18435803. APPLICATION MONITORING PRIORITIZATION simplified abstract (Cisco Technology, Inc.)
Contents
APPLICATION MONITORING PRIORITIZATION
Organization Name
Inventor(s)
Jackson Ngoc Ki Pang of Sunnyvale CA (US)
Navindra Yadav of Cupertino CA (US)
Anubhav Gupta of Fremont CA (US)
Shashidhar Gandham of Fremont CA (US)
Supreeth Hosur Nagesh Rao of Cupertino CA (US)
Sunil Kumar Gupta of Milpitas CA (US)
APPLICATION MONITORING PRIORITIZATION - A simplified explanation of the abstract
This abstract first appeared for US patent application 18435803 titled 'APPLICATION MONITORING PRIORITIZATION
The patent application describes an approach for establishing a priority ranking for endpoints in a network, particularly useful for triaging endpoints after a compromise. By prioritizing critical and vulnerable endpoints, network stability can be maintained and damage mitigated effectively.
- The technology involves determining a criticality ranking and secondary value for each endpoint in a datacenter.
- These values are combined to form a priority ranking for each endpoint, allowing for comparison and efficient triaging.
- The system helps in deciding which endpoint should be addressed first based on their priority ranking.
Potential Applications: - Cybersecurity operations - Incident response management - Network monitoring and maintenance
Problems Solved: - Efficient triaging of compromised endpoints - Prioritizing critical assets in a network - Minimizing damage post-compromise
Benefits: - Enhanced network security - Reduced downtime - Improved incident response times
Commercial Applications: Title: "Network Endpoint Triage System for Enhanced Cybersecurity" This technology can be utilized by cybersecurity firms, IT departments, and data centers to improve their incident response capabilities and overall network security.
Questions about the technology: 1. How does this technology help in maintaining network stability post-compromise? 2. What are the key factors considered in determining the priority ranking for endpoints?
Original Abstract Submitted
An approach for establishing a priority ranking for endpoints in a network. This can be useful when triaging endpoints after an endpoint becomes compromised. Ensuring that the most critical and vulnerable endpoints are triaged first can help maintain network stability and mitigate damage to endpoints in the network after an endpoint is compromised. The present technology involves determining a criticality ranking and a secondary value for a first endpoint in a datacenter. The criticality ranking and secondary value can be combined to form priority ranking for the first endpoint which can then be compared to a priority ranking for a second endpoint to determine if the first endpoint or the second endpoint should be triaged first.
- Cisco Technology, Inc.
- Jackson Ngoc Ki Pang of Sunnyvale CA (US)
- Navindra Yadav of Cupertino CA (US)
- Anubhav Gupta of Fremont CA (US)
- Shashidhar Gandham of Fremont CA (US)
- Supreeth Hosur Nagesh Rao of Cupertino CA (US)
- Sunil Kumar Gupta of Milpitas CA (US)
- H04L43/045
- G06F3/0482
- G06F3/04842
- G06F3/04847
- G06F9/455
- G06F16/11
- G06F16/13
- G06F16/16
- G06F16/17
- G06F16/174
- G06F16/23
- G06F16/2457
- G06F16/248
- G06F16/28
- G06F16/29
- G06F16/9535
- G06F21/53
- G06F21/55
- G06F21/56
- G06N20/00
- G06N99/00
- G06T11/20
- H04J3/06
- H04J3/14
- H04L1/24
- H04L7/10
- H04L9/08
- H04L9/32
- H04L9/40
- H04L41/046
- H04L41/0668
- H04L41/0803
- H04L41/0806
- H04L41/0816
- H04L41/0893
- H04L41/12
- H04L41/16
- H04L41/22
- H04L43/02
- H04L43/026
- H04L43/04
- H04L43/062
- H04L43/08
- H04L43/0805
- H04L43/0811
- H04L43/0829
- H04L43/0852
- H04L43/0864
- H04L43/0876
- H04L43/0882
- H04L43/0888
- H04L43/10
- H04L43/106
- H04L43/12
- H04L43/16
- H04L45/00
- H04L45/302
- H04L45/50
- H04L45/74
- H04L47/11
- H04L47/20
- H04L47/2441
- H04L47/2483
- H04L47/28
- H04L47/31
- H04L47/32
- H04L61/5007
- H04L67/01
- H04L67/10
- H04L67/1001
- H04L67/12
- H04L67/50
- H04L67/51
- H04L67/75
- H04L69/16
- H04L69/22
- H04W72/54
- H04W84/18
- CPC H04L43/045