Patents by Inventor Michael Kletskin

Michael Kletskin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10326765
    Abstract: According to one embodiment, a system comprises one or more processors coupled to a memory. The one or more processors when executing logic encoded in the memory provide a topology manager. The topology manager is configured to maintain a security topology of a plurality of hosts. The security topology associates one or more virtual hosts policies with a plurality of virtual hosts in a cloud computing deployment. The topology manager is also configured to request a query for one or more hosts that are candidates to be enforced. A portability manager is configured to receive a request to deploy an access control agent on the one or more candidate hosts, determine an optimal agent to be deployed from a list of available agents, and deploy the optimal agent on the one or more candidate hosts.
    Type: Grant
    Filed: November 8, 2016
    Date of Patent: June 18, 2019
    Assignee: CA, Inc.
    Inventors: Ethan Hadar, Nimrod Vax, Amir Jerbi, Michael Kletskin
  • Patent number: 9626526
    Abstract: Systems and methods of implementing a secured cloud environment allow for design and instantiation of a security policy at the infrastructure level. An example system may comprise a first module to facilitate selecting at least two cloud computing component templates from a cloud computing component catalog. The system may comprise a second module to facilitate defining a connection between the at least two selected cloud computing component templates. The system may comprise a third module to facilitate assigning a security level and a policy to at least one of the at least two selected cloud computing component templates. The system may comprise a fourth module to facilitate building a cloud computing component blueprint.
    Type: Grant
    Filed: April 30, 2012
    Date of Patent: April 18, 2017
    Assignee: CA, Inc.
    Inventors: Eitan Hadar, Michael Kletskin, Nir Barak, Amir Jerbi, Yaacov Bezalel
  • Publication number: 20170054728
    Abstract: According to one embodiment, a system comprises one or more processors coupled to a memory. The one or more processors when executing logic encoded in the memory provide a topology manager. The topology manager is configured to maintain a security topology of a plurality of hosts. The security topology associates one or more virtual hosts policies with a plurality of virtual hosts in a cloud computing deployment. The topology manager is also configured to request a query for one or more hosts that are candidates to be enforced. A portability manager is configured to receive a request to deploy an access control agent on the one or more candidate hosts, determine an optimal agent to be deployed from a list of available agents, and deploy the optimal agent on the one or more candidate hosts.
    Type: Application
    Filed: November 8, 2016
    Publication date: February 23, 2017
    Inventors: Ethan HADAR, Nimrod VAX, Amir JERBI, Michael Kletskin
  • Publication number: 20160359911
    Abstract: Systems and methods of implementing a secured cloud environment allow for design and instantiation of a security policy at the infrastructure level. An example system may comprise a first module to facilitate selecting at least two cloud computing component templates from a cloud computing component catalog. The system may comprise a second module to facilitate defining a connection between the at least two selected cloud computing component templates. The system may comprise a third module to facilitate assigning a security level and a policy to at least one of the at least two selected cloud computing component templates. The system may comprise a fourth module to facilitate building a cloud computing component blueprint.
    Type: Application
    Filed: June 25, 2015
    Publication date: December 8, 2016
    Inventors: Eitan Hadar, Michael Kletskin, Nir Barak, Amir Jerbi, Yaacov Bezalel
  • Publication number: 20160299778
    Abstract: Systems and methods associated with virtual machine security are described herein. One example method includes instantiating a guest virtual machine in a virtual computing environment. The method also includes installing a life cycle agent on the guest virtual machine, assigning an identifying certificate, a set of policies, and an encryption key to the guest virtual machine, and providing the certificate, policies, and encryption key to the guest virtual machine. The certificate, policies, and encryption key may then be used by the guest virtual machine to authenticate itself within the virtual computing environment and to protect data stored on the guest virtual machine.
    Type: Application
    Filed: June 16, 2016
    Publication date: October 13, 2016
    Inventors: Nir BARAK, Amir JERBI, Eitan HADAR, Michael KLETSKIN
  • Patent number: 9389898
    Abstract: Systems and methods associated with virtual machine security are described herein. One example method includes instantiating a guest virtual machine in a virtual computing environment. The method also includes installing a life cycle agent on the guest virtual machine, assigning an identifying certificate, a set of policies, and an encryption key to the guest virtual machine, and providing the certificate, policies, and encryption key to the guest virtual machine. The certificate, policies, and encryption key may then be used by the guest virtual machine to authenticate itself within the virtual computing environment and to protect data stored on the guest virtual machine.
    Type: Grant
    Filed: October 2, 2012
    Date of Patent: July 12, 2016
    Assignee: CA, INC.
    Inventors: Nir Barak, Amir Jerbi, Eitan Hadar, Michael Kletskin
  • Patent number: 8826275
    Abstract: According to one embodiment of the present disclosure, a method includes receiving a request to instantiate a virtual machine image in a virtualization environment. The method also includes sending a request for verification of the virtualization environment. The method further includes receiving information from the enforcement module in response to the request for verification of the virtualization environment. The method further includes determining whether the virtualization environment is verified based on the information received.
    Type: Grant
    Filed: September 1, 2011
    Date of Patent: September 2, 2014
    Assignee: CA, Inc.
    Inventors: Amir Jerbi, Michael Kletskin, Eitan Hadar
  • Publication number: 20140096134
    Abstract: Systems and methods associated with virtual machine security are described herein. One example method includes instantiating a guest virtual machine in a virtual computing environment. The method also includes installing a life cycle agent on the guest virtual machine, assigning an identifying certificate, a set of policies, and an encryption key to the guest virtual machine, and providing the certificate, policies, and encryption key to the guest virtual machine. The certificate, policies, and encryption key may then be used by the guest virtual machine to authenticate itself within the virtual computing environment and to protect data stored on the guest virtual machine.
    Type: Application
    Filed: October 2, 2012
    Publication date: April 3, 2014
    Applicant: CA, Inc.
    Inventors: Nir Barak, Amir Jerbi, Eitan Hadar, Michael Kletskin
  • Publication number: 20130291052
    Abstract: Systems and methods of implementing a secured cloud environment allow for design and instantiation of a security policy at the infrastructure level. An example system may comprise a first module to facilitate selecting at least two cloud computing component templates from a cloud computing component catalog. The system may comprise a second module to facilitate defining a connection between the at least two selected cloud computing component templates. The system may comprise a third module to facilitate assigning a security level and a policy to at least one of the at least two selected cloud computing component templates. The system may comprise a fourth module to facilitate building a cloud computing component blueprint.
    Type: Application
    Filed: April 30, 2012
    Publication date: October 31, 2013
    Applicant: CA, Inc.
    Inventors: Eitan Hadar, Michael Kletskin, Nir Barak, Amir Jerbi, Yaacov Bezalel
  • Patent number: 8490150
    Abstract: According to one embodiment, a system comprises one or more processors coupled to a memory and executing logic. A policy life cycle component is configured to maintain a repository of security policies. The repository of security policies comprises policies governing access to a virtual host and to a plurality of virtual machines running on the virtual host. The policy life cycle component is also configured to issue a compound policy for an identified virtual operating system running on the virtual host. The compound policy provides a virtual host policy and access rules for each of the plurality of virtual machines running on the virtual host. A topology manager is configured to receive the compound policy from the policy life cycle component, assign the compound to an access control agent, and maintain a security policy topology. The security policy topology stores associations between access control agents and compound policies.
    Type: Grant
    Filed: September 23, 2009
    Date of Patent: July 16, 2013
    Assignee: CA, Inc.
    Inventors: Ethan Hadar, Nimrod Vax, Amir Jerbi, Michael Kletskin
  • Publication number: 20130061219
    Abstract: According to one embodiment of the present disclosure, a method includes receiving a request to instantiate a virtual machine image in a virtualization environment. The method also includes sending a request for verification of the virtualization environment. The method further includes receiving information from the enforcement module in response to the request for verification of the virtualization environment. The method further includes determining whether the virtualization environment is verified based on the information received.
    Type: Application
    Filed: September 1, 2011
    Publication date: March 7, 2013
    Applicant: Computer Associates Think, Inc.
    Inventors: Amir Jerbi, Michael Kletskin, Eitan Hadar
  • Publication number: 20110072486
    Abstract: According to one embodiment, a system comprises one or more processors coupled to a memory and executing logic. A policy life cycle component is configured to maintain a repository of security policies. The repository of security policies comprises policies governing access to a virtual host and to a plurality of virtual machines running on the virtual host. The policy life cycle component is also configured to issue a compound policy for an identified virtual operating system running on the virtual host. The compound policy provides a virtual host policy and access rules for each of the plurality of virtual machines running on the virtual host. A topology manager is configured to receive the compound policy from the policy life cycle component, assign the compound to an access control agent, and maintain a security policy topology. The security policy topology stores associations between access control agents and compound policies.
    Type: Application
    Filed: September 23, 2009
    Publication date: March 24, 2011
    Applicant: Computer Associates Think, Inc.
    Inventors: Ethan Hadar, Nimrod Vax, Amir Jerbi, Michael Kletskin
  • Publication number: 20110072487
    Abstract: According to one embodiment, a system comprises one or more processors coupled to a memory. The one or more processors when executing logic encoded in the memory provide a topology manager. The topology manager is configured to maintain a security topology of a plurality of hosts. The security topology associates one or more virtual hosts policies with a plurality of virtual hosts in a cloud computing deployment. The topology manager is also configured to request a query for one or more hosts that are candidates to be enforced. A portability manager is configured to receive a request to deploy an access control agent on the one or more candidate hosts, determine an optimal agent to be deployed from a list of available agents, and deploy the optimal agent on the one or more candidate hosts.
    Type: Application
    Filed: September 23, 2009
    Publication date: March 24, 2011
    Applicant: Computer Associates Think, Inc.
    Inventors: Ethan Hadar, Nimrod Vax, Amir Jerbi, Michael Kletskin