×

Computer Implemented Techniques for Detecting, Investigating and Remediating Security Violations to IT Infrastructure

  • US 20160261624A1
  • Filed: 03/07/2016
  • Published: 09/08/2016
  • Est. Priority Date: 03/13/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • determining that network activity at a specific time is deemed to be suspicious;

    determining, using Internet protocol addresses involved in the suspicious network activity, one or more computer systems that are sources of the suspicious network activity;

    determining, based on the specific time and the determined one or more computer systems, one or more applications executing on the one or more determined computer systems that are causing the suspicious network activity; and

    causing one or more remedial actions to be performed for the determined one or more computer systems.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×