Patents by Inventor Gil BARAK

Gil BARAK has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170195350
    Abstract: A system is used for detection of advanced persistent and non-persistent threats in a computerized environment. The system is connected to a plurality of user devices coupled to an enterprise's network. The system receives via an interface an electronic notification of at least one event in the operating system of the computer. The system then analyzes the at least one event. The system then generates a causality chain for the at least one event respective of the analysis. The causality chain comprises all the threads that attributed to the at least one event in a chronological order. The system then identifies a main thread that started the causality chain that led to the at least one event. Then, the system determines whether the main thread is associated with malicious software. Upon determination that the main thread is associated with malicious software, the causality chain is marked as infected.
    Type: Application
    Filed: January 4, 2017
    Publication date: July 6, 2017
    Applicant: CYBER SECDO LTD.
    Inventor: Gil BARAK
  • Publication number: 20160149938
    Abstract: A system, an apparatus, and a method thereof identifies at least one security threat in an enterprise's network. The system characterizes sources affected by the security threat within the enterprise's network. The identification of the sources affected by the security threat is made based on the forensic data extracted by the system. The system then suspends the affected sources. The system also stores the affected sources in a separate memory to prevent execution thereof.
    Type: Application
    Filed: November 25, 2015
    Publication date: May 26, 2016
    Applicant: CYBER SECDO LTD.
    Inventors: Gil BARAK, Shai MORAG
  • Publication number: 20160142424
    Abstract: A system is connected to a plurality of user devices coupled to an enterprise's network. The system continuously collects, stores, and analyzes forensic data related to the enterprise's network. Based on the analysis, the system is able to determine normal behavior of the network and portions thereof and thereby identify abnormal behaviors within the network. Upon identification of an abnormal behavior, the system determines whether the abnormal behavior relates to a security incident. Upon determining a security incident in any portion of the enterprise's network, the system extracts forensic data respective of the security incident and enables further assessment of the security incident as well as identification of the source of the security incident. The system provides real-time damage assessment respective of the security incident as well as the security incident's attributions.
    Type: Application
    Filed: November 18, 2015
    Publication date: May 19, 2016
    Applicant: SEC.DO TECHNOLOGIES LTD.
    Inventors: Gil BARAK, Shai MORAG