| 11811587 |
Generating incident response action flows using anonymized action implementation data |
Atif Mahadik, Govind Salinas, Sourabh Satish |
2023-11-07 |
| 11805148 |
Modifying incident response time periods based on incident volume |
Sourabh Satish, Atif Mahadik, Govind Salinas |
2023-10-31 |
| 11765198 |
Selecting actions responsive to computing environment incidents based on severity rating |
Sourabh Satish, Atif Mahadik, Govind Salinas |
2023-09-19 |
| 11757925 |
Managing security actions in a computing environment based on information gathering activity of a security threat |
Sourabh Satish, Atif Mahadik, Govind Salinas |
2023-09-12 |
| 11677780 |
Identifying automated response actions based on asset classification |
Sourabh Satish, Atif Mahadik, Govind Salinas |
2023-06-13 |
| 11658998 |
Translating security actions into computing asset-specific action procedures |
Sourabh Satish, Atif Mahadik, Govind Salinas |
2023-05-23 |
| 11652849 |
Identifying recommended feature sets based on application feature popularity |
Sourabh Satish, Atif Mahadik, Govind Salinas, Ryan Scott Russell |
2023-05-16 |
| 11647043 |
Identifying security actions based on computing asset relationship data |
Sourabh Satish, Atif Mahadik, Govind Salinas |
2023-05-09 |
| 11588678 |
Generating incident response action recommendations using anonymized action implementation data |
Atif Mahadik, Govind Salinas, Sourabh Satish |
2023-02-21 |