20240031411. THREAT ANALYTICS AND DYNAMIC COMPLIANCE IN SECURITY POLICIES simplified abstract (Cisco Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

THREAT ANALYTICS AND DYNAMIC COMPLIANCE IN SECURITY POLICIES

Organization Name

Cisco Technology, Inc.

Inventor(s)

Doron Levari of Newton MA (US)

Tariq Ahmed Farhan of Cambridge MA (US)

Vincent E. Parla of North Hampton NH (US)

Ido Tamir of Boston MA (US)

Adam Bragg of Hollis NH (US)

Jason M. Perry of Plymouth MA (US)

THREAT ANALYTICS AND DYNAMIC COMPLIANCE IN SECURITY POLICIES - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240031411 titled 'THREAT ANALYTICS AND DYNAMIC COMPLIANCE IN SECURITY POLICIES

Simplified Explanation

This disclosure presents techniques and mechanisms for defining dynamic security compliance in networks to prevent security policy violations proactively. It also enables the identification of security policy violations based on data from the changing threat landscape and offers auto-remediation of non-compliant security policies. The goal is to enhance network security against a dynamic threat landscape.

  • Techniques and mechanisms for defining dynamic security compliance in networks
  • Proactive prevention of security policy violations
  • Retroactive and continuous identification of security policy violations
  • Utilization of data from the changing threat landscape
  • Auto-remediation of non-compliant security policies
  • Automation of security policies
  • Improved network security against a dynamic threat landscape

Potential Applications

This technology can be applied in various areas, including:

  • Network security management
  • IT infrastructure security
  • Cloud computing security
  • Internet of Things (IoT) security
  • Enterprise security

Problems Solved

The techniques and mechanisms described in this patent application address the following problems:

  • Preventing security policy violations from being added or made
  • Identifying security policy violations in a changing threat landscape
  • Ensuring continuous compliance with security policies
  • Reducing manual effort in security policy enforcement
  • Enhancing network security against dynamic threats

Benefits

The adoption of this technology offers several benefits, such as:

  • Proactive prevention of security policy violations
  • Real-time identification of security policy violations
  • Automated remediation of non-compliant security policies
  • Improved network security against evolving threats
  • Reduced manual effort and increased efficiency in security management


Original Abstract Submitted

this disclosure describes techniques and mechanisms for defining dynamic security compliance in networks to proactively prevent security policy violations from being added and/or made, retroactively and continuously identify security policy violations based on data from the changing threat landscape, and provide auto-remediation of non-compliant security policies. the techniques enable automated security policies and provide improved network security against a dynamic threat landscape.