Patents by Inventor Nimrod Stoler
Nimrod Stoler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11954217Abstract: Disclosed embodiments relate to systems and methods for securely provisioning sensitive data elements to virtualized execution instances. The techniques may include: identifying a request to provision a new virtualized execution instance; determining, in association with the request, that the new virtualized execution instance will require a prohibited data element in order to communicate with a target network resource; without providing the new virtualized execution instance the prohibited data element, registering the new virtualized execution instance; identifying a request from the new virtualized execution instance to communicate with the target network resource: performing a verification process for the request to communicate with the target network resource; and conditional on the verification process, provisioning the prohibited data element to the new virtualized execution instance.Type: GrantFiled: November 17, 2020Date of Patent: April 9, 2024Assignee: CyberArk Software Ltd.Inventors: Nimrod Stoler, Lavi Lazarovitz
-
Patent number: 11947693Abstract: Disclosed embodiments relate to systems and methods for securely provisioning sensitive data elements to virtualized execution instances. The techniques may include: identifying a request to provision a new virtualized execution instance; determining, in association with the request, that the new virtualized execution instance will require a prohibited data element in order to communicate with a target network resource; without providing the new virtualized execution instance the prohibited data element, registering the new virtualized execution instance; identifying a request from the new virtualized execution instance to communicate with the target network resource; performing a verification process for the request to communicate with the target network resource; and conditional on the verification process, provisioning the prohibited data element to the new virtualized execution instance.Type: GrantFiled: November 17, 2020Date of Patent: April 2, 2024Assignee: CyberArk Software Ltd.Inventors: Nimrod Stoler, Lavi Lazarovitz
-
Publication number: 20220188444Abstract: Systems, methods, and non-transitory computer-readable media for container management are disclosed. A system consistent with disclosed embodiments can include a processor and a computer-readable medium containing instructions. When executed by the processor, the instructions can cause the system to perform operations. The operations can include obtaining a request by a first process running in a container for access to a protected resource. The operations can further include determining that a set of registered processes does not include the first process, the set of registered processes being processes running in the container at a time point or in a time interval following creation of the container. The operations can further include determining that an exception applies to the first process and, in response to the determination that the exception applies to the first process, providing the first process access to the protected resource.Type: ApplicationFiled: December 20, 2021Publication date: June 16, 2022Applicant: CyberArk Software Ltd.Inventors: Nimrod STOLER, Lavi LAZAROVITZ
-
Patent number: 11222123Abstract: Disclosed embodiments relate to systems and methods for identifying vulnerabilities for virtualized execution instances to escape their operating environment and threaten a host environment. Techniques include identifying a virtualized execution instance configured for deployment on a host in a virtual computing environment; performing a privileged configuration inspection for the virtualized execution instance, the privileged configuration inspection analyzing whether the virtualized execution instance has been configured with one or more attributes that can permit operation of the virtualized execution instance to perform operations, beyond an environment of the virtualized execution instance, on an environment of the host; and implementing, based on the privileged configuration inspection, a control action for controlling the virtualized execution instance's ability to perform operations on the environment of the host.Type: GrantFiled: April 22, 2019Date of Patent: January 11, 2022Assignee: CyberArk Software Ltd.Inventors: Nimrod Stoler, Lavi Lazarovitz
-
Publication number: 20210073405Abstract: Disclosed embodiments relate to systems and methods for securely provisioning sensitive data elements to virtualized execution instances. The techniques may include: identifying a request to provision a new virtualized execution instance; determining, in association with the request, that the new virtualized execution instance will require a prohibited data element in order to communicate with a target network resource; without providing the new virtualized execution instance the prohibited data element, registering the new virtualized execution instance; identifying a request from the new virtualized execution instance to communicate with the target network resource; performing a verification process for the request to communicate with the target network resource; and conditional on the verification process, provisioning the prohibited data element to the new virtualized execution instance.Type: ApplicationFiled: November 17, 2020Publication date: March 11, 2021Applicant: CyberArk Software Ltd.Inventors: Nimrod Stoler, Lavi Lazarovitz
-
Publication number: 20210073406Abstract: Disclosed embodiments relate to systems and methods for securely provisioning sensitive data elements to virtualized execution instances. The techniques may include: identifying a request to provision a new virtualized execution instance; determining, in association with the request, that the new virtualized execution instance will require a prohibited data element in order to communicate with a target network resource; without providing the new virtualized execution instance the prohibited data element, registering the new virtualized execution instance; identifying a request from the new virtualized execution instance to communicate with the target network resource: performing a verification process for the request to communicate with the target network resource; and conditional on the verification process, provisioning the prohibited data element to the new virtualized execution instance.Type: ApplicationFiled: November 17, 2020Publication date: March 11, 2021Applicant: CyberArk Software Ltd.Inventors: Nimrod Stoler, Lavi Lazarovitz
-
Patent number: 10878119Abstract: Disclosed embodiments relate to systems and methods for securely provisioning sensitive data elements to virtualized execution instances. The techniques may include: identifying a request to provision a new virtualized execution instance; determining, in association with the request, that the new virtualized execution instance will require a prohibited data element in order to communicate with a target network resource; without providing the new virtualized execution instance the prohibited data element, registering the new virtualized execution instance; identifying a request from the new virtualized execution instance to communicate with the target network resource; performing a verification process for the request to communicate with the target network resource; and conditional on the verification process, provisioning the prohibited data element to the new virtualized execution instance.Type: GrantFiled: April 1, 2020Date of Patent: December 29, 2020Assignee: CYBERARK SOFTWARE LTD.Inventors: Nimrod Stoler, Lavi Lazarovitz
-
Publication number: 20200334371Abstract: Disclosed embodiments relate to systems and methods for securely provisioning sensitive data elements to virtualized execution instances. The techniques may include: identifying a request to provision a new virtualized execution instance; determining, in association with the request, that the new virtualized execution instance will require a prohibited data element in order to communicate with a target network resource; without providing the new virtualized execution instance the prohibited data element, registering the new virtualized execution instance; identifying a request from the new virtualized execution instance to communicate with the target network resource; performing a verification process for the request to communicate with the target network resource; and conditional on the verification process, provisioning the prohibited data element to the new virtualized execution instance.Type: ApplicationFiled: April 1, 2020Publication date: October 22, 2020Applicant: CyberArk Software Ltd.Inventors: Nimrod Stoler, Lavi Lazarovitz
-
Publication number: 20200334362Abstract: Disclosed embodiments relate to systems and methods for identifying vulnerabilities for virtualized execution instances to escape their operating environment and threaten a host environment. Techniques include identifying a virtualized execution instance configured for deployment on a host in a virtual computing environment; performing a privileged configuration inspection for the virtualized execution instance, the privileged configuration inspection analyzing whether the virtualized execution instance has been configured with one or more attributes that can permit operation of the virtualized execution instance to perform operations, beyond an environment of the virtualized execution instance, on an environment of the host; and implementing, based on the privileged configuration inspection, a control action for controlling the virtualized execution instance's ability to perform operations on the environment of the host.Type: ApplicationFiled: April 22, 2019Publication date: October 22, 2020Applicant: CyberArk Software Ltd.Inventors: Nimrod Stoler, Lavi Lazarovitz
-
Patent number: 10747875Abstract: Disclosed embodiments relate to secure and reliable customization of operating system kernels. Techniques include configuring a kernel security module for loading to an operating system kernel to run kernel-level scripts on the kernel, the kernel security module being configured to perform a security verification comprising operations of: identifying, at the kernel security module, a script received at the kernel security module for requested execution by the kernel, and verifying whether the script has a valid signature; determining, at the kernel security module and based on the security verification, whether to permit the script to be processed by the kernel; and identifying, based on the determining, executable code corresponding to the script to execute at the kernel.Type: GrantFiled: March 19, 2020Date of Patent: August 18, 2020Assignee: CyberArk Software Ltd.Inventor: Nimrod Stoler
-
Patent number: 10735430Abstract: Disclosed embodiments relate to systems and methods for dynamically analyzing and enrolling virtualized execution instances. Techniques include identifying a request for enrollment for a virtualized execution instance configured to be deployed on a host in a virtual computing environment, the request including a result of a privileged configuration inspection for the virtualized execution instance; determining, based on the result of the privileged configuration inspection, to automatically enroll the virtualized execution instance; and including the virtualized execution instance in a group of enrolled virtualized execution instances, the group being available for secure communications with one or more clients in a manner that is isolated from the host.Type: GrantFiled: June 25, 2019Date of Patent: August 4, 2020Assignee: CyberArk Software Ltd.Inventor: Nimrod Stoler
-
Patent number: 10623446Abstract: Disclosed embodiments relate to systems and methods for implementing secure and multi-factor authentication for computing resources. Techniques include accessing at least one portion of identity data for a computing resource; providing the at least one portion of the identity data to the computing resource; identifying network address information unique to the computing resource; identifying a request, from the computing resource, to perform an action requiring an access token; provisioning the network address information unique to the computing resource, for use in transmitting the access token to the computing resource; and verifying both the at least one portion of the identity data and the network address information unique to the computing resource.Type: GrantFiled: September 9, 2019Date of Patent: April 14, 2020Assignee: CYBERARK SOFTWARE LTD.Inventor: Nimrod Stoler