Privileged account threat analysis system

A technology of threat analysis and account, which is applied in the direction of instrument and platform integrity maintenance, digital data protection, etc., can solve the problems of large limitations, failure to discover in time, privileged account without strict audit analysis model or logic, etc., to reduce further losses , Solve data islands and improve the effect of real-time protection capabilities

Inactive Publication Date: 2019-12-06
广州海颐信息安全技术有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the security protection of today's society, compared with defending against external attacks such as hackers, enterprises pay much less attention to internal attacks and adopt technical practices, and once internal threats occur, the damage caused by them is usually greater than that of external attacks. Much larger, external attackers or malicious internal users have privileged accounts, they can control the IT structure of the enterprise, turn off security protection functions, steal important information, and even interrupt the business of the enterprise, causing huge losses and impacts. Data breaches are almost always the result of privileged credentials being stolen, abused or misused
[0003] At this stage, the threat analysis products for privileged accounts are mostly simple external threat analysis contained in the account management system, which has relatively large limitations; corporate privileged accounts involve too wide a range, variety, quantity and change, and it is easy to form data islands. This makes traditional tools or systems auditing and monitoring the threat behavior of privileged accounts very complicated and difficult to be compatible at the same time; in addition, traditional tools or systems have no strict audit analysis model or logic for threats from internal privileged accounts, and threat events cannot be sent in time Message notification, after the event, the threat information cannot be associated and displayed in detail, so that when a privileged account threat occurs, the threat cannot be detected in time, and the threat can be reduced in time to cause further losses to the enterprise

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privileged account threat analysis system
  • Privileged account threat analysis system
  • Privileged account threat analysis system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0047] In the embodiment of the privileged account threat analysis system of the present invention, the structural diagram of the privileged account threat analysis system is as follows figure 1 shown. figure 1 Among them, the privileged account threat analysis system includes an interconnected intelligent threat audit unit 1, a real-time threat monitoring unit 2, and an overall configuration management unit 3; wherein, the intelligent threat audit unit 1 is u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privileged account threat analysis system, which comprises an intelligent threat auditing unit, a real-time threat monitoring unit and an overall configuration management unit which are connected with one another, and is characterized in that the intelligent threat auditing unit is used for auditing and monitoring account threat abnormal behaviors, and an administrator performs auditing analysis from different security dimensions and performs visual display. The privileged account threat analysis system can be compatible with structured and unstructured data of various operating systems, applications, databases, network equipment, security equipment and the like, can solve the data island problem existing in privilege threat analysis of a traditional system or tool, effectively carries out unified centralized management on external and internal threat behavior audits of the privileged account, realizes real-time omnibearing monitoring and association analysisof privileged account behaviors, can actively send the detected suspected privileged account threat behaviors to related personnel for real-time alarm, can improve the real-time protection capability,and can reduce further loss caused by the privileged account threat behaviors in an enterprise to the greatest extent.

Description

technical field [0001] The invention relates to the field of threat analysis of privileged accounts, in particular to a threat analysis system of privileged accounts. Background technique [0002] In the security protection of today's society, compared with defending against external attacks such as hackers, enterprises pay much less attention to internal attacks and adopt technical practices, and once internal threats occur, the damage caused by them is usually greater than that of external attacks. Much larger, external attackers or malicious internal users have privileged accounts, they can control the IT structure of the enterprise, turn off security protection functions, steal important information, and even interrupt the business of the enterprise, causing huge losses and impacts. Data breaches are almost always the result of privileged credentials being stolen, abused or misused. [0003] At this stage, the threat analysis products for privileged accounts are mostly ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/60G06F21/62
CPCG06F21/552G06F21/604G06F21/6218G06F2221/2141
Inventor 易伟增杨达盛潘明政
Owner 广州海颐信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products