Patents by Inventor Ofri Ziv

Ofri Ziv has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10853143
    Abstract: An apparatus includes an interface and a processor. The interface is configured to receive attributes of communication connections of multiple workloads running in a computing system. The processor is configured to automatically segment the multiple workloads into groups based on the attributes of the communication connections, wherein the workloads in each group collectively run a respective application.
    Type: Grant
    Filed: March 5, 2018
    Date of Patent: December 1, 2020
    Assignee: GUARDICORE LTD.
    Inventors: Liron Schiff, Ariel Zeitlin, Ofri Ziv
  • Patent number: 10609075
    Abstract: An apparatus for computer-network security includes a network interface and a processor. The network interface is configured for communicating over a communication network. The processor is configured to detect a request from a first computer to access a non-existent shared resource of a second computer, to send to the first computer, responsively to the request, a response that imitates a genuine grant of access to the non-existent shared resource, so as to initiate an interaction between the first computer and the shared resource, and to process the interaction so as to identify a malicious activity attempted by the first computer.
    Type: Grant
    Filed: April 20, 2017
    Date of Patent: March 31, 2020
    Assignee: GUARDICORE LTD.
    Inventors: Yoni Rozenshein, Ofri Ziv
  • Patent number: 10587651
    Abstract: An apparatus for securing a cloud-provider system includes one or more network interfaces and one or more processors. The network interfaces are configured for connecting to a network. The processors are configured to allocate resources of the cloud-provider system for use by tenants of the cloud-provider system, to allocate to the tenants one or more Internet Protocol (IP) address ranges, to assign multiple IP addresses, scattered across the IP address ranges, for use by one or more honeypot servers, and to secure the cloud-provider system against hostile attacks, by processing network traffic associated with the assigned IP addresses using at least the honeypot servers.
    Type: Grant
    Filed: May 10, 2017
    Date of Patent: March 10, 2020
    Assignee: Guardicore Ltd.
    Inventors: Pavel Gurvich, Ofri Ziv, Yoni Rozenshein
  • Publication number: 20180260252
    Abstract: An apparatus includes an interface and a processor. The interface is configured to receive attributes of communication connections of multiple workloads running in a computing system. The processor is configured to automatically segment the multiple workloads into groups based on the attributes of the communication connections, wherein the workloads in each group collectively run a respective application.
    Type: Application
    Filed: March 5, 2018
    Publication date: September 13, 2018
    Inventors: Liron Schiff, Ariel Zeitlin, Ofri Ziv
  • Publication number: 20170339185
    Abstract: An apparatus for computer-network security includes a network interface and a processor. The network interface is configured for communicating over a communication network. The processor is configured to detect a request from a first computer to access a non-existent shared resource of a second computer, to send to the first computer, responsively to the request, a response that imitates a genuine grant of access to the non-existent shared resource, so as to initiate an interaction between the first computer and the shared resource, and to process the interaction so as to identify a malicious activity attempted by the first computer.
    Type: Application
    Filed: April 20, 2017
    Publication date: November 23, 2017
    Inventors: Yoni Rozenshein, Ofri Ziv
  • Publication number: 20170339186
    Abstract: An apparatus for securing a cloud-provider system includes one or more network interfaces and one or more processors. The network interfaces are configured for connecting to a network. The processors are configured to allocate resources of the cloud-provider system for use by tenants of the cloud-provider system, to allocate to the tenants one or more Internet Protocol (IP) address ranges, to assign multiple IP addresses, scattered across the IP address ranges, for use by one or more honeypot servers, and to secure the cloud-provider system against hostile attacks, by processing network traffic associated with the assigned IP addresses using at least the honeypot servers.
    Type: Application
    Filed: May 10, 2017
    Publication date: November 23, 2017
    Inventors: Pavel Gurvich, Ofri Ziv, Yoni Rozenshein
  • Patent number: 9667637
    Abstract: A method includes monitoring communication traffic that is exchanged over a computer network. One or more authentication attempts that have failed are identified in at least part of the monitored communication traffic. Hostile activity is detected in the computer network by analyzing the failed authentication attempts.
    Type: Grant
    Filed: May 31, 2015
    Date of Patent: May 30, 2017
    Assignee: GUARDICORE LTD.
    Inventors: Ariel Zeitlin, Pavel Gurvich, Ofri Ziv, Itamar Tal
  • Patent number: 9491190
    Abstract: A method for network security includes, in a computer network that exchanges traffic among multiple network endpoints using one or more network switches, configuring at least one network switch to transfer at least some of the traffic for inspection. Only a portion of the traffic, which is suspected of carrying executable software code, is selected from the transferred traffic. The selected portion of the traffic is inspected, so as to verify whether any of the executable software code is malicious.
    Type: Grant
    Filed: December 7, 2014
    Date of Patent: November 8, 2016
    Assignee: GUARDICORE LTD.
    Inventors: Ariel Zeitlin, Pavel Gurvich, Ofri Ziv, Tal Zarfati
  • Publication number: 20150358338
    Abstract: A method includes monitoring communication traffic that is exchanged over a computer network. One or more authentication attempts that have failed are identified in at least part of the monitored communication traffic. Hostile activity is detected in the computer network by analyzing the failed authentication attempts.
    Type: Application
    Filed: May 31, 2015
    Publication date: December 10, 2015
    Inventors: Ariel Zeitlin, Pavel Gurvich, Ofri Ziv, Itamar Tal
  • Publication number: 20150229659
    Abstract: A method includes, in a computer network that includes multiple endpoints, configuring a network element to forward one or more specified packets from a selected endpoint to a detection unit. A malicious network-mapping software running on the selected endpoint is identified by analyzing the forwarded packets in the detection unit.
    Type: Application
    Filed: January 14, 2015
    Publication date: August 13, 2015
    Inventors: Itamar Tal, Ariel Zeitlin, Pavel Gurvich, Ofri Ziv
  • Publication number: 20150188933
    Abstract: A method for network security includes, in a computer network that exchanges traffic among multiple network endpoints using one or more network switches, configuring at least one network switch to transfer at least some of the traffic for inspection. Only a portion of the traffic, which is suspected of carrying executable software code, is selected from the transferred traffic. The selected portion of the traffic is inspected, so as to verify whether any of the executable software code is malicious.
    Type: Application
    Filed: December 7, 2014
    Publication date: July 2, 2015
    Inventors: Ariel Zeitlin, Pavel Gurvich, Ofri Ziv, Tal Zarfati