Automated security solutions identification and architecture design
Abstract:
Systems, apparatuses, and methods directed to security enhancement. One or more remote data sources may be accessed to retrieve remote data associated with security for a computing architecture. An input model of an input network security architecture may be identified. One or more user-based constraints may be identified. An output model may be automatically generated based on the input model, the remote data and the one or more user-based constraints. The output model is an output network security architecture that complies with the one or more user-based constraints.
Information query
Patent Agency Ranking
0/0