SYSTEM AND METHOD FOR PROVIDING ENDPOINT MANAGEMENT FOR SECURITY THREATS IN A NETWORK ENVIRONMENT
First Claim
Patent Images
1. A method, comprising:
- monitoring activity within an endpoint;
identifying a source associated with a particular data segment received by the endpoint;
monitoring an antivirus mechanism within the endpoint, wherein the antivirus mechanism is configured to identify the particular data segment as being associated with malware; and
communicating the source associated with the particular data segment.
1 Assignment
0 Petitions
Accused Products
Abstract
An example method is provided and includes monitoring activity within an endpoint, and identifying a source associated with a particular data segment received by the endpoint. The method also includes monitoring an antivirus mechanism within the endpoint. The antivirus mechanism is configured to identify the particular data segment as being associated with malware. The source associated with the particular data segment can be communicated to any suitable next destination.
96 Citations
20 Claims
-
1. A method, comprising:
-
monitoring activity within an endpoint; identifying a source associated with a particular data segment received by the endpoint; monitoring an antivirus mechanism within the endpoint, wherein the antivirus mechanism is configured to identify the particular data segment as being associated with malware; and communicating the source associated with the particular data segment. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. Logic encoded in one or more tangible media that includes code for execution and when executed by a processor operable to perform operations comprising:
-
monitoring activity within an endpoint; identifying a source associated with a particular data segment received by the endpoint; monitoring an antivirus mechanism within the endpoint, wherein the antivirus mechanism is configured to identify the particular data segment as being associated with malware; and communicating the source associated with the particular data segment. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An apparatus, comprising:
-
a memory element configured to store code; a processor operable to execute instructions associated with the code; and a telemetry module configured to interface with the memory element and the processor such that the apparatus can; monitor activity within an endpoint; identify a source associated with a particular data segment received by the endpoint; monitor an antivirus mechanism within the endpoint, wherein the antivirus mechanism is configured to identify the particular data segment as being associated with malware; and communicate the source associated with the particular data segment. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification