发明名称 |
Cyber-security system and methods thereof |
摘要 |
A system and method for adaptively securing a protected entity against cyber-threats are presented. The method includes selecting at least one security application configured to handle a cyber-threat, wherein the at least one security application executes a plurality of security services assigned to the at least one security application; determining at least one workflow rule respective of the at least one security application; receiving a plurality of signals from the plurality of security services, wherein each signal of the plurality of signals is generated with respect to a potential cyber-threat; generating at least one security event respective of the plurality of received signals; checking determining if the at least one security event satisfies the at least one workflow rule; and upon determining that the at least one security event satisfies the workflow rule, generating at least one action with respect to the potential cyber-threat. |
申请公布号 |
US9565204(B2) |
申请公布日期 |
2017.02.07 |
申请号 |
US201514615020 |
申请日期 |
2015.02.05 |
申请人 |
Empow Cyber Security Ltd. |
发明人 |
Chesla Avi |
分类号 |
H04L29/06 |
主分类号 |
H04L29/06 |
代理机构 |
M&B IP Analysts, LLC |
代理人 |
M&B IP Analysts, LLC |
主权项 |
1. A method for adaptively securing a protected entity against cyber-threats, comprising:
selecting at least one security application from a plurality of security applications, wherein each of the plurality of security applications is configured to handle a different type of cyber-threat, wherein the at least one security application executes a plurality of security services assigned to the at least one selected security application; determining at least one workflow rule respective of the at least one security application, wherein the at least one workflow rule is defined to handle a certain type of cyber-threat; generating a plurality of signals by the plurality of security services, wherein each signal of the plurality of signals is generated with respect to a potential cyber-threat; generating at least one security event respective of the plurality of received signals; determining if the at least one security event satisfies the at least one workflow rule; and upon determining that the at least one security event satisfies the workflow rule, generating at least one action with respect to the potential cyber-threat, wherein the at least one workflow rule applies a set of logical operators on events to generate the at least one action. |
地址 |
Ramat Gan IL |