System and method for managing security events on a network
First Claim
1. A computer-implemented method for gathering security event data and rendering result data in a manageable format comprising the steps of:
- creating scope criteria for analyzing security event data;
collecting the security event data from a plurality of security devices located at a first location;
storing the collected security event data at a second location;
analyzing the collected security event data with the scope criteria to produce result data, the result data accessible by a plurality of clients; and
rendering the result data in a manageable format for the plurality of clients.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented system for managing security event data collected from a computing network. The system employs an event managing software module that can reside on a computing network that is being monitored with security devices. The event managing software collects security event data from security devices located in the monitored computing network and can process the security event data. In processing the security event data, the event manager module can format the data and create manageable summaries of the data. The event manager also supports storage of the security event data and the results of any processing performed on the data. Security event data can be identified by the event manager for use in responding to a security event.
298 Citations
30 Claims
-
1. A computer-implemented method for gathering security event data and rendering result data in a manageable format comprising the steps of:
-
creating scope criteria for analyzing security event data;
collecting the security event data from a plurality of security devices located at a first location;
storing the collected security event data at a second location;
analyzing the collected security event data with the scope criteria to produce result data, the result data accessible by a plurality of clients; and
rendering the result data in a manageable format for the plurality of clients. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 28, 29, 30)
-
-
16. A method for managing security event data collected from a plurality of security devices comprising the steps of:
-
creating scope criteria for filtering security event data;
collecting security event data from a plurality of security devices located at a first location;
storing the collected security event data at a second location; and
applying the scope criteria to the collected security event data to produce a result, the result accessible by a plurality of clients.
-
-
27. A computer-implemented system for managing security event data collected from a plurality of security devices comprising:
-
a plurality of security devices operable for generating security event data;
a database server coupled to the security devices, the database server operable for collecting security event data from the security devices;
an application server coupled to the database server, the application server operable for analyzing the security event data; and
a client coupled to the application server, the client operable for receiving a rendering of the analyzed security event data.
-
Specification