主权项 |
1. A computer-implemented method comprising:
forming, by a group formation module of security service computing device(s), a group including multiple client entities, each client entity being associated with a different security organization and each client entity having one or more computing devices, each computing device configured with an executable security agent; and automatically sharing, by a sharing module of the security service computing device(s), security information generated by the executable security agent(s) of a client entity in the group with the executable security agent(s) of computing device(s) of one or more other client entities in the group, wherein the security information is generated by the executable security agent(s) of the client entity based on monitoring of execution activities of the computing device(s) of the client entity, wherein the security information is indicative of whether the client entity is experiencing a security threat, and wherein each client entity is able to impose a security scheme or policy on its computing device(s) but is unable to impose the security scheme or policy on computing device(s) of other client entities. |