18435803. APPLICATION MONITORING PRIORITIZATION simplified abstract (Cisco Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

APPLICATION MONITORING PRIORITIZATION

Organization Name

Cisco Technology, Inc.

Inventor(s)

Jackson Ngoc Ki Pang of Sunnyvale CA (US)

Navindra Yadav of Cupertino CA (US)

Anubhav Gupta of Fremont CA (US)

Shashidhar Gandham of Fremont CA (US)

Supreeth Hosur Nagesh Rao of Cupertino CA (US)

Sunil Kumar Gupta of Milpitas CA (US)

APPLICATION MONITORING PRIORITIZATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 18435803 titled 'APPLICATION MONITORING PRIORITIZATION

The patent application describes an approach for establishing a priority ranking for endpoints in a network, particularly useful for triaging endpoints after a compromise. By prioritizing critical and vulnerable endpoints, network stability can be maintained and damage mitigated effectively.

  • The technology involves determining a criticality ranking and secondary value for each endpoint in a datacenter.
  • These values are combined to form a priority ranking for each endpoint, allowing for comparison and efficient triaging.
  • The system helps in deciding which endpoint should be addressed first based on their priority ranking.

Potential Applications: - Cybersecurity operations - Incident response management - Network monitoring and maintenance

Problems Solved: - Efficient triaging of compromised endpoints - Prioritizing critical assets in a network - Minimizing damage post-compromise

Benefits: - Enhanced network security - Reduced downtime - Improved incident response times

Commercial Applications: Title: "Network Endpoint Triage System for Enhanced Cybersecurity" This technology can be utilized by cybersecurity firms, IT departments, and data centers to improve their incident response capabilities and overall network security.

Questions about the technology: 1. How does this technology help in maintaining network stability post-compromise? 2. What are the key factors considered in determining the priority ranking for endpoints?


Original Abstract Submitted

An approach for establishing a priority ranking for endpoints in a network. This can be useful when triaging endpoints after an endpoint becomes compromised. Ensuring that the most critical and vulnerable endpoints are triaged first can help maintain network stability and mitigate damage to endpoints in the network after an endpoint is compromised. The present technology involves determining a criticality ranking and a secondary value for a first endpoint in a datacenter. The criticality ranking and secondary value can be combined to form priority ranking for the first endpoint which can then be compared to a priority ranking for a second endpoint to determine if the first endpoint or the second endpoint should be triaged first.