Patents by Inventor Galit Efron

Galit Efron has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8429751
    Abstract: A system and method for protection of Web based applications are described. Anomalous traffic can be identified by comparing the traffic to a profile of acceptable user traffic when interacting with the application. Phishing and leeching are one type of anomalous traffic that is detected. The anomalous traffic, or security events, identified at the individual computer networks are communicated to a central security manager. Various responsive actions may be taken in response to detection of phishing or leeching.
    Type: Grant
    Filed: March 12, 2010
    Date of Patent: April 23, 2013
    Assignee: Trustwave Holdings, Inc.
    Inventors: Rami Mizrahi, Galit Efron-Nitzan, Or Katz
  • Patent number: 7934253
    Abstract: A system and method for protection of Web based applications are described. The techniques described provide an enterprise wide approach to preventing attacks of Web based applications. Individual computer networks within the enterprise monitor network traffic to identify anomalous traffic. The anomalous traffic can be identified by comparing the traffic to a profile of acceptable user traffic when interacting with the application. The anomalous traffic, or security events, identified at the individual computer networks are communicated to a central security manager. The central security manager correlates the security events at the individual computer networks to determine if there is an enterprise wide security threat. The central security manager can then communicate instructions to the individual computer networks so as to provide an enterprise wide solution to the threat.
    Type: Grant
    Filed: September 14, 2006
    Date of Patent: April 26, 2011
    Assignee: TrustWave Holdings, Inc.
    Inventors: Kevin Overcash, Kate Delikat, Rami Mizrahi, Galit Efron, Doron Kolton, Asaf Wexler, Netta Gavrieli, Yoram Zahavi
  • Publication number: 20100235918
    Abstract: A system and method for protection of Web based applications are described. Anomalous traffic can be identified by comparing the traffic to a profile of acceptable user traffic when interacting with the application. Phishing and leeching are one type of anomalous traffic that is detected. The anomalous traffic, or security events, identified at the individual computer networks are communicated to a central security manager. Various responsive actions may be taken in response to detection of phishing or leeching.
    Type: Application
    Filed: March 12, 2010
    Publication date: September 16, 2010
    Inventors: Rami Mizrahi, Galit Efron-Nitzan, Or Katz
  • Publication number: 20100192201
    Abstract: A system and method for protection of Web based applications are described. Anomalous traffic can be identified by comparing the traffic to a profile of acceptable user traffic when interacting with the application. Excessive access rates are one type of anomalous traffic that is detected by monitoring a source and determining whether the number of requests that the source generates within a specific time frame is above a threshold. The anomalous traffic, or security events, identified at the individual computer networks are communicated to a central security manager. The central security manager correlates the security events at the individual computer networks to determine if there is an enterprise wide security threat. The central security manager can then communicate instructions to the individual computer networks so as to provide an enterprise wide solution to the threat. Various responsive actions may be taken in response to detection of an excessive access rate.
    Type: Application
    Filed: January 29, 2010
    Publication date: July 29, 2010
    Applicant: Breach Security, Inc.
    Inventors: Asaf Shimoni, Galit Efron-Nitzan, Ofer Shezaf, Rami Mizrahi
  • Publication number: 20080047009
    Abstract: A system and method for protection of Web based applications are described. A Web application security system is included within a computer network to monitor traffic received from a wide area network, such as the Internet, and determine if there is a threat to the Web application. The Web application security system monitors web traffic in a non-inline configuration and identifies any anomalous traffic against a profile that identifies acceptable behavior of a user of the application. Any anomalous traffic is analyzed and appropriate protective action is taken to secure the Web application against an attack.
    Type: Application
    Filed: July 20, 2006
    Publication date: February 21, 2008
    Inventors: Kevin Overcash, Kate Delikat, Rami Mizrahi, Galit Efron (Njtzan), Doron Kolton, Asaf Wexler, Netta Gavrieli, Yoram Zahavi
  • Publication number: 20080034425
    Abstract: A system and method for protection of Web based applications are described. The techniques described provide an enterprise wide approach to preventing attacks of Web based applications. Individual computer networks within the enterprise monitor network traffic to identify anomalous traffic. The anomalous traffic can be identified by comparing the traffic to a profile of acceptable user traffic when interacting with the application. The anomalous traffic, or security events, identified at the individual computer networks are communicated to a central security manager. The central security manager correlates the security events at the individual computer networks to determine if there is an enterprise wide security threat.
    Type: Application
    Filed: September 14, 2006
    Publication date: February 7, 2008
    Inventors: Kevin Overcash, Kate Delikate, Rami Mizrahi, Galit Efron, Doron Kolton, Asaf Wexler, Netta Gavrieli, Yoram Zahavi
  • Publication number: 20080034424
    Abstract: A system and method for protection of Web based applications are described. An agent is included in a web server such that traffic is routed through the agent. A security module is also in communication with the agent. The agent receives information about the application profile, and patterns of acceptable traffic behavior, from the security module. The agent acts as a gatekeeper, holding up suspicious traffic that does not match the pattern of acceptable traffic behavior until the suspicious traffic has been analyzed by the security module. Using the agent, malicious traffic can dropped before it can reach the application, or the user can be logged out, or both.
    Type: Application
    Filed: September 14, 2006
    Publication date: February 7, 2008
    Inventors: Kevin Overcash, Kate Delikate, Rami Mizrahi, Galit Efron, Doron Kolton, Asaf Wexler, Netta Gavrieli, Yoram Zahavi