Systems and methods for intelligent cyber security threat detection and mitigation through an extensible automated investigations and threat mitigation platform
a technology of automated investigations and threat mitigation, applied in the field of cybersecurity, can solve the problems of incalculable growth of security risks posed by malicious actors or uneducated insiders, and achieve the effect of reducing the number of malicious actors and inability to fully understand the threat, and reducing the risk of malicious actors
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031]The following description of the preferred embodiments of the inventions are not intended to limit the inventions to these preferred embodiments, but rather to enable any person skilled in the art to make and use these inventions.
1. System for Remote Cyber Security Operations & Automated Investigations
[0032]As shown in FIG. 1, a system 100 for implementing remote cybersecurity operations includes a security alert engine 110, an automated security investigations engine 120, and a security threat mitigation user interface 130. The system 100 may sometimes be referred to herein as a cybersecurity threat detection and threat mitigation system 100.
[0033]The system 100 may function to enable real-time cybersecurity threat detection, agile, and intelligent threat response for mitigating detected security threats.
1.1 Security Alert Engine [Josie]
[0034]The security alert aggregation and identification module 110, sometimes referred to herein as the “security alert engine 110” may be in...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


