An isolation approach for network users associated with elevated risk is disclosed for protecting networks. In one approach a method comprises the computer-implemented steps of determining a user identifier associated with a network device that has caused a security event in a network; causing the network device to receive a network address that is selected from a subset of addresses within a specified pool associated with suspected malicious network users; and configuring one or more security restrictions with respect to the selected network address.

 
Web www.patentalert.com

< Method and apparatus for load balancing within a computer system

> Apparatus for acquiring tomographic image formed by ultrasound-modulated fluorescence

> System and method for testing a modification to a process using a simulator

~ 00553