17958562. REMOTE MONITORING OF A SECURITY OPERATIONS CENTER (SOC) simplified abstract (Fortinet, Inc.)
Contents
- 1 REMOTE MONITORING OF A SECURITY OPERATIONS CENTER (SOC)
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 REMOTE MONITORING OF A SECURITY OPERATIONS CENTER (SOC) - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.9.1 Unanswered Questions
- 1.9.2 How does the mobile application securely connect to the Security Operations Center for remote monitoring?
- 1.9.3 What types of network elements are typically monitored by the system, and are there any limitations on the size or complexity of the network being monitored?
- 1.10 Original Abstract Submitted
REMOTE MONITORING OF A SECURITY OPERATIONS CENTER (SOC)
Organization Name
Inventor(s)
Robert A. May of North Vancouver (CA)
Jordan E. Thompson of Vancouver (CA)
REMOTE MONITORING OF A SECURITY OPERATIONS CENTER (SOC) - A simplified explanation of the abstract
This abstract first appeared for US patent application 17958562 titled 'REMOTE MONITORING OF A SECURITY OPERATIONS CENTER (SOC)
Simplified Explanation
The patent application describes systems and methods for remote monitoring of a Security Operations Center (SOC) via a mobile application. The management service retrieves information about network elements, extracts parameters, prioritizes elements based on severity levels, generates monitoring views of security-related issues, assigns priorities to views, and displays them on a display device.
- Monitoring network elements associated with an enterprise network
- Extracting parameters of monitored network elements
- Prioritizing elements based on severity levels
- Generating monitoring views of security-related issues
- Assigning priorities to monitoring views
- Displaying monitoring views on a display device
Potential Applications
The technology can be applied in various industries such as cybersecurity, network monitoring, and IT security to enhance remote monitoring capabilities of Security Operations Centers.
Problems Solved
1. Improved real-time monitoring of potential security-related issues in network elements. 2. Enhanced prioritization of security alerts for efficient response and mitigation.
Benefits
1. Increased efficiency in identifying and addressing security threats. 2. Enhanced visibility and control over network security. 3. Improved decision-making based on real-time monitoring data.
Potential Commercial Applications
Enhancing security services for enterprises, network monitoring solutions for IT companies, and cybersecurity tools for organizations looking to strengthen their defenses against cyber threats.
Possible Prior Art
One possible prior art could be traditional Security Operations Centers that rely on manual monitoring and response processes, lacking the real-time capabilities and prioritization features described in the patent application.
Unanswered Questions
How does the mobile application securely connect to the Security Operations Center for remote monitoring?
The patent application does not provide details on the security measures implemented to ensure a secure connection between the mobile application and the Security Operations Center.
What types of network elements are typically monitored by the system, and are there any limitations on the size or complexity of the network being monitored?
The patent application does not specify the specific types of network elements monitored or any potential limitations on the scale or complexity of the network being monitored.
Original Abstract Submitted
Systems and methods for remote monitoring of a Security Operations Center (SOC) via a mobile application are provided. According to one embodiment, a management service retrieves information regarding multiple network elements that are associated with an enterprise network and extracts parameters of the monitored network elements from the retrieved information. The management service prioritizes the monitored network elements by determining a severity level associated with security-related issues of the network elements and generates various monitoring views that summarize in real time various categories of potential security-related issues detected by the SOC. Further, the management service assigns a priority to each monitoring view and displays a video on the display device that cycles through monitoring views in accordance with their respective assigned priorities.