Abstract: Methods and systems are disclosed for identifying security risks, arising from credentials existing on machines in the networks that enable access to other machines on the networks. Account credentials indications are retrieved from machines in the network, which indicate that credentials for accounts are stored on those machines. Access rights for accounts are collected, describing the access and operation permissions of these accounts on machines in the networks. A correlation is then performed to identify machines that can be accessed by employing credentials of accounts retrieved from other machines in the network.
Abstract: Methods and systems are disclosed for detecting improper, and otherwise unauthorized actions, associated with network resources, the actions including access to the resource and activity associated with the resource. The unauthorized actions are detected by analyzing action data of user actions employing accounts managed by a privileged access management system and associated with a network resource against profiles and rules to discover anomalies and/or deviations from rules associated with the network resource or accounts.
Type:
Application
Filed:
October 24, 2013
Publication date:
April 30, 2015
Applicant:
Cyber-Ark Software Ltd.
Inventors:
Andrey DULKIN, Yair Sade, Roy Adar, Aviram Shmueli
Abstract: Protected publication of sensitive documents with authentication and accountability enables storing and sharing confidential files, while reducing risk that a recipient will distribute and share the file information with unauthorized recipients. Every user request for an original file generates a unique provided file based on the original file, the user request, and configuration information. The provided file has characteristics that make the provided file based on a first user request unique from any other provided file based on any other user request. Unique characteristics include changing the format of the original file to another format for the provided file, altering file properties, altering file content, and watermarking.
Type:
Application
Filed:
April 6, 2014
Publication date:
April 30, 2015
Applicant:
CYBER-ARK SOFTWARE LTD.
Inventors:
Andrey DULKIN, Ori HIRSHFELD, Oded VALIN
Abstract: Methods and systems are disclosed for detecting unauthorized actions associated with network resources, the actions including access to the resource and activity associated with the resource. The unauthorized actions are detected by analyzing action data of a client action associated with the network resource against credential retrieval data including records of authorized actions and/or procedures for performing an action associated with the network resource.
Abstract: In some embodiments, an apparatus includes a control chain generation module is configured to receive, from a control database, a security guideline control to be implemented with respect to a hardware asset. The control chain generation module is configured to select, based on requirements to satisfy the security guideline and attributes of the hardware asset, a security implementation control. The control chain generation module is configured to select a control assessor to monitor the compliance of the hardware asset with the security guideline and is configured to define a control chain including the security guideline control, the security implementation control, and the control assessor. The control chain generation module is configured to send an instruction to apply the control chain to the hardware asset such that the control assessor monitors the hardware asset for compliance with the security guideline.
Abstract: Apparatus and method converting feedstock (e.g., chicken litter) into oil, gas, and ash fertilizer has a reformer unit with (i) a feedstock input, (ii) an outer wall, (iii) a reaction chamber with an inner wall, (iv) a combustion gas input, (v) a scrubbing liquid input, (vi) a feedstock stirrer, (vii) an ash stirrer, (viii) an ash plate below the reaction chamber, and (ix) a combined liquid/gas output. The ash plate is separated from the inner wall. Feedstock and scrubbing liquid are preferably reacted within the reaction chamber to release useful hydrocarbon liquids and gasses which migrate to the top of the reformer, while ash from the reaction falls onto the ash plate from where it is output. Liquid/gas pump structure sends the combined liquid/gas from the reformer to gas/liquid separator structure which provides a gas output and a liquid output. The gas output may be used, flamed off, and/or recirculated to the reaction chamber. Oil/water separator structure receives the liquid output and provides a (e.g.
Abstract: Methods, compositions and kits are disclosed directed at levetiracetam derivatives, immunogens, signal generating moieties, antibodies that bind levetiracetam and immunoassays for detection of levetiracetam.
Type:
Grant
Filed:
March 22, 2012
Date of Patent:
September 23, 2014
Assignee:
ARK Diagnostics, Inc.
Inventors:
Johnny Jose Valdez, Byung Sook Moon, Ki Chung, Alejandro A. Orozco
Abstract: A method for inducing an immune response by injecting an immunogen into a subject's testis. A composition for intra-testicular injection including an immunogen such as a rabies vaccine and a chemical sterilant formed of zinc gluconate and an amino acid capable of forming an aqueous solution neutralized to a pH from 6.0 to 7.5. When injected intra-testicularly, the immunogen is slowly released reducing or eliminating the need for a “booster” dose, while the chemical sterilant is effective at reducing the dog population.
Abstract: Compounds and methods for use in detecting gabapentin in a sample suspected of containing gabapentin are disclosed. Gabapentin derivatives are used to produce gabapentin conjugates. A gabapentin-immunogenic carrier conjugate may be used as an immunogen for the preparation of an anti-gabapentin antibody. A gabapentin-detectable label may be used in a signal producing system in gabapentin assays.
Type:
Grant
Filed:
February 15, 2008
Date of Patent:
September 9, 2014
Assignee:
ARK Diagnostics, Inc.
Inventors:
Johnny Jose Valdez, Byung Sook Moon, Michael Kevin Helms, Alejandro A. Orozco
Abstract: A particle filter arrangement for filtering exhaust gases of an internal combustion engine such as a diesel internal combustion engine, includes an inlet and an outlet and at least one particle filter arranged in the flow path of the exhaust gases between the inlet and outlet. The exhaust gases are conducted in a line, with the line having a first segment in which the exhaust gases are conducted substantially in the direction of the outlet. The line has a second segment in which the exhaust gases are conducted substantially in the direction of the inlet. An operating temperature of the arrangement sufficiently high to prevent full loading of the filter is generated particularly quickly in that the line also includes a third segment in which the exhaust gases are conducted substantially in the direction of the outlet.
Abstract: A sludge dehydrating apparatus (200) according to the present invention is configured such that power is provided at opposite sides of a rotating rod (243) of movable disks (230) so that even if the apparatus is comparatively large or is operated at low speed, the rotating rod of the movable disks (230) can be prevented from being deformed. Thereby, the movable disks (230) can be smoothly rotated at the same time, thus enhancing the efficiency of the dehydration operation. Furthermore, because power is provided on the opposite sides both of the rotating rod (243) of the movable disks (230) and of the drive shaft of a screw (210), even if the screw (210) is comparatively long, the drive shaft of the screw (210) can be preventing from bending, thus preventing malfunction of the apparatus such as deformation of a fixed disk or a movable disk.
Abstract: An agent comprises a vector having a functional gene, a prodrug which can be converted into a cytotoxic agent by an expression product of the gene, and another cytotoxic agent, as a combined preparation for simultaneous, sequential or separate use in the therapy of cancer or of a disease characterised by an impaired mismatch repair (MMR) pathway, wherein the dosage regimen comprises beginning the another cytotoxic agent therapy no later than 7 days after the prodrug therapy has finished.
Type:
Application
Filed:
January 18, 2012
Publication date:
November 21, 2013
Applicant:
Ark Therapeutics, Ltd.
Inventors:
Haritha Samaranayake, Jere Pikkarainen, Ann-Marie Maatta, Seppo Yla-Herttuala
Abstract: An agent comprises a vector having a functional gene, a prodrug which can be converted into a cytotoxic agent by an expression product of the gene, and another cytotoxic agent, as a combined preparation for simultaneous, sequential or separate use in the therapy of cancer or of a disease characterised by an impaired mismatch repair (MMR) pathway, wherein the dosage regimen comprises beginning another cytotoxic agent therapy no later than 7 days after the prodrug therapy has finished.
Type:
Application
Filed:
May 1, 2013
Publication date:
November 7, 2013
Applicant:
ARK THERAPEUTICS, LTD.
Inventors:
Haritha SAMARANAYAKE, Jere PIKKARAINEN, Ann-Marie MAATTA, Seppo YLA-HERTTUALA
Abstract: A rolled terminal (50) for an electrical connector has a first portion (58) formed of a rolled sheet defining a bore for receiving an electrical wire, and a first aperture (62) in the wall of the first portion (58) for receiving a screw for clamping the wire between the screw and the wall of the first portion.
Abstract: The present invention discloses methods, media, and systems for handling hard-coded credentials, the system including: an interception module configured for: intercepting credential usage upon receiving an application request for application credentials in order to provide access to a host application; a configuration/settings module configured for reading system configurations and settings for handling the application credentials; a credential-mapping module configured for: applying appropriate credential-mapping logic based on the system configurations and settings; and upon determining that the application credentials need to be replaced, obtaining appropriate credentials from a secured storage.