Splunk Inc.
Identifying automated responses to security threats based on obtained communication interactions

Last updated:

Abstract:

Systems, methods, and software described herein provide security actions based on related security threat communications. In one example, a method of operating an advisement system includes identifying a security threat within the computing environment, wherein the computing environment comprises a plurality of computing assets. The method further provides obtaining descriptor information for the security threat, and retrieving related communication interactions based on the descriptor information. The method also includes generating a response to the security threat based on the related communication interactions.

Status:
Grant
Type:

Utility

Filling date:

25 Sep 2020

Issue date:

3 May 2022