System and method for operating protection services
First Claim
1. A method for operating protection services to provide defense against cyber-attacks, comprising:
- generating a workflow scheme assigned to at least one protected entity, wherein the workflow scheme includes at least one operation regimen and triggering criteria associated with the at least one operation regimen, wherein the at least one operation regimen defines a security policy for determining the at least one protection resource and a set of actions with which to provision the at least one protection resource;
monitoring at least a plurality of protection resources to detect at least one trigger event;
determining if the at least one detected trigger event satisfies the triggering criteria associated with the at least one operation regimen; and
changing a state of the at least one operation regimen when the at least one detected trigger event satisfies the at least one triggering criterion, and causing provisioning and operating of at least one protection resource of the plurality of protection resources, wherein the provisioning is based on contents defined in the at least one operation regimen.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for operating protection services to provide defense against cyber-attacks. The comprises generating a workflow scheme assigned to at least one protected entity, wherein the workflow scheme includes at least one operation regimen and triggering criteria associated with the at least one operation regimen; monitoring at least a plurality of protection resources to detect at least one trigger event; determining if the at least one detected trigger event satisfies the triggering criteria associated with the at least one operation regimen; and changing a state of the at least one operation regimen when the at least one detected trigger event satisfies the at least one triggering criterion, thereby causing provisioning and operating of at least one protection resource of the plurality of protection resources, wherein the provisioning is based on contents defined in the at least one operation regimen.
2 Citations
21 Claims
-
1. A method for operating protection services to provide defense against cyber-attacks, comprising:
-
generating a workflow scheme assigned to at least one protected entity, wherein the workflow scheme includes at least one operation regimen and triggering criteria associated with the at least one operation regimen, wherein the at least one operation regimen defines a security policy for determining the at least one protection resource and a set of actions with which to provision the at least one protection resource; monitoring at least a plurality of protection resources to detect at least one trigger event; determining if the at least one detected trigger event satisfies the triggering criteria associated with the at least one operation regimen; and changing a state of the at least one operation regimen when the at least one detected trigger event satisfies the at least one triggering criterion, and causing provisioning and operating of at least one protection resource of the plurality of protection resources, wherein the provisioning is based on contents defined in the at least one operation regimen. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer readable medium having stored thereon instructions for causing processing circuity to execute a process for operating protection services to provide defense against cyber-attacks, the process comprising:
-
generating a workflow scheme assigned to at least one protected entity, wherein the workflow scheme includes at least one operation regimen and triggering criteria associated with the at least one operation regimen, wherein the at least one operation regimen defines a security policy for determining the at least one protection resource and a set of actions with which to provision the at least one protection resource; monitoring at least a plurality of protection resources to detect at least one trigger event; determining if the at least one detected trigger event satisfies the triggering criteria associated with the at least one operation regimen; and changing a state of the at least one operation regimen when the at least one detected trigger event satisfies the at least one triggering criterion, and causing provisioning and operating of at least one protection resource of the plurality of protection resources, wherein the provisioning is based on contents defined in the at least one operation regimen.
-
-
21. A system for operating protection services to provide defense against cyber-attacks, comprising:
-
a processing circuity; and a memory, the memory containing instructions that, when executed by the processing circuity, configure the system to; generate a workflow scheme assigned to at least one protected entity, wherein the workflow scheme includes at least one operation regimen and triggering criteria associated with the at least one operation regimen, wherein the at least one operation regimen defines a security policy for determining the at least one protection resource and a set of actions with which to provision the at least one protection resource; monitor at least a plurality of protection resources to detect at least one trigger event; determine if the at least one detected trigger event satisfies the triggering criteria associated with the at least one operation regimen; and change a state of the at least one operation regimen when the at least one detected trigger event satisfies the at least one triggering criterion, and causing provisioning and operating of at least one protection resource of the plurality of protection resources, wherein the provisioning is based on contents defined in the at least one operation regimen.
-
Specification