Patent attributes
A method for real-time threat monitoring includes identifying two or more real time vulnerabilities, each associated with one or more objects of an enterprise, correlating the two or more real-time vulnerabilities to each other, applying an exposure tiering model to the correlated real-time vulnerability, thereby classifying the correlated real-time vulnerability into risk tiers, and initiating an alert based on the correlated real-time vulnerability and the exposure tiers into which the correlated real-time vulnerability is classified. According to other embodiments a method includes applying an exposure methodology to log data contained in one or more object logs thereby identifying one or more security events, applying an exposure tiering model to the one or more security events, thereby classifying the security events into exposure tiers, and initiating an alert based on the security events and the exposure tiers into which the security events are classified.