Security infrastructure
First Claim
Patent Images
1. A method for operating a security infrastructure, comprising:
- receiving, via a processor, data in response to a first event in the security infrastructure;
formatting, via the processor, the data into an event-message having a common format within the security infrastructure; and
distributing, via the processor, the event-message to a processing entity of a plurality processing entities of the security infrastructure, wherein the processing entity is assigned to analyze a topic of the event-message, wherein at least two of the plurality processing entities are assigned to a different security issue, wherein each of the processing entities comprises a computing device and comprises a security agent that uses an inference engine for analyzing a security issue, wherein the analyzing the security issue comprises identifying a pattern in a plurality of event-messages.
3 Assignments
0 Petitions
Accused Products
Abstract
An automated security infrastructure is disclosed that includes security agents that are designed to analyze security issues. The security agents process events received from event-messages, and records data associated with a security issue in a ticket. Security and management personnel are kept informed based on notification subscription lists. Assigned security personnel'"'"'s progress in resolving outstanding security issues is monitored until those issues are resolved.
13 Citations
20 Claims
-
1. A method for operating a security infrastructure, comprising:
-
receiving, via a processor, data in response to a first event in the security infrastructure; formatting, via the processor, the data into an event-message having a common format within the security infrastructure; and distributing, via the processor, the event-message to a processing entity of a plurality processing entities of the security infrastructure, wherein the processing entity is assigned to analyze a topic of the event-message, wherein at least two of the plurality processing entities are assigned to a different security issue, wherein each of the processing entities comprises a computing device and comprises a security agent that uses an inference engine for analyzing a security issue, wherein the analyzing the security issue comprises identifying a pattern in a plurality of event-messages. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer readable medium storing a plurality of instructions which, when executed by a processor, cause the processor to perform operations for a security infrastructure, the operations comprising:
-
receiving data in response to a first event in the security infrastructure; formatting the data into an event-message having a common format within the security infrastructure; and distributing the event-message to a processing entity of a plurality processing entities of the security infrastructure, wherein the processing entity is assigned to analyze a topic of the event-message, wherein at least two of the plurality processing entities are assigned to a different security issue, wherein each of the processing entities comprises a computing device and comprises a security agent that uses an inference engine for analyzing a security issue, wherein the analyzing the security issue comprises identifying a pattern in a plurality of event-messages. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A security infrastructure, comprising:
-
a processor; and a computer readable medium storing a plurality of instructions which, when executed by the processor, cause the processor to perform operations, the operations comprising; receiving data in response to a first event in the security infrastructure; formatting the data into an event-message having a common format within the security infrastructure; and distributing the event-message to a processing entity of a plurality processing entities of the security infrastructure, wherein the processing entity is assigned to analyze a topic of the event-message, wherein at least two of the plurality processing entities are assigned to a different security issue, wherein each of the processing entities comprises a computing device and comprises a security agent that uses an inference engine for analyzing a security issue, wherein the analyzing the security issue comprises identifying a pattern in a plurality of event-messages.
-
Specification