Patents by Inventor Michael D. Kail
Michael D. Kail has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11539748Abstract: An orchestration system is described that is configured to receive a request to monitor compliance of an enterprise infrastructure and generate an infrastructure change that is associated with the compliance of the enterprise infrastructure, based at least in part on a set of predetermined criteria. In doing so, the orchestration system may further generate one or more infrastructure change events based at least in part on instances of the infrastructure change within the enterprise infrastructure. The orchestration system may further generate a verification report for the enterprise infrastructure, based at least in part on the one or more infrastructure change events, and transmit the verification report to a registered user associated with the request.Type: GrantFiled: January 22, 2019Date of Patent: December 27, 2022Assignee: ZeroNorth, Inc.Inventors: Ernesto Digiambattista, Andrei Bezdedeanu, Michael D. Kail
-
Patent number: 11121872Abstract: Event metadata may be received at an audit function of an orchestration system for an infrastructure change event associated with an infrastructure change to an enterprise infrastructure of an enterprise. A blockchain instance of a particular decentralized secure ledger is requested from a decentralized secure ledger service via the audit function. A user identifier of a user that is responsible for the infrastructure change event is provided to the decentralized secure ledger service by the audit function. In response to the decentralized secure ledger service authenticating the user identifier, the event metadata for the infrastructure change event is sent to the blockchain instance for storage with the decentralized secure ledger service by the audit function.Type: GrantFiled: January 22, 2019Date of Patent: September 14, 2021Assignee: ZeroNorth, Inc.Inventors: Ernesto Digiambattista, Andrei Bezdedeanu, Michael D. Kail
-
Patent number: 11063983Abstract: A continuous security delivery fabric is disclosed. One or more security functions, comprising one or more tasks to be performed by a security tool, utility or service is encapsulated in a componentized security policy. A target list comprising of one or more items in an information technology installation is received. One or more security functions capable of being performed on at least one item in the received target list are selected. A componentized security policy encapsulating one or more security routines orchestrating the performance of at least one of the selected security functions is then created.Type: GrantFiled: June 13, 2019Date of Patent: July 13, 2021Assignee: ZeroNorth, Inc.Inventors: Ernesto DiGiambattista, Michael D. Kail, Alex Manelis, Salvatore Sclafani
-
Publication number: 20190297117Abstract: A continuous security delivery fabric is disclosed. One or more security functions, comprising one or more tasks to be performed by a security tool, utility or service is encapsulated in a componentized security policy. A target list comprising of one or more items in an information technology installation is received. One or more security functions capable of being performed on at least one item in the received target list are selected. A componentized security policy encapsulating one or more security routines orchestrating the performance of at least one of the selected security functions is then created.Type: ApplicationFiled: June 13, 2019Publication date: September 26, 2019Inventors: Ernesto DiGiambattista, Michael D. Kail, Alex Manelis, Salvatore Sclafani
-
Patent number: 10382491Abstract: A continuous security delivery fabric is disclosed. One or more security functions, comprising one or more tasks to be performed by a security tool, utility or service is encapsulated in a componentized security policy. The componentized security policies may be scheduled to run against one or more shadow environments, which are substantive copies of an information technology installation. One or more componentized security policies are scheduled as to run substantively continuously with results of the execution of the componentized security policies against the shadow aggregated. Based on automated analysis which may include machine learning, security issues in the actual information technology installation are inferred, and remediation either recommended or automatically executed. Various embodiments, including a microservices infrastructure embodiment are disclosed.Type: GrantFiled: February 10, 2017Date of Patent: August 13, 2019Assignee: CYBRIC, Inc.Inventors: Ernesto DiGiambattista, Michael D. Kail, Alex Manelis, Salvatore Sclafani
-
Publication number: 20190230129Abstract: An orchestration system is described that is configured to receive a request to monitor compliance of an enterprise infrastructure and generate an infrastructure change that is associated with the compliance of the enterprise infrastructure, based at least in part on a set of predetermined criteria. In doing so, the orchestration system may further generate one or more infrastructure change events based at least in part on instances of the infrastructure change within the enterprise infrastructure. The orchestration system may further generate a verification report for the enterprise infrastructure, based at least in part on the one or more infrastructure change events, and transmit the verification report to a registered user associated with the request.Type: ApplicationFiled: January 22, 2019Publication date: July 25, 2019Inventors: Ernesto DIGIAMBATTISTA, Andrei BEZDEDEANU, Michael D. KAIL
-
Publication number: 20190229915Abstract: Event metadata may be received at an audit function of an orchestration system for an infrastructure change event associated with an infrastructure change to an enterprise infrastructure of an enterprise. A blockchain instance of a particular decentralized secure ledger is requested from a decentralized secure ledger service via the audit function. A user identifier of a user that is responsible for the infrastructure change event is provided to the decentralized secure ledger service by the audit function. In response to the decentralized secure ledger service authenticating the user identifier, the event metadata for the infrastructure change event is sent to the blockchain instance for storage with the decentralized secure ledger service by the audit function.Type: ApplicationFiled: January 22, 2019Publication date: July 25, 2019Inventors: Ernesto DIGIAMBATTISTA, Andrei BEZDEDEANU, Michael D. KAIL
-
Patent number: 10277622Abstract: Automatic detection and remediation of cybersecurity threats to an information technology installation is disclosed. An information technology installation receives at an orchestration system a requested update which may include a configuration change, a code change, a change to a binary, or other change to the installation. A mirror instance of the installation is instantiated on a cloud infrastructure where the requested updated is applied and scanned for cybersecurity threats. Where cybersecurity threats are detected, a remediation response is identified. The update and the remediation response may either be sent to an administrator for acceptance prior to deployment to production, or may be deployed automatically, with rollback information generated in the event the administrator desires to undo the deployment.Type: GrantFiled: July 24, 2017Date of Patent: April 30, 2019Assignee: Cybric Inc.Inventors: Ernesto DiGiambattista, Andrei Bezdedeanu, Michael D. Kail
-
Publication number: 20180159887Abstract: Automatic detection and remediation of cybersecurity threats to an information technology installation is disclosed. An information technology installation receives at an orchestration system a requested update which may include a configuration change, a code change, a change to a binary, or other change to the installation. A mirror instance of the installation is instantiated on a cloud infrastructure where the requested updated is applied and scanned for cybersecurity threats. Where cybersecurity threats are detected, a remediation response is identified. The update and the remediation response may either be sent to an administrator for acceptance prior to deployment to production, or may be deployed automatically, with rollback information generated in the event the administrator desires to undo the deployment.Type: ApplicationFiled: July 24, 2017Publication date: June 7, 2018Inventors: Ernesto DiGiambattista, Andrei Bezdedeanu, Michael D. Kail
-
Publication number: 20170237778Abstract: A continuous security delivery fabric is disclosed. One or more security functions, comprising one or more tasks to be performed by a security tool, utility or service is encapsulated in a componentized security policy. The componentized security policies may be scheduled to run against one or more shadow environments, which are substantive copies of an information technology installation. One or more componentized security policies are scheduled as to run substantively continuously with results of the execution of the componentized security policies against the shadow aggregated. Based on automated analysis which may include machine learning, security issues in the actual information technology installation are inferred, and remediation either recommended or automatically executed. Various embodiments, including a microservices infrastructure embodiment are disclosed.Type: ApplicationFiled: February 10, 2017Publication date: August 17, 2017Inventors: Ernesto DiGiambattista, Michael D. Kail, Alex Manelis, Salvatore Sclafani