Patents by Inventor Guy ROZENDORN

Guy ROZENDORN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12189779
    Abstract: A system and method for detection of cyber threats embedded in cloud applications are provided. The method includes inspecting a plurality of computing resources to detect code of at least one cloud application executed in a cloud environment; filtering the detected code to remove a portion of the code that is non-unique for the at least one cloud application; performing static analysis on the unique portion of the code to identify a mismatch between the unique portions of the code and its verified version stored in a code repository; and comparing each identified mismatch with at least a vulnerability tool, wherein a mismatch is a potential cyber threat embedded in the code.
    Type: Grant
    Filed: February 1, 2021
    Date of Patent: January 7, 2025
    Assignee: Wiz, Inc.
    Inventors: Roy Reznik, Ami Luttwak, Guy Rozendorn, Yarin Miran
  • Publication number: 20230247063
    Abstract: A system and method for prioritizing alerts and mitigation actions against cyber threats in a cloud computing environment. The method includes detecting an alert based on a cloud entity deployed in a cloud computing environment, wherein the alert including an identifier of the cloud entity and a severity indicator, and wherein the cloud computing environment is represented in a security graph; generating a severity index for the received alert based on the identifier of the cloud entity and the severity indicator; and initiating a mitigation action based on the severity index.
    Type: Application
    Filed: January 30, 2023
    Publication date: August 3, 2023
    Applicant: Wiz, Inc.
    Inventors: Ami LUTTWAK, Yinon COSTICA, Roy REZNIK, Raaz HERZBERG, Alon SCHINDEL, Guy ROZENDORN, Avihai BERKOVITZ
  • Publication number: 20230247044
    Abstract: A system and method for generating a contextual cloud risk assessment of a cloud computing environment. The method includes accessing a plurality of cloud assessment policies, wherein a policy including a query executable on a security graph; applying the plurality of cloud assessment policies to the representation of the first cloud computing environment; generating a risk assessment report based on an output generated by applying a policy of the plurality of cloud assessment polices; and initiating a mitigation action based on a cybersecurity risk from the risk assessment report.
    Type: Application
    Filed: January 30, 2023
    Publication date: August 3, 2023
    Applicant: Wiz, Inc.
    Inventors: Ami LUTTWAK, Yinon COSTICA, Roy REZNIK, Raaz HERZBERG, Alon SCHINDEL, Guy ROZENDORN, Avihai BERKOVITZ
  • Publication number: 20160188228
    Abstract: A method for updating a destination volume, the method may include monitoring duplicate traffic that represents original traffic that is exchanged between at least one host computer and a first storage system; wherein the monitoring is executed by a controller during an execution of a migration or a replication of a source volume of the first storage system to a destination volume of a second storage system; wherein the controller is not included in the first storage system; wherein the original traffic is related to the source volume; wherein the duplicate traffic is sent toward the controller by at least one switch that attempts to duplicate the original traffic; and controlling, based upon the monitoring, a process of updating the destination volume with a set of source volume updates, wherein the set of source volume updates are reflected in the duplicate traffic and are received during the execution of the migration.
    Type: Application
    Filed: December 24, 2014
    Publication date: June 30, 2016
    Inventors: Guy Rozendorn, Tal Yalon
  • Patent number: 9372631
    Abstract: A method for updating a destination volume, the method may include monitoring duplicate traffic that represents original traffic that is exchanged between at least one host computer and a first storage system; wherein the monitoring is executed by a controller during an execution of a migration or a replication of a source volume of the first storage system to a destination volume of a second storage system; wherein the controller is not included in the first storage system; wherein the original traffic is related to the source volume; wherein the duplicate traffic is sent toward the controller by at least one switch that attempts to duplicate the original traffic; and controlling, based upon the monitoring, a process of updating the destination volume with a set of source volume updates, wherein the set of source volume updates are reflected in the duplicate traffic and are received during the execution of the migration.
    Type: Grant
    Filed: December 24, 2014
    Date of Patent: June 21, 2016
    Assignee: INFINIDAT LTD.
    Inventors: Guy Rozendorn, Tal Yalon
  • Patent number: 9087201
    Abstract: A storage system that includes a management communication interface coupled to a storage management layer and further includes a data communication interface. Upon receiving a request for accessing the storage management layer, from the host, via the data communication interface, the management layer sends to the host, access information necessary for allowing access of the host to the storage management layer via the management communication interface; and upon receiving a management command, from the host via the management communication interface, the host is provided with access to the storage management layer, in cases where the management command conforms to the access information.
    Type: Grant
    Filed: January 4, 2013
    Date of Patent: July 21, 2015
    Assignee: INFINIDAT LTD.
    Inventors: Kariel Sandler, Guy Rozendorn, Jacob Broido
  • Patent number: 8806157
    Abstract: A method, including configuring data migration from a first volume to a second volume, which are coupled via a storage area network (SAN) to a host computer, with the first volume mapped to the host computer. A volume identifier associated with the first volume is copied to a memory coupled to the second volume, and the copied volume identifier is retrieved from the memory by the host computer. A state of the second volume is set to inactive, and the inactive second volume is mapped to the host computer. A state of the first volume is set to inactive, and the status is data from the inactive first volume to the inactive second volume. After the copying, data migration is started from the inactive first volume to the inactive second volume, and after the starting, the state of the second volume is set to active.
    Type: Grant
    Filed: June 26, 2012
    Date of Patent: August 12, 2014
    Assignee: International Business Machines Corporation
    Inventors: Yakov Broido, Daniel I. Goodman, Haim Helman, Leonid Kull, Orit Nissan-Messing, Guy Rozendorn
  • Patent number: 8799594
    Abstract: An apparatus for configuring data migration comprises a host computer, a first volume, a second volume, a storage area network (SAN) configured to couple the host computer, the first volume, and the second volume, a memory coupled to the second volume, and a processor configured to map the first volume to the host computer; to copy a volume identifier associated with the mapped first volume to the memory, to retrieve, by the host computer, the copied volume identifier from the memory, to set a state of the second volume to inactive, to map the inactive second volume to the host computer, to set a state of the mapped first volume to inactive, to synchronize status data between the inactive first volume and the inactive second volume, after the copying, to start data migration from the inactive first volume to the inactive second volume, and after the starting, to set the state of the second volume to active.
    Type: Grant
    Filed: April 27, 2011
    Date of Patent: August 5, 2014
    Assignee: International Business Machines Corporation
    Inventors: Yakov Broido, Daniel I. Goodman, Haim Helman, Leonid Kull, Orit Nissan-Messing, Guy Rozendorn
  • Patent number: 8782358
    Abstract: A method for configuring transparent synchronous mirroring volume switching for a first volume and a second volume that are coupled, via a storage area network, to a host computer, with the first volume mapped to the host computer. The method includes initiating synchronization of status data between the first volume and the second volume, and setting the first volume to an active state. The second volume is set to an inactive state, and an identifier associated with the active first volume is copied to a memory coupled to the inactive second volume. The copied identifier is retrieved from the memory by the host computer, and the inactive second volume is then mapped to the host computer.
    Type: Grant
    Filed: April 27, 2011
    Date of Patent: July 15, 2014
    Assignee: International Business Machines Corporation
    Inventors: Yakov Broido, Daniel I. Goodman, Haim Helman, Leonid Kull, Orit Nissan-Messing, Guy Rozendorn
  • Patent number: 8762663
    Abstract: A method for configuring transparent synchronous mirroring volume switching for a first volume and a second volume that are coupled, via a storage area network, to a host computer, with the first volume mapped to the host computer, by. The method includes initiating synchronization of status data between the first volume and the second volume, and setting the first volume to an active state. The second volume is set to an inactive state, and an identifier associated with the active first volume is copied to a memory coupled to the inactive second volume. The copied identifier is retrieved from the memory by the host computer, and the inactive second volume is then mapped to the host computer.
    Type: Grant
    Filed: June 26, 2012
    Date of Patent: June 24, 2014
    Assignee: International Business Machines Corporation
    Inventors: Yakov Broido, Daniel I. Goodman, Haim Helman, Leonid Kull, Orit Nissan-Messing, Guy Rozendorn
  • Publication number: 20120278572
    Abstract: A method, including configuring data migration from a first volume to a second volume, which are coupled via a storage area network (SAN) to a host computer, with the first volume mapped to the host computer. A volume identifier associated with the first volume is copied to a memory coupled to the second volume, and the copied volume identifier is retrieved from the memory by the host computer. A state of the second volume is to inactive, and the inactive second volume is mapped to the host computer. A state of the first volume is set to inactive, and the status is data from the inactive first volume to the inactive second volume. After the copying, data migration is started from the inactive first volume to the inactive second volume, and after the starting, the state of the second volume is set to active.
    Type: Application
    Filed: June 26, 2012
    Publication date: November 1, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yakov BROIDO, Daniel I. GOODMAN, Haim HELMAN, Leonid KULL, Orit NISSAN-MESSING, Guy ROZENDORN
  • Publication number: 20120278567
    Abstract: An apparatus for configuring data migration comprises a host computer, a first volume, a second volume, a storage area network (SAN) configured to couple the host computer, the first volume, and the second volume, a memory coupled to the second volume, and a processor configured to map the first volume to the host computer; to copy a volume identifier associated with the mapped first volume to the memory, to retrieve, by the host computer, the copied volume identifier from the memory, to set a state of the second volume to inactive, to map the inactive second volume to the host computer, to set a state of the mapped first volume to inactive, to synchronize status data between the inactive first volume and the inactive second volume, after the copying, to start data migration from the inactive first volume to the inactive second volume, and after the starting, to set the state of the second volume to active.
    Type: Application
    Filed: April 27, 2011
    Publication date: November 1, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yakov BROIDO, Daniel I. GOODMAN, Haim HELMAN, Leonid KULL, Orit NISSAN-MESSING, Guy ROZENDORN
  • Publication number: 20120278568
    Abstract: An apparatus for configuring transparent synchronous mirroring volume switching comprises a first volume, a second volume, a storage area network (SAN) configured to couple the host computer, the first volume and the second volume, a memory coupled to the second volume, and a processor configured to map the first volume to the host computer, to initiate synchronization of status data between the mapped first volume and the second volume, to set the mapped first volume to an active state and the second volume to an inactive state, to copy an identifier associated with the active first volume to a memory coupled to the inactive second volume, to retrieve, by the host computer, the copied identifier from the memory, and after the retrieving, to map the inactive second volume to the host computer.
    Type: Application
    Filed: April 27, 2011
    Publication date: November 1, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yakov BROIDO, Daniel I. GOODMAN, Haim HELMAN, Leonid KULL, Orit NISSAN-MESSING, Guy ROZENDORN
  • Publication number: 20120278280
    Abstract: A method for configuring transparent synchronous mirroring volume switching for a first volume and a second volume that are coupled, via a storage area network, to a host computer, with the first volume mapped to the host computer, by. The method includes initiating synchronization of status data between the first volume and the second volume, and setting the first volume to an active state. The second volume is set to an inactive state, and an identifier associated with the active first volume is copied to a memory coupled to the inactive second volume. The copied identifier is retrieved from the memory by the host computer, and the inactive second volume is then mapped to the host computer.
    Type: Application
    Filed: June 26, 2012
    Publication date: November 1, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yakov BROIDO, Daniel I. GOODMAN, Haim HELMAN, Leonid KULL, Orit NISSAN-MESSING, Guy ROZENDORN