×

Method and system for reviewing identified threats for performing computer security monitoring

  • US 10,212,174 B2
  • Filed: 10/30/2015
  • Issued: 02/19/2019
  • Est. Priority Date: 08/31/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computerized method comprising:

  • receiving event data associated with network activities by devices, applications, and network users that interact with a computer network, wherein the devices, applications, and network users are different types of entities;

    identifying instances of potential network compromise automatically determined from the event data, wherein instances include threats and anomalies, the identified instances are associated with each of the respective devices, applications, and network users that participated in the network activities from which the instances were determined, and each threat is an interpretation or a conclusion based on one or more of the anomalies;

    automatically determining a score for each entity, wherein the score indicates a risk level based at least in part on the number and/or type of identified instances of potential network compromise associated with the entity; and

    causing display, in a graphical user interface, of an indication of the score for each of the entities, wherein;

    the graphical user interface selectively provides an entities view for each of the types of entities,each entities view lists at least all entities of that selected type that participated in network activities that triggered determinations of potential network compromise, andeach entity listed in the entities view includes the associated score and a link which, upon selection by a user, causes the graphical user interface to generate a detailed view comprising additional data about the selected entity.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×