Patents Assigned to ITsMine Ltd.
-
Patent number: 12149538Abstract: A system and method for the deployment of deceptive decoy elements in a computerized environment to increase user compliance with a cyber security policy. A method includes: deploying a deceptive decoy element in a folder stored in a computerized environment, wherein a user is associated with a dataset indicating a user permission, the folder having a sensitivity level, wherein the deceptive decoy element is a data element deployed based on the sensitivity level of the folder in which the deceptive decoy element is deployed, wherein each deceptive decoy element is configured to provide an indication of a trigger event when triggered by the user; generating a customized electronic message for the user when the indication of the trigger event is provided by the deceptive decoy element, wherein the customized electronic message is generated based on the dataset associated with the user; and sending the customized electronic message for display.Type: GrantFiled: December 29, 2021Date of Patent: November 19, 2024Assignee: ITsMine Ltd.Inventors: Ran Norman, Guy Ben Mayor, Kfir Kimhi
-
Publication number: 20230385453Abstract: A system and method for securing computerized environments using digital rights management. A method includes applying a security policy to a folder in a computerized environment such that the security policy is enforced on each file of the folder; associating a deactivation rule to each of at least one file deployed in the folder based on the security policy, wherein the deactivation rule associated with each file defines a time period with respect to the file after which the file expires; and associating each of the at least one file with a unique identifier, wherein the unique identifier is periodically updated while each of the at least one file is stored in the folder, wherein the security policy is enforced on the at least one file based on the respective unique identifier associated with each of the at least one file.Type: ApplicationFiled: May 31, 2023Publication date: November 30, 2023Applicant: ITsMine Ltd.Inventors: Ran NORMAN, Kfir KIMHI, Guy BEN MAYOR
-
Patent number: 11750623Abstract: A system and method for conducting a computerized surveillance in a computerized environment, including: initiating an installation of an agent on an endpoint device (EPD) in response to an indication of a potential malicious activity executed on the EPD; activating the agent to collect data on the EPD; based on the analysis of the collected data, selecting at least one mitigation action to be executed by the agent; and initiating an uninstallation of the agent from the EPD.Type: GrantFiled: September 4, 2018Date of Patent: September 5, 2023Assignee: ITSMINE LTD.Inventors: Kfir Kimhi, Ran Norman, Guy Ben Mayor
-
Patent number: 11687650Abstract: A method and system for a deployment of deceptive decoy elements in a computerized environment to identify data leakage processes invoked by suspicious entities are presented. The method includes generating at least one deceptive decoy element; and deploying the generated at least one deceptive decoy element in a folder in a file system of the computerized environment, wherein the deployment is based on a sensitivity level of the folder, wherein the at least one deceptive decoy element is configured to provide an indication of unauthorized access upon an attempt by an unauthorized entity to access the folder.Type: GrantFiled: May 4, 2021Date of Patent: June 27, 2023Assignee: ITSMINE LTD.Inventors: Kfir Kimhi, Ran Norman, Guy Ben Mayor
-
Publication number: 20220210163Abstract: A system and method for the deployment of deceptive decoy elements in a computerized environment to increase user compliance with a cyber security policy. A method includes: deploying a deceptive decoy element in a folder stored in a computerized environment, wherein a user is associated with a dataset indicating a user permission, the folder having a sensitivity level, wherein the deceptive decoy element is a data element deployed based on the sensitivity level of the folder in which the deceptive decoy element is deployed, wherein each deceptive decoy element is configured to provide an indication of a trigger event when triggered by the user; generating a customized electronic message for the user when the indication of the trigger event is provided by the deceptive decoy element, wherein the customized electronic message is generated based on the dataset associated with the user; and sending the customized electronic message for display.Type: ApplicationFiled: December 29, 2021Publication date: June 30, 2022Applicant: ITsMine Ltd.Inventors: Ran NORMAN, Guy BEN MAYOR, Kfir KIMHI
-
Publication number: 20210256120Abstract: A method and system for a deployment of deceptive decoy elements in a computerized environment to identify data leakage processes invoked by suspicious entities are presented. The method includes generating at least one deceptive decoy element; and deploying the generated at least one deceptive decoy element in a folder in a file system of the computerized environment, wherein the deployment is based on a sensitivity level of the folder, wherein the at least one deceptive decoy element is configured to provide an indication of unauthorized access upon an attempt by an unauthorized entity to access the folder.Type: ApplicationFiled: May 4, 2021Publication date: August 19, 2021Applicant: ITsMine Ltd.Inventors: Kfir KIMHI, Ran NORMAN, Guy BEN MAYOR
-
Patent number: 11093611Abstract: A method and system for the deployment of deceptive decoy elements in a computerized environment to identify data leakage processes invoked by suspicious entities are presented. The method includes generating at least one deceptive decoy element; and deploying the generated at least one deceptive decoy element in a folder in a file system of the computerized environment, wherein the deployment is based on a sensitivity level of the folder, wherein the at least one deceptive decoy element is configured to provide an indication of unauthorized access upon an attempt by an unauthorized entity to access the folder.Type: GrantFiled: June 25, 2018Date of Patent: August 17, 2021Assignee: Itsmine LTD.Inventors: Kfir Kimhi, Ran Norman, Guy Ben Mayor
-
Publication number: 20210067554Abstract: A system and method for real-time notifications of data breach in a computerized environment are provided. The method includes receiving a unique digital certificate, wherein the unique digital certificate includes an identifier utilized to initiate communication with the computing device upon a validation attempt of the unique digital certificate; associating the unique digital certificate with a first deceptive decoy element of a plurality of deceptive decoy elements deployed in a data source of the computerized environment; and generating a notification indicative of a data breach, in real-time, upon receipt of a request for validation of the unique digital certificate associated with the first deceptive decoy element, wherein the data breach is of the first deceptive decoy element; and sending the generated notification to at least one predetermined computerized source.Type: ApplicationFiled: September 2, 2020Publication date: March 4, 2021Applicant: ItsMine Ltd.Inventors: Ran NORMAN, David ALLOUCH, Kfir KIMHI, Guy BEN MAYOR
-
Publication number: 20190075124Abstract: A system and method for conducting a computerized surveillance in a computerized environment, including: initiating an installation of an agent on an endpoint device (EPD) in response to an indication of a potential malicious activity executed on the EPD; activating the agent to collect data on the EPD; based on the analysis of the collected data, selecting at least one mitigation action to be executed by the agent; and initiating an uninstallation of the agent from the EPD.Type: ApplicationFiled: September 4, 2018Publication date: March 7, 2019Applicant: ITsMine Ltd.Inventors: Kfir KIMHI, Ran NORMAN, Guy BEN MAYOR
-
Publication number: 20180373868Abstract: A method and system for the deployment of deceptive decoy elements in a computerized environment to identify data leakage processes invoked by suspicious entities are presented. The method includes generating at least one deceptive decoy element; and deploying the generated at least one deceptive decoy element in a folder in a file system of the computerized environment, wherein the deployment is based on a sensitivity level of the folder, wherein the at least one deceptive decoy element is configured to provide an indication of unauthorized access upon an attempt by an unauthorized entity to access the folder.Type: ApplicationFiled: June 25, 2018Publication date: December 27, 2018Applicant: ITsMine Ltd.Inventors: Kfir KIMHI, Ran NORMAN, Guy BEN MAYOR