摘要 |
PROBLEM TO BE SOLVED: To effectively protect computers and systems from malicious actions and maintain the computers and systems.SOLUTION: A threat intelligence cloud 15 receives multiple items of event information associated with multiple reports from multiple sensors 25a, 25b, 25c distributed throughout a network environment. An event analysis sub-cloud 20 correlates the multiple items of event information to identify a threat. The event analysis sub-cloud 20 sends a customized security policy to each of the multiple sensors 25a, 25b, 25c on the basis of the threat.SELECTED DRAWING: Figure 1 |