Patents by Inventor Ethan Hadar

Ethan Hadar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10326765
    Abstract: According to one embodiment, a system comprises one or more processors coupled to a memory. The one or more processors when executing logic encoded in the memory provide a topology manager. The topology manager is configured to maintain a security topology of a plurality of hosts. The security topology associates one or more virtual hosts policies with a plurality of virtual hosts in a cloud computing deployment. The topology manager is also configured to request a query for one or more hosts that are candidates to be enforced. A portability manager is configured to receive a request to deploy an access control agent on the one or more candidate hosts, determine an optimal agent to be deployed from a list of available agents, and deploy the optimal agent on the one or more candidate hosts.
    Type: Grant
    Filed: November 8, 2016
    Date of Patent: June 18, 2019
    Assignee: CA, Inc.
    Inventors: Ethan Hadar, Nimrod Vax, Amir Jerbi, Michael Kletskin
  • Publication number: 20170054728
    Abstract: According to one embodiment, a system comprises one or more processors coupled to a memory. The one or more processors when executing logic encoded in the memory provide a topology manager. The topology manager is configured to maintain a security topology of a plurality of hosts. The security topology associates one or more virtual hosts policies with a plurality of virtual hosts in a cloud computing deployment. The topology manager is also configured to request a query for one or more hosts that are candidates to be enforced. A portability manager is configured to receive a request to deploy an access control agent on the one or more candidate hosts, determine an optimal agent to be deployed from a list of available agents, and deploy the optimal agent on the one or more candidate hosts.
    Type: Application
    Filed: November 8, 2016
    Publication date: February 23, 2017
    Inventors: Ethan HADAR, Nimrod VAX, Amir JERBI, Michael Kletskin
  • Patent number: 9449276
    Abstract: According to one embodiment of the disclosure, a graphical model-driven system includes a graphical knowledge pattern system coupled to a modeler interface. The graphical knowledge pattern system has a graphical knowledge pattern library for the storage of a plurality of graphical knowledge patterns that are configured to classify information according to one or more information related criteria. The modeler interface is operable to receive a request for information from the user interface and retrieve information from one or more knowledge based systems according to one or more information related criteria of a particular graphical knowledge pattern.
    Type: Grant
    Filed: August 7, 2008
    Date of Patent: September 20, 2016
    Assignee: CA, Inc.
    Inventor: Ethan Hadar
  • Patent number: 8490150
    Abstract: According to one embodiment, a system comprises one or more processors coupled to a memory and executing logic. A policy life cycle component is configured to maintain a repository of security policies. The repository of security policies comprises policies governing access to a virtual host and to a plurality of virtual machines running on the virtual host. The policy life cycle component is also configured to issue a compound policy for an identified virtual operating system running on the virtual host. The compound policy provides a virtual host policy and access rules for each of the plurality of virtual machines running on the virtual host. A topology manager is configured to receive the compound policy from the policy life cycle component, assign the compound to an access control agent, and maintain a security policy topology. The security policy topology stores associations between access control agents and compound policies.
    Type: Grant
    Filed: September 23, 2009
    Date of Patent: July 16, 2013
    Assignee: CA, Inc.
    Inventors: Ethan Hadar, Nimrod Vax, Amir Jerbi, Michael Kletskin
  • Patent number: 8069242
    Abstract: A method for integrating cloud computing systems includes establishing a connection between a cloud computing system architecture and cloud computing systems. Each of the cloud computing systems includes computing resources. The method further includes integrating the computing resources with an external integration architecture by establishing a second connection between the cloud computing system architecture and the external integration architecture. The external integration architecture includes IT Infrastructure Library (ITIL) software components. The cloud computing system architecture includes management components that provide integration points to connect the ITIL software components with the computing resources.
    Type: Grant
    Filed: September 16, 2009
    Date of Patent: November 29, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Ethan Hadar, Carrie E. Gates, Kouros Hodaee Esfahany, Michael Ralph Chiaramonte, Efraim Moscovich, Gregory L. Bodine
  • Publication number: 20110231229
    Abstract: A hybrid software component and service catalog is disclosed. A method according to embodiments of the present disclosure includes identifying a plurality of existing information technology services in an enterprise, wherein each of the plurality of existing information technology services includes a plurality of attributes. The method also includes assigning a quality metric associated with one or more attributes of each of the respective identified existing information technology services. The method also includes identifying a plurality of potential information technology services, wherein each of the plurality of potential information technology services includes a plurality of attributes. Additionally, the method includes receiving a quality metric associated with one or more attributes of each of the respective identified potential information technology services from a source external to the enterprise.
    Type: Application
    Filed: March 22, 2010
    Publication date: September 22, 2011
    Applicant: Computer Associates Think, Inc.
    Inventor: Ethan Hadar
  • Publication number: 20110213712
    Abstract: A cloud broker and procurement system and method is closed. In particular embodiments, the method includes receiving an offer of a computing resource from each of a plurality of providers. The method further includes receiving, from each of the plurality of providers, a service level agreement associated with each respective offered computing resource. Additionally, the method includes normalizing each of the service level agreements associated with the offered computing resources. The method further includes receiving a request from a requesting computer for a computing resource and selecting, based at least in part on the normalized service level agreements, one of the providers to provide the requested computing resource. The method also includes transmitting a service match indicator to the client, wherein the service match indicator indicates a time at which the offered computing resource will be utilized, and utilizing the computing resource on the selected provider.
    Type: Application
    Filed: February 26, 2010
    Publication date: September 1, 2011
    Applicant: Computer Associates Think, Ink.
    Inventors: Ethan Hadar, Gregory Lewis Bodine, Balakrishna Venkatrao
  • Publication number: 20110208606
    Abstract: A system and method for IT services e-commerce arena for cloud computing environments is disclosed. The method includes receiving, from each of a plurality of service clients, a request for processing time on a processor. The method also includes receiving, from each of a plurality of service providers, an offer for processing time on a processor operated by each respective service provider. Additionally, the method includes generating a buyer group based on information included in each respective request, wherein the buyer group comprises a selected one or more of the plurality of service clients to receive processing time on a processing resource and selecting one of the plurality of service providers to provide processing time on the processor operated by the selected service provider to the service clients in the buyer group. Further, the method includes initiating a transaction between each of the service clients in the buyer group and the selected service provider.
    Type: Application
    Filed: February 19, 2010
    Publication date: August 25, 2011
    Applicant: Computer Associates Think, Inc.
    Inventors: Ethan Hadar, Ajei Gopal
  • Publication number: 20110072486
    Abstract: According to one embodiment, a system comprises one or more processors coupled to a memory and executing logic. A policy life cycle component is configured to maintain a repository of security policies. The repository of security policies comprises policies governing access to a virtual host and to a plurality of virtual machines running on the virtual host. The policy life cycle component is also configured to issue a compound policy for an identified virtual operating system running on the virtual host. The compound policy provides a virtual host policy and access rules for each of the plurality of virtual machines running on the virtual host. A topology manager is configured to receive the compound policy from the policy life cycle component, assign the compound to an access control agent, and maintain a security policy topology. The security policy topology stores associations between access control agents and compound policies.
    Type: Application
    Filed: September 23, 2009
    Publication date: March 24, 2011
    Applicant: Computer Associates Think, Inc.
    Inventors: Ethan Hadar, Nimrod Vax, Amir Jerbi, Michael Kletskin
  • Publication number: 20110072487
    Abstract: According to one embodiment, a system comprises one or more processors coupled to a memory. The one or more processors when executing logic encoded in the memory provide a topology manager. The topology manager is configured to maintain a security topology of a plurality of hosts. The security topology associates one or more virtual hosts policies with a plurality of virtual hosts in a cloud computing deployment. The topology manager is also configured to request a query for one or more hosts that are candidates to be enforced. A portability manager is configured to receive a request to deploy an access control agent on the one or more candidate hosts, determine an optimal agent to be deployed from a list of available agents, and deploy the optimal agent on the one or more candidate hosts.
    Type: Application
    Filed: September 23, 2009
    Publication date: March 24, 2011
    Applicant: Computer Associates Think, Inc.
    Inventors: Ethan Hadar, Nimrod Vax, Amir Jerbi, Michael Kletskin
  • Publication number: 20100125664
    Abstract: A method for integrating cloud computing systems includes establishing a connection between a cloud computing system architecture and cloud computing systems. Each of the cloud computing systems includes computing resources. The method further includes integrating the computing resources with an external integration architecture by establishing a second connection between the cloud computing system architecture and the external integration architecture. The external integration architecture includes IT Information Library (ITIL) software components. The cloud computing system architecture includes management components that provide integration points to connect the ITIL software components with the computing resources.
    Type: Application
    Filed: September 16, 2009
    Publication date: May 20, 2010
    Applicant: Computer Associates Think, Inc.
    Inventors: Ethan Hadar, Carrie E. Gates, Kouros Hodaee Esfahany, Michael Ralph Chiaramonte, Efraim Moscovich, Gregory L. Bodine
  • Publication number: 20100070981
    Abstract: A method for performing complex event processing includes receiving events from at least one entity at a grid of complex event processing (CEP) units, each of the CEP units comprising a modular architecture for receiving events from event suppliers, recursively processing events, and transmitting events to event consumers. The method further includes generating event inferences based on the plurality of events by one or more CEP units of the grid of CEP units.
    Type: Application
    Filed: September 3, 2009
    Publication date: March 18, 2010
    Applicant: Computer Associates Think, Inc.
    Inventors: Ethan Hadar, Jeffrey A. Vaught, Avigdor Gal
  • Publication number: 20090049000
    Abstract: According to one embodiment of the disclosure, a graphical model-driven system includes a graphical knowledge pattern system coupled to a modeler interface. The graphical knowledge pattern system has a graphical knowledge pattern library for the storage of a plurality of graphical knowledge patterns that are configured to classify information according to one or more information related criteria. The modeler interface is operable to receive a request for information from the user interface and retrieve information from one or more knowledge based systems according to one or more information related criteria of a particular graphical knowledge pattern.
    Type: Application
    Filed: August 7, 2008
    Publication date: February 19, 2009
    Applicant: Computer Associates Think, Inc.
    Inventor: Ethan Hadar