Patents Assigned to ITsMine Ltd.
  • Patent number: 12149538
    Abstract: A system and method for the deployment of deceptive decoy elements in a computerized environment to increase user compliance with a cyber security policy. A method includes: deploying a deceptive decoy element in a folder stored in a computerized environment, wherein a user is associated with a dataset indicating a user permission, the folder having a sensitivity level, wherein the deceptive decoy element is a data element deployed based on the sensitivity level of the folder in which the deceptive decoy element is deployed, wherein each deceptive decoy element is configured to provide an indication of a trigger event when triggered by the user; generating a customized electronic message for the user when the indication of the trigger event is provided by the deceptive decoy element, wherein the customized electronic message is generated based on the dataset associated with the user; and sending the customized electronic message for display.
    Type: Grant
    Filed: December 29, 2021
    Date of Patent: November 19, 2024
    Assignee: ITsMine Ltd.
    Inventors: Ran Norman, Guy Ben Mayor, Kfir Kimhi
  • Publication number: 20230385453
    Abstract: A system and method for securing computerized environments using digital rights management. A method includes applying a security policy to a folder in a computerized environment such that the security policy is enforced on each file of the folder; associating a deactivation rule to each of at least one file deployed in the folder based on the security policy, wherein the deactivation rule associated with each file defines a time period with respect to the file after which the file expires; and associating each of the at least one file with a unique identifier, wherein the unique identifier is periodically updated while each of the at least one file is stored in the folder, wherein the security policy is enforced on the at least one file based on the respective unique identifier associated with each of the at least one file.
    Type: Application
    Filed: May 31, 2023
    Publication date: November 30, 2023
    Applicant: ITsMine Ltd.
    Inventors: Ran NORMAN, Kfir KIMHI, Guy BEN MAYOR
  • Patent number: 11750623
    Abstract: A system and method for conducting a computerized surveillance in a computerized environment, including: initiating an installation of an agent on an endpoint device (EPD) in response to an indication of a potential malicious activity executed on the EPD; activating the agent to collect data on the EPD; based on the analysis of the collected data, selecting at least one mitigation action to be executed by the agent; and initiating an uninstallation of the agent from the EPD.
    Type: Grant
    Filed: September 4, 2018
    Date of Patent: September 5, 2023
    Assignee: ITSMINE LTD.
    Inventors: Kfir Kimhi, Ran Norman, Guy Ben Mayor
  • Patent number: 11687650
    Abstract: A method and system for a deployment of deceptive decoy elements in a computerized environment to identify data leakage processes invoked by suspicious entities are presented. The method includes generating at least one deceptive decoy element; and deploying the generated at least one deceptive decoy element in a folder in a file system of the computerized environment, wherein the deployment is based on a sensitivity level of the folder, wherein the at least one deceptive decoy element is configured to provide an indication of unauthorized access upon an attempt by an unauthorized entity to access the folder.
    Type: Grant
    Filed: May 4, 2021
    Date of Patent: June 27, 2023
    Assignee: ITSMINE LTD.
    Inventors: Kfir Kimhi, Ran Norman, Guy Ben Mayor
  • Publication number: 20220210163
    Abstract: A system and method for the deployment of deceptive decoy elements in a computerized environment to increase user compliance with a cyber security policy. A method includes: deploying a deceptive decoy element in a folder stored in a computerized environment, wherein a user is associated with a dataset indicating a user permission, the folder having a sensitivity level, wherein the deceptive decoy element is a data element deployed based on the sensitivity level of the folder in which the deceptive decoy element is deployed, wherein each deceptive decoy element is configured to provide an indication of a trigger event when triggered by the user; generating a customized electronic message for the user when the indication of the trigger event is provided by the deceptive decoy element, wherein the customized electronic message is generated based on the dataset associated with the user; and sending the customized electronic message for display.
    Type: Application
    Filed: December 29, 2021
    Publication date: June 30, 2022
    Applicant: ITsMine Ltd.
    Inventors: Ran NORMAN, Guy BEN MAYOR, Kfir KIMHI
  • Publication number: 20210256120
    Abstract: A method and system for a deployment of deceptive decoy elements in a computerized environment to identify data leakage processes invoked by suspicious entities are presented. The method includes generating at least one deceptive decoy element; and deploying the generated at least one deceptive decoy element in a folder in a file system of the computerized environment, wherein the deployment is based on a sensitivity level of the folder, wherein the at least one deceptive decoy element is configured to provide an indication of unauthorized access upon an attempt by an unauthorized entity to access the folder.
    Type: Application
    Filed: May 4, 2021
    Publication date: August 19, 2021
    Applicant: ITsMine Ltd.
    Inventors: Kfir KIMHI, Ran NORMAN, Guy BEN MAYOR
  • Patent number: 11093611
    Abstract: A method and system for the deployment of deceptive decoy elements in a computerized environment to identify data leakage processes invoked by suspicious entities are presented. The method includes generating at least one deceptive decoy element; and deploying the generated at least one deceptive decoy element in a folder in a file system of the computerized environment, wherein the deployment is based on a sensitivity level of the folder, wherein the at least one deceptive decoy element is configured to provide an indication of unauthorized access upon an attempt by an unauthorized entity to access the folder.
    Type: Grant
    Filed: June 25, 2018
    Date of Patent: August 17, 2021
    Assignee: Itsmine LTD.
    Inventors: Kfir Kimhi, Ran Norman, Guy Ben Mayor
  • Publication number: 20210067554
    Abstract: A system and method for real-time notifications of data breach in a computerized environment are provided. The method includes receiving a unique digital certificate, wherein the unique digital certificate includes an identifier utilized to initiate communication with the computing device upon a validation attempt of the unique digital certificate; associating the unique digital certificate with a first deceptive decoy element of a plurality of deceptive decoy elements deployed in a data source of the computerized environment; and generating a notification indicative of a data breach, in real-time, upon receipt of a request for validation of the unique digital certificate associated with the first deceptive decoy element, wherein the data breach is of the first deceptive decoy element; and sending the generated notification to at least one predetermined computerized source.
    Type: Application
    Filed: September 2, 2020
    Publication date: March 4, 2021
    Applicant: ItsMine Ltd.
    Inventors: Ran NORMAN, David ALLOUCH, Kfir KIMHI, Guy BEN MAYOR
  • Publication number: 20190075124
    Abstract: A system and method for conducting a computerized surveillance in a computerized environment, including: initiating an installation of an agent on an endpoint device (EPD) in response to an indication of a potential malicious activity executed on the EPD; activating the agent to collect data on the EPD; based on the analysis of the collected data, selecting at least one mitigation action to be executed by the agent; and initiating an uninstallation of the agent from the EPD.
    Type: Application
    Filed: September 4, 2018
    Publication date: March 7, 2019
    Applicant: ITsMine Ltd.
    Inventors: Kfir KIMHI, Ran NORMAN, Guy BEN MAYOR
  • Publication number: 20180373868
    Abstract: A method and system for the deployment of deceptive decoy elements in a computerized environment to identify data leakage processes invoked by suspicious entities are presented. The method includes generating at least one deceptive decoy element; and deploying the generated at least one deceptive decoy element in a folder in a file system of the computerized environment, wherein the deployment is based on a sensitivity level of the folder, wherein the at least one deceptive decoy element is configured to provide an indication of unauthorized access upon an attempt by an unauthorized entity to access the folder.
    Type: Application
    Filed: June 25, 2018
    Publication date: December 27, 2018
    Applicant: ITsMine Ltd.
    Inventors: Kfir KIMHI, Ran NORMAN, Guy BEN MAYOR