×

Optimizing security analyses in SaaS environments

  • US 10,367,837 B2
  • Filed: 01/25/2017
  • Issued: 07/30/2019
  • Est. Priority Date: 01/25/2017
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, by one or more hardware processors, a set of observables from an interfacing entity, and one or more of;

    a set of structured threat data and a set of unstructured threat data;

    analyzing, by the one or more hardware processors, at least one of the set of observables, the set of structured threat data, and the set of unstructured threat data, wherein at least one of an observable of the set of observables, the set of structured threat data, and the set of unstructured threat data is analyzed using cognitive computing;

    creating, by the one or more hardware processors, a subgraph, based, at least in part, on the analyzed at least one of the set of observables, the set of structured threat data, and the set of unstructured threat data, wherein the subgraph represents the set of observables, the set of structured threat data and the set of unstructured threat data,wherein the subgraph is continuously updated upon receiving updates from multiple interfacing entities,wherein the subgraph provides a solution for at least one of;

    malicious software and a malicious connection to a Uniform Resource Locator (URL), an internet protocol (IP) address, a hash, or a computer file,wherein the subgraph further provides the solution on a user interface in an interactive format for a user, andwherein the solution comprises a link to a downloadable security patch and information detailing instructions to install the security patch;

    transferring, by the one or more hardware processors, the subgraph through intelligent traversals to the interfacing entity;

    displaying, by the one or more hardware processors, the subgraph on the user interface; and

    responsive to the user interacting with the link, installing and initiating, by the one or more hardware processors, the security patch on the interfacing entity.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×