CREATING A SECURITY REPORT FOR A CUSTOMER NETWORK
First Claim
1. A method for creating a security report for a customer network, the method comprising:
- obtaining, from a customer network, security information about the customer network;
preparing, based on modification rules, the security information to create modified security information;
analyzing, via big data threat analytics, the modified security information to create a number of metrics and identify security threats;
refining the number of metrics using a refining model; and
creating, based on the refined number of metrics used as an input for model-based predictive analytics and the security threats, a security report the security report representing security intelligence for the customer network.
2 Assignments
0 Petitions
Accused Products
Abstract
Creating a security report for a customer network includes obtaining from a customer network, security information about the customer network, preparing, based on modification rules, the security information to create modified security information, analyzing, based on big data threat analytics, the security threats to create a number of metrics, refining the number of metrics using a refining model, creating, based on the refined number of metrics used as an input for model-based predictive analytics and the security threats, a security report representing security intelligence for the customer network in which the number of metrics are refined by a refining model and used as an input for the model-based predictive analytics.
14 Citations
15 Claims
-
1. A method for creating a security report for a customer network, the method comprising:
-
obtaining, from a customer network, security information about the customer network; preparing, based on modification rules, the security information to create modified security information; analyzing, via big data threat analytics, the modified security information to create a number of metrics and identify security threats; refining the number of metrics using a refining model; and creating, based on the refined number of metrics used as an input for model-based predictive analytics and the security threats, a security report the security report representing security intelligence for the customer network. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for creating a security report for a customer network, the system comprising:
-
an obtaining engine to obtain, from a customer network, security information about the customer network; a preparing engine to prepare, based on modification rules, the security information to create modified security information; a storing engine to store the modified security information in a repository for a long term analysis by a big data threat analytics; an analyzing engine to analyze, via the big data threat analytics, the modified security information to create a number of metrics and identify security threats; a refining engine to refine the number of metrics using a refining model; and a creating engine to create, based on the refined number of metrics used as an input for model-based predictive analytics and the security threats, a security report representing security intelligence for the customer network. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A computer program product for creating a security report for a customer network, comprising:
-
a tangible computer readable storage medium, said tangible computer readable storage medium comprising computer readable program code embodied therewith, said computer readable program code comprising program instructions that, when executed, causes a processor to; prepare, based on modification rules, security information to create modified security information; analyze, via big data threat analytics, the modified security information to create a number of metrics and identify security threats; refine the number of metrics using a refining model; and create, based on the refined number of metrics used as an input for model-based predictive analytics and the security threats, a security report representing security intelligence for the customer network. - View Dependent Claims (13, 14, 15)
-
Specification