Patents by Inventor Ezequiel David Gutesman

Ezequiel David Gutesman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10257228
    Abstract: A system is configured for real time detection and prevention of segregation of duties violations in business-critical applications. The system includes a software application monitor, a Segregation of Duties (SoD) conflict detection engine, a processor and a memory. The software application monitor configured to monitor an action executed by a user in the software application in real-time. The SoD conflict detection engine receives an action notification from the software application monitor having an action and an associated user, and determines whether the action is associated with a conflict in a conflict rule database. The engine looks up the user and action and determines if the user has permission to execute the action and/or if the user has previously executed the action, and if so outputs a preventive alert indicating a segregation of duties violation.
    Type: Grant
    Filed: October 27, 2015
    Date of Patent: April 9, 2019
    Assignee: Onapsis, Inc.
    Inventors: Ezequiel David Gutesman, Juan Pablo Perez Etchegoyen, Pablo Müller, Julián Rapisardi
  • Patent number: 9923917
    Abstract: A system for calculating cyber-risk in a software application includes a cyber-risk calculator. The cyber-risk calculator receives a security assessment result sample having a list of security modules, each security module listing including a respective result of a security assessment of the application identifying a vulnerability and/or misconfiguration capable of being exploited and/or abused. When run in a risk calculation mode, the cyber-risk calculator determines a world partition of the application in the security assessment result sample belongs to, references a set of parameters from a parametrization database according to the world partition corresponding to the application, determines a cyber-risk exposure level for the application based upon the security assessment result sample and the set of parameters, and reports results of the cyber-risk calculation.
    Type: Grant
    Filed: October 27, 2015
    Date of Patent: March 20, 2018
    Assignee: Onapsis, Inc.
    Inventors: Emiliano José Fausto, Ezequiel David Gutesman, Javier Burroni, Pablo Müller
  • Publication number: 20160119373
    Abstract: A system for calculating cyber-risk in a software application includes a cyber-risk calculator. The cyber-risk calculator receives a security assessment result sample having a list of security modules, each security module listing including a respective result of a security assessment of the application identifying a vulnerability and/or misconfiguration capable of being exploited and/or abused. When run in a risk calculation mode, the cyber-risk calculator determines a world partition of the application in the security assessment result sample belongs to, references a set of parameters from a parametrization database according to the world partition corresponding to the application, determines a cyber-risk exposure level for the application based upon the security assessment result sample and the set of parameters, and reports results of the cyber-risk calculation.
    Type: Application
    Filed: October 27, 2015
    Publication date: April 28, 2016
    Inventors: Emiliano José Fausto, Ezequiel David Gutesman, Javier Burroni, Pablo Müller
  • Publication number: 20160119380
    Abstract: A system is configured for real time detection and prevention of segregation of duties violations in business-critical applications. The system includes a software application monitor, a Segregation of Duties (SoD) conflict detection engine, a processor and a memory. The software application monitor configured to monitor an action executed by a user in the software application in real-time. The SoD conflict detection engine receives an action notification from the software application monitor having an action and an associated user, and determines whether the action is associated with a conflict in a conflict rule database. The engine looks up the user and action and determines if the user has permission to execute the action and/or if the user has previously executed the action, and if so outputs a preventive alert indicating a segregation of duties violation.
    Type: Application
    Filed: October 27, 2015
    Publication date: April 28, 2016
    Inventors: Ezequiel David Gutesman, Juan Pablo Perez Etchegoyen, Pablo Müller, Julián Rapisardi
  • Patent number: 9183397
    Abstract: A system for providing automated computer security compromise as a service, contains a web server having a web front end running on the web server. The Web server has stored therein pentest definitions. A command and control component processes the pentest definitions, builds pentest task tickets and reporting task tickets, and monitors at least one penetration tester component and/or at least one report generator component. The command and control component interacts with a cloud computing environment to scale up or down the number of penetration tester components and the number of report generator components, and assigns task tickets to the penetration tester and report generator components. At least one penetration tester component runs penetration testing modules available inside the penetration testing framework as instructed by the pentest task tickets. At least one reporter generator component generates reports based on the reporting tasks tickets generated by the command and control service.
    Type: Grant
    Filed: June 5, 2012
    Date of Patent: November 10, 2015
    Assignee: Core SDI Incorporated
    Inventors: Ariel Futoransky, Aureliano Emanuel Calvo, Fernando Russ Federico Russ, Jorge Lucangeli Obes, Ariel Waissbein, Alejandro Javier Frydman, Ezequiel David Gutesman, Pedro Oscar Varangot
  • Publication number: 20140237606
    Abstract: A system for providing automated computer security compromise as a service, contains a web server having a web front end running on the web server. The Web server has stored therein pentest definitions. A command and control component processes the pentest definitions, builds pentest task tickets and reporting task tickets, and monitors at least one penetration tester component and/or at least one report generator component. The command and control component interacts with a cloud computing environment to scale up or down the number of penetration tester components and the number of report generator components, and assigns task tickets to the penetration tester and report generator components. At least one penetration tester component runs penetration testing modules available inside the penetration testing framework as instructed by the pentest task tickets. At least one reporter generator component generates reports based on the reporting tasks tickets generated by the command and control service.
    Type: Application
    Filed: June 5, 2012
    Publication date: August 21, 2014
    Applicant: Core SDI Incorporated
    Inventors: Ariel Futoransky, Aureliano Emanuel Calvo, Alejandro Javier Frydman, Ezequiel David Gutesman, Pedro Oscar Varangot, Fernando Russ Federico Russ, Jorge Lucangeli Obes, Ariel Waissbein
  • Patent number: 8146135
    Abstract: Method, system, and computer code for implementing privacy protection in a web application, wherein the web application is executed in a web application language execution environment within a web server, the method containing the steps of: establishing at least one inbound tagging rule for tagging objects entering the web application language execution environment, referred to as inbound objects, according to a respective source of each of the inbound objects; assigning a tag to at least one of the inbound objects being operated on by the web application language execution environment based on the at least one inbound tagging rule; establishing at least one privacy rule for performing privacy actions on at least one object that is outbound from the web application language execution environment, referred to as outbound objects, according to a respective tag of each of the outbound objects; and performing a privacy action on the at least one outbound object being operated on by the web application language ex
    Type: Grant
    Filed: October 21, 2010
    Date of Patent: March 27, 2012
    Assignee: Core SDI, Incorporated
    Inventors: Ariel Waissbein, Ariel Futoransky, Diego Bartolome Tiscornia, Ezequiel David Gutesman
  • Publication number: 20110113468
    Abstract: Method, system, and computer code for implementing privacy protection in a web application, wherein the web application is executed in a web application language execution environment within a web server, the method containing the steps of: establishing at least one inbound tagging rule for tagging objects entering the web application language execution environment, referred to as inbound objects, according to a respective source of each of the inbound objects; assigning a tag to at least one of the inbound objects being operated on by the web application language execution environment based on the at least one inbound tagging rule; establishing at least one privacy rule for performing privacy actions on at least one object that is outbound from the web application language execution environment, referred to as outbound objects, according to a respective tag of each of the outbound objects; and performing a privacy action on the at least one outbound object being operated on by the web application language ex
    Type: Application
    Filed: October 21, 2010
    Publication date: May 12, 2011
    Applicant: Core Security Technologies
    Inventors: Ariel Waissbein, Ariel Futoransky, Diego Bartolome Tiscornia, Ezequiel David Gutesman