The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Nov. 20, 2018
Filed:
Dec. 30, 2015
Juniper Networks, Inc., Sunnyvale, CA (US);
Lisa M. Beam, San Jose, CA (US);
Lyubov Nesteroff, Pleasant Hill, CA (US);
Natalia L. Shimuk, Mountain View, CA (US);
Amol Sood, Fremont, CA (US);
Rene Chavez, San Jose, CA (US);
Olga M. Towstopiat, Saratoga, CA (US);
Nadeem Khan, Bangalore, IN;
Ahzam Ali, Bangalore, IN;
Dharmendran Arumugam, Bangalore, IN;
Mayank Betala, Bangalore, IN;
Shrikanta Sharma, Bangalore, IN;
Juniper Networks, Inc., Sunnyvale, CA (US);
Abstract
Techniques are described for taking direct actions, such as selectively blocking or allowing traffic and applications, while monitoring events from a graphical representation of threats. As such, the administrator in an enterprise interacts with the graphical representation of threats rendered by the security management system to automatically invoke a policy/rule module of the security management system to configure and update security policies for the security devices deployed throughout the computer networks of the enterprise. An administrator may, for example, interact with the representation of threats rendered by the threat control module based on the data aggregated from the distributed security devices and, responsive to the interaction, the security management system may identify a relevant set of the security devices, automatically construct security policies having ordered rules within the policies for the identified set of security devices, and automatically communicate and install the policies in the identified set of security devices.