| CPC H04L 63/1425 (2013.01) [G06F 8/61 (2013.01); G06F 9/44526 (2013.01); H04L 41/046 (2013.01); H04L 41/0893 (2013.01); H04L 41/16 (2013.01); H04L 63/08 (2013.01); H04L 63/102 (2013.01); H04L 63/104 (2013.01); H04L 63/1416 (2013.01); H04L 63/1441 (2013.01); H04L 63/205 (2013.01); H04L 67/10 (2013.01); H04L 67/34 (2013.01); H04L 41/12 (2013.01); H04L 41/145 (2013.01)] | 12 Claims |

|
1. A computer-implemented method comprising:
monitoring, by a software agent operating on an endpoint of a computer network, one or more processes or network communications of the endpoint to obtain endpoint data,
wherein at least one endpoint of the computer network is located outside of a computer network firewall,
wherein the software agent is configured to perform a point-in-time validation of the endpoint, and
wherein the point-in-time validation comprises a verification that no anomalous indicators are present on the endpoint;
identifying, by the software agent, an anomalous indicator on the endpoint based at least in part on the endpoint data, wherein identifying the anomalous indicator comprises comparing activity on the endpoint to prior activity on the endpoint; and
responding, by the software agent, to the anomalous indicator on an endpoint-level by limiting one or more operating system processes or network communications of the endpoint.
|