86875318
Jan 14, 2016
Computer software for use in the collection, persistence, aggregation, identification and classification of network threat intelligence data used for protecting networks. The software enables users to retrieve threat intelligence data from sources available on the internet that are either open source or through paid subscription. Data is retrieved from these sources, cleansed and persisted (stored) locally. Once the data is stored, a series of analytics are run on the collected data which produce a consolidated threat feed. The software includes code, scripts for starting/stopping/monitoring, a set of wrapped algorithms, proprietary processing flows and reporting formats
Electrical and Scientific Apparatus