Patents by Inventor Asaf Hecht
Asaf Hecht has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210103454Abstract: Disclosed embodiments relate to systems and methods for enabling recovery of deactivated virtual computing instances that were previously instantiated in a dynamic virtualized computing environment. Techniques include identifying a status change for a virtual computing instance; archiving a plurality of environment properties representing a chain of activities comprising a plurality of activities executed by a processor of the virtual computing instance; and reactivating the virtual computing instance. Reactivating the virtual computing instance may include reinstantiation of the virtual computing instance based on the plurality of environment properties and chain of activities such that the virtual computing instance is reinstantiated to a state at a time of the status change.Type: ApplicationFiled: May 26, 2020Publication date: April 8, 2021Applicant: CyberArk Software Ltd.Inventor: Asaf HECHT
-
Patent number: 10880336Abstract: Disclosed embodiments relate to systems and methods for multidimensional vectors for analyzing and visually displaying identity permissions. Techniques include identifying a plurality of identities, privileges used by the identities, and data associated with the identities, developing privilege vectors based on the identified information, and generating groupings of the identities based on the privilege vectors. Further techniques include generating a group score for an identity grouping, using the group score to determine if the grouping is a least privilege grouping, and updating the privileges of the identities within the grouping.Type: GrantFiled: July 23, 2020Date of Patent: December 29, 2020Assignee: CyberArk Software Ltd.Inventors: Michael Balber, Asaf Hecht
-
Publication number: 20200364345Abstract: Disclosed embodiments relate to systems and methods for automatically detecting and addressing security risks in code segments. Techniques include accessing a plurality of code segments developed for execution in a network environment, automatically identifying a first code segment from the plurality of code segments for analysis, automatically performing a first code-level security risk assessment for the first code segment, and determining a first security risk level for the first code segment based on the application programming interface risk level. The first code-level security risk assessment may be performed based on at least one of an application programming interface risk level, an embedded credentials risk level, and a target resource risk level. Further techniques may include determining a second security risk level for a modified version of the first code segment; and enabling a comparison between the first security risk level and the second security risk level.Type: ApplicationFiled: March 20, 2020Publication date: November 19, 2020Applicant: CyberArk Software Ltd.Inventors: ASAF HECHT, Hadas Elkabir
-
Patent number: 10749910Abstract: Disclosed embodiments relate to systems and methods for multidimensional vectors for analyzing and visually displaying identity permissions. Techniques include identifying a plurality of identities, privileges used by the identities, and data associated with the identities, developing privilege vectors based on the identified information, and generating groupings of the identities based on the privilege vectors. Further techniques include generating a group score for an identity grouping, using the group score to determine if the grouping is a least privilege grouping, and updating the privileges of the identities within the grouping.Type: GrantFiled: April 24, 2020Date of Patent: August 18, 2020Assignee: CyberArk Software Ltd.Inventors: Michael Balber, Asaf Hecht
-
Patent number: 10735433Abstract: Systems and methods are provided for automatically discovering and evaluating privileged entities in a network environment. The systems and methods can include scanning the network environment to identify a plurality of network entities. This scan can include identifying network permissions corresponding to the plurality of network entities. The operations can further include performing a multi-layer evaluation of the permissions corresponding to the plurality of network entities, the multi-layer evaluation being based at least on factors of network action sensitivity and network resource sensitivity. The network action sensitivity factor can address the sensitivity of particular actions that the plurality of network entities are able to take in the network environment. The network resource sensitivity factor can address the sensitivity of particular resources in the network environment that the plurality of network entities are able to access.Type: GrantFiled: March 9, 2020Date of Patent: August 4, 2020Assignee: CyberArk Software Ltd.Inventor: Asaf Hecht
-
Publication number: 20200213324Abstract: Systems and methods are provided for automatically discovering and evaluating privileged entities in a network environment. The systems and methods can include scanning the network environment to identify a plurality of network entities. This scan can include identifying network permissions corresponding to the plurality of network entities. The operations can further include performing a multi-layer evaluation of the permissions corresponding to the plurality of network entities, the multi-layer evaluation being based at least on factors of network action sensitivity and network resource sensitivity. The network action sensitivity factor can address the sensitivity of particular actions that the plurality of network entities are able to take in the network environment. The network resource sensitivity factor can address the sensitivity of particular resources in the network environment that the plurality of network entities are able to access.Type: ApplicationFiled: March 9, 2020Publication date: July 2, 2020Applicant: CyberArk Software Ltd.Inventor: Asaf Hecht
-
Patent number: 10678586Abstract: Disclosed embodiments relate to systems and methods for enabling recovery of deactivated virtual computing instances that were previously instantiated in a dynamic virtualized computing environment. Techniques include identifying a status change for a virtual computing instance; archiving a plurality of environment properties representing a chain of activities comprising a plurality of activities executed by a processor of the virtual computing instance; and reactivating the virtual computing instance. Reactivating the virtual computing instance may include reinstantiation of the virtual computing instance based on the plurality of environment properties and chain of activities such that the virtual computing instance is reinstantiated to a state at a time of the status change.Type: GrantFiled: October 8, 2019Date of Patent: June 9, 2020Assignee: CYBERARK SOFTWARE LTD.Inventor: Asaf Hecht
-
Patent number: 10609038Abstract: Systems and methods are provided for automatically discovering and evaluating privileged entities in a network environment. The systems and methods can include scanning the network environment to identify a plurality of network entities. This scan can include identifying network permissions corresponding to the plurality of network entities. The operations can further include performing a multi-layer evaluation of the permissions corresponding to the plurality of network entities, the multi-layer evaluation being based at least on factors of network action sensitivity and network resource sensitivity. The network action sensitivity factor can address the sensitivity of particular actions that the plurality of network entities are able to take in the network environment. The network resource sensitivity factor can address the sensitivity of particular resources in the network environment that the plurality of network entities are able to access.Type: GrantFiled: February 20, 2018Date of Patent: March 31, 2020Assignee: CyberArk Software Ltd.Inventor: Asaf Hecht
-
Patent number: 10607015Abstract: Disclosed embodiments relate to systems and methods for automatically detecting and addressing security risks in code segments. Techniques include accessing a plurality of code segments developed for execution in a network environment, automatically identifying a first code segment from the plurality of code segments for analysis, automatically performing a first code-level security risk assessment for the first code segment, and determining a first security risk level for the first code segment based on the application programming interface risk level. The first code-level security risk assessment may be performed based on at least one of an application programming interface risk level, an embedded credentials risk level, and a target resource risk level. Further techniques may include determining a second security risk level for a modified version of the first code segment; and enabling a comparison between the first security risk level and the second security risk level.Type: GrantFiled: May 16, 2019Date of Patent: March 31, 2020Assignee: CYBERARK SOFTWARE LTD.Inventors: Asaf Hecht, Hadas Elkabir
-
Publication number: 20200057848Abstract: Techniques include securely maintaining data associated with a plurality of authentication credentials; generating, as a function of the data associated with a selected group of the plurality of authentication credentials, a secret data element; making available, the secret data element, to be embedded in a first authentication credential; identifying an attempt to change the first authentication credential, the attempt including new authentication credential data to replace data in the first authentication credential; validating, conditional on whether the new authentication credential data includes the secret data element, the new authentication credential data; and determining, based on the validating, whether to perform a control action based on the new authentication credential data.Type: ApplicationFiled: August 16, 2018Publication date: February 20, 2020Applicant: CyberArk Software Ltd.Inventor: Asaf Hecht
-
Publication number: 20200021591Abstract: Disclosed embodiments include techniques for automatically provisioning dynamic privileged access resources. Aspects may involve receiving a notification that an identity is seeking to participate in a privileged session with an access-restricted network resource, and automatically provisioning, in response to the notification, a privileged access resource for use by the identity in participating in the privileged session with the access-restricted network resource. Further, aspects may include determining that the privileged session with the access-restricted network resource has ended, and automatically deprovisioning, based on the determination, the privileged access resource.Type: ApplicationFiled: July 11, 2018Publication date: January 16, 2020Applicant: CyberArk Software Ltd.Inventor: Asaf HECHT
-
Publication number: 20190356661Abstract: Systems and methods are provided for enabling source resources to communicate with access-restricted target resources. The method can include receiving, at a proxy manager, a request from a source resource to access an access-restricted target resource. The request can include replica authentication information inoperable to enable the source resource to access the access-restricted target resource. The method can further include generating, in response to the request, temporary authentication information corresponding to the replica authentication information. The temporary authentication information can be operable to enable the source resource to access the access-restricted target resource. The method can additionally include making available to the access-restricted target resource the temporary authentication information, without sending the temporary authentication information to the source resource.Type: ApplicationFiled: May 21, 2018Publication date: November 21, 2019Applicant: CyberArk Software Ltd.Inventor: Asaf HECHT
-
Patent number: 10447727Abstract: Disclosed embodiments relate to systems and methods for predictable detection in a computing network. Techniques include identifying an activity associated with an identity in the computer network; accessing hierarchical-chained progression states representing timelines defining one or more process flows for operations in the computer network between beginning states and corresponding predictable result states to be controlled; identifying a hierarchical-chained progression state corresponding to the identified activity; automatically predicting a likelihood that the at least one activity will reach the predictable result state corresponding to the identified hierarchical-chained progression state; and implementing a control action for the activity, the identity, or a resource to which the identity is seeking to communicate.Type: GrantFiled: February 27, 2019Date of Patent: October 15, 2019Assignee: CyberArk Software Ltd.Inventor: Asaf Hecht
-
Publication number: 20190260754Abstract: Systems and methods are provided for automatically discovering and evaluating privileged entities in a network environment. The systems and methods can include scanning the network environment to identify a plurality of network entities. This scan can include identifying network permissions corresponding to the plurality of network entities. The operations can further include performing a multi-layer evaluation of the permissions corresponding to the plurality of network entities, the multi-layer evaluation being based at least on factors of network action sensitivity and network resource sensitivity. The network action sensitivity factor can address the sensitivity of particular actions that the plurality of network entities are able to take in the network environment. The network resource sensitivity factor can address the sensitivity of particular resources in the network environment that the plurality of network entities are able to access.Type: ApplicationFiled: February 20, 2018Publication date: August 22, 2019Applicant: CyberArk Software Ltd.Inventor: Asaf Hecht
-
Publication number: 20190207772Abstract: Systems and methods are provided for scanning a network to identify potentially compromised cloud-based access information.Type: ApplicationFiled: March 20, 2018Publication date: July 4, 2019Applicant: CyberArk Software Ltd.Inventors: Asaf Hecht, Kobi Ben Naim
-
Publication number: 20190207771Abstract: Systems and methods are provided for identifying potentially compromised cloud-based access information. The systems and methods include providing a unique signature for insertion into application programming interface (API) communications to be sent from a network resource to a cloud application executable in a cloud environment. The unique signature can be associated with an access token that a particular identity can use to request access to the cloud application. The systems and methods include accessing a log associated with the cloud environment, identifying the unique signature and the access token using information in the log, accessing a trusted validation resource storing signature information associated with the access token, determining whether the unique signature is valid, and determining whether the access token is potentially compromised.Type: ApplicationFiled: January 2, 2018Publication date: July 4, 2019Applicant: CyberArk Software Ltd.Inventors: Asaf Hecht, Kobi Ben Naim
-
Patent number: 10341350Abstract: Disclosed embodiments include identifying a first identity having a first level of privileged network access, identifying a network resource that the first identity is communicating with, classifying the network resource as a network resource to be dynamically monitored, dynamically monitoring connections activity of the identified network resource to determine a second identity, wherein the second identity is determined based on it having a second level of privileged network access that is different from the first level of privileged network access and having attempted to establish a connection with the network resource, classifying, based on the determination of the second identity, the network resource as a potential source of privileged access escalation vulnerabilities, and performing, based on the classification that the network resource is a potential source of privileged access escalation vulnerabilities, at least one of: triggering an alert regarding the potential source of privileged access escalatiType: GrantFiled: April 9, 2018Date of Patent: July 2, 2019Assignee: CYBERARK SOFTWARE LTD.Inventors: Lavi Lazarovitz, Asaf Hecht
-
Publication number: 20190166126Abstract: Disclosed embodiments include identifying a first identity having a first level of privileged network access, identifying a network resource that the first identity is communicating with, classifying the network resource as a network resource to be dynamically monitored, dynamically monitoring connections activity of the identified network resource to determine a second identity, wherein the second identity is determined based on it having a second level of privileged network access that is different from the first level of privileged network access and having attempted to establish a connection with the network resource, classifying, based on the determination of the second identity, the network resource as a potential source of privileged access escalation vulnerabilities, and performing, based on the classification that the network resource is a potential source of privileged access escalation vulnerabilities, at least one of: triggering an alert regarding the potential source of privileged access escalatiType: ApplicationFiled: April 9, 2018Publication date: May 30, 2019Inventors: Lavi Lazarovitz, Asaf Hecht
-
Patent number: 10164982Abstract: Disclosed embodiments include identifying a first identity having a first level of privileged network access, identifying a network resource that the first identity is communicating with, classifying the network resource as a network resource to be dynamically monitored, dynamically monitoring connections activity of the identified network resource to determine a second identity, wherein the second identity is determined based on it having a second level of privileged network access that is different from the first level of privileged network access and having attempted to establish a connection with the network resource, classifying, based on the determination of the second identity, the network resource as a potential source of privileged access escalation vulnerabilities, and performing, based on the classification that the network resource is a potential source of privileged access escalation vulnerabilities, at least one of: triggering an alert regarding the potential source of privileged access escalatiType: GrantFiled: November 28, 2017Date of Patent: December 25, 2018Assignee: CYBERARK SOFTWARE LTD.Inventors: Lavi Lazarovitz, Asaf Hecht
-
Patent number: 10148701Abstract: Techniques include identifying permission polices corresponding to a plurality of identities in a network environment, the permission polices specifying what types of actions the plurality of identities are permitted to take with respect to particular network resources; analyzing information describing activity associated with a first identity from the plurality of identities in the network environment; and automatically developing, based on the analysis of the information, a least-privilege profile for the first identity, the least-privilege profile including permissions corresponding to the particular actions with respect to the particular network resources and excluding permissions that do not correspond to the particular actions with respect to the particular network resources.Type: GrantFiled: May 8, 2018Date of Patent: December 4, 2018Assignee: CyberArk Software Ltd.Inventors: Asaf Hecht, Tal Kandel