threat within the computing environment, wherein the computing environment comprises a plurality of computing assets. The method further provides obtaining descriptor information for the security threat, and retrieving related communication interactions based on the descriptor information. The method also includes generating a response to the security threat based on the related communication interactions.
Status:
Grant
Type:
Utility
Filling date:
29 Sep 2015
Issue date:
10 Nov 2020