×

Managing security actions in a computing environment based on communication activity of a security threat

  • US 10,193,920 B2
  • Filed: 02/01/2018
  • Issued: 01/29/2019
  • Est. Priority Date: 12/03/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method of improving security actions in a computing environment, wherein the computing environment comprises a plurality of computing assets, the method comprising:

  • identifying a security threat within the computing environment;

    obtaining state information for the security threat within the computing environment from computing assets of the plurality of computing assets in the computing environment, wherein the state information comprises at least communication activity related to the security threat, wherein the communication activity comprises at least a quantity of connections associated with the security threat and a quantity of exchanged data associated with the security threat;

    determining a current state for the security threat within the computing environment based on the state information;

    obtaining enrichment information for the security threat; and

    determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×