×

System and method employing structured intelligence to verify and contain threats at endpoints

  • US 9,413,781 B2
  • Filed: 03/17/2014
  • Issued: 08/09/2016
  • Est. Priority Date: 03/15/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computerized method to identify potentially malicious code at an endpoint in a network, the method comprising the steps of:

  • via a threat monitor;

    monitoring network data,extracting at least one set of network data, andprocessing the at least one set of network data to generate a report;

    via a verifier including an agent coordinator, issuing at least one of (i) instructions, and (ii) indicators to an endpoint agent based on the report; and

    processing, via the endpoint agent, the at least one of (i) instructions, and (ii) indicators to generate verification information,wherein the verification information is processed via the verifier by comparing the verification information to at least one of (a) data obtained from another endpoint, and (b) data obtained from a security information and event management module (SIEM).

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×