Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for managing security incidents

A security event and manager technology, applied in the field of management security events, can solve problems such as the disappearance of enterprise security defense lines

Inactive Publication Date: 2015-11-25
INTEL CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, as computing devices continue to become more mobile, corporate security defenses are expanding or in some cases disappearing entirely

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for managing security incidents
  • Method and apparatus for managing security incidents
  • Method and apparatus for managing security incidents

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] While the concept of the present disclosure is susceptible to various modifications and alternative forms, specific exemplary embodiments thereof have been shown by way of example in the drawings and will be described herein in detail. It should be understood, however, that there is no intention to limit the disclosed concepts to the particular forms disclosed, but on the contrary, the invention is to cover all modifications, equivalents and alternatives falling within the spirit and scope of the invention as defined by the appended claims. select.

[0013] In the following description, numerous specific details may be set forth in order to provide a thorough understanding of the present disclosure, such as logic implementations, opcodes, components specifying operands, resource partitioning / sharing / replication implementations, types and interrelationships of system components, Logical partition / integration selection. However, it will be appreciated that embodiments of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and device for managing security events includes establishing a security event manager on a mobile computing device. The security event manager may be embodied as software and / or hardware components. The security event manager receives security event data from a plurality of security event sources of the mobile computing device and correlates the security event data based on a security policy to determine whether a security event has occurred. The security event manager responds to the security event based on the security policy.

Description

technical field [0001] The present invention relates to methods and apparatus for managing security events. Background technique [0002] Security Event Management (SEM) and Security Information Management (SIM) systems are typically enterprise-class servers configured to collect, aggregate, and correlate security event data from multiple security event sources. In a standard SEM / SIM system, the user's client computer is configured to periodically transmit reports, logs, and other security-related data to the SEM / SIM server. The SEM / SIM server aggregates and correlates security data received from client computers and other enterprise devices and sources (eg, network routers, firewalls, and services) to generate security incident reports. Typically, SEM / SIM servers are reactive and do not automatically respond to security events. Instead, security personnel can review security incident reports and take appropriate action. [0003] Historically, an enterprise's security per...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCH04L63/1416G06F21/554H04L67/04
Inventor S·P·珀塞尔A·D·罗斯J·S·巴卡S·艾西T·M·科伦伯格D·M·摩根
Owner INTEL CORP