Patents by Inventor Oran Epelbaum
Oran Epelbaum has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190149420Abstract: A management unit comprising a processor, the management unit is configured to be in communication with at least one management system, the at least one management system configured to be in communication with at least one endpoint machine in an environment of multiple endpoint machines, the processor is configured to: assign for the at least one management system a dynamic group of endpoint machines; execute a relevant adaptor on the management system according to the assigned dynamic group; and apply to the dynamic group of endpoint machines, by the executed adaptor, policy rules relevant to the dynamic group of endpoint machines.Type: ApplicationFiled: January 14, 2019Publication date: May 16, 2019Applicant: INTIGUA , INC.Inventors: Tomer LEVY, Shimon HASON, Oran EPELBAUM, Shai TOREN
-
Publication number: 20170366404Abstract: A management unit comprising a processor, the management unit is configured to be in communication with at least one management system, the at least one management system configured to be in communication with at least one endpoint machine in an environment of multiple endpoint machines, the processor is configured to: assign for the at least one management system a dynamic group of endpoint machines; execute a relevant adaptor on the management system according to the assigned dynamic group; and apply to the dynamic group of endpoint machines, by the executed adaptor, policy rules relevant to the dynamic group of endpoint machines.Type: ApplicationFiled: September 3, 2017Publication date: December 21, 2017Applicant: INTIGUA , INC.Inventors: Tomer LEVY, Shimon HASON, Oran EPELBAUM, Shai TOREN
-
Patent number: 9509553Abstract: A method of executing an original agent application as a virtual agent, the method comprising encapsulating an original agent in a container file to produce a virtual agent; providing the virtual agent to an endpoint machine; and executing the virtual agent, within the container, on the endpoint machine.Type: GrantFiled: August 13, 2012Date of Patent: November 29, 2016Assignee: INTIGUA, INC.Inventors: Tomer Levy, Shimon Hason, Oran Epelbaum
-
Publication number: 20160043892Abstract: A system and method for providing a service may include creating a management tool backend server. A management unit may be installed on a management tool backend server. A request to provide a management service may be received and the management unit and a plurality of management agents installed in a plurality of endpoint servers may be caused to provide the management service.Type: ApplicationFiled: July 22, 2015Publication date: February 11, 2016Inventors: Shimon HASON, Shai TOREN, Oran EPELBAUM
-
Patent number: 9137096Abstract: A network compliance application performs a method of coalescing violation data based on rule and policy violations by retrieving network event data indicative of compliance with a set of policies, in which each of the policies has a set of rules. Policy definition includes a template of rules, definition of rule severity, and a compliance threshold specifying a number of rules of a severity that render the policy non-compliant. The compliance application computes, for each of the policies, violations, each violation indicative of a deviation from a particular rule, and displays a series of views indicative of a plurality of policies in the set of policies, each of the views indicative of violations attributable to each of the policies. From the displayed view, the application receives a detail selection corresponding to a subset of the displayed violations for detailed report display.Type: GrantFiled: July 1, 2013Date of Patent: September 15, 2015Assignee: EMC CorporationInventors: Hanna Yehuda, Daniel Lanzi, Oran Epelbaum, Frank Murphy
-
Publication number: 20140122670Abstract: A management unit comprising a processor, the management unit is configured to be in communication with at least one management system, the at least one management system configured to be in communication with at least one endpoint machine in an environment of multiple endpoint machines, the processor is configured to: assign for the at least one management system a dynamic group of endpoint machines; execute a relevant adaptor on the management system according to the assigned dynamic group; and apply to the dynamic group of endpoint machines, by the executed adaptor, policy rules relevant to the dynamic group of endpoint machines.Type: ApplicationFiled: October 31, 2013Publication date: May 1, 2014Applicant: INTIGUA INC.Inventors: Tomer LEVY, Shimon Hason, Oran Epelbaum, Shai Toren
-
Publication number: 20140047439Abstract: A method of executing an original agent application as a virtual agent, the method comprising encapsulating an original agent in a container file to produce a virtual agent; providing the virtual agent to an endpoint machine; and executing the virtual agent, within the container, on the endpoint machine.Type: ApplicationFiled: August 13, 2012Publication date: February 13, 2014Inventors: Tomer LEVY, Shimon Hason, Oran Epelbaum
-
Patent number: 8621550Abstract: A compliance manager presents a set of selectable compliance tests (e.g., templates) in a graphical user interface. For example, each compliance test has a unique configuration operable for evaluating data associated with Information Technology “IT” resources. In particular, the compliance tests can include policy and/or rule templates for use in creating targeted compliance testing of IT resources. During operation, the compliance manager receives a selection of a compliance test (e.g., from a network administrator). The compliance manager additionally enables modification of a configuration associated with the compliance test. In turn, the compliance manager applies the compliance test (along with any modifications) to the data associated with the IT resources.Type: GrantFiled: September 28, 2007Date of Patent: December 31, 2013Assignee: EMC CorporationInventors: Hanna Yehuda, Daniel C. Lanzi, Oran Epelbaum, Frank Murphy
-
Patent number: 8499331Abstract: A network compliance application performs a method of coalescing violation data based on rule and policy violations by retrieving network event data indicative of compliance with a set of policies, in which each of the policies has a set of rules. Policy definition includes a template of rules, definition of rule severity, and a compliance threshold specifying a number of rules of a severity that render the policy non-compliant. The compliance application computes, for each of the policies, violations, each violation indicative of a deviation from a particular rule, and displays a series of views indicative of a plurality of policies in the set of policies, each of the views indicative of violations attributable to each of the policies. From the displayed view, the application receives a detail selection corresponding to a subset of the displayed violations for detailed report display.Type: GrantFiled: June 27, 2007Date of Patent: July 30, 2013Assignee: EMC CorporationInventors: Hanna Yehuda, Daniel C. Lanzi, Oran Epelbaum, Frank Murphy
-
Patent number: 8494977Abstract: In a large network, it can be difficult to pinpoint and track down the causes of rule violations deviating from established policies. Conventional environment monitoring mechanisms do not categorize notifications according to those triggering rule violations, and do not identify related network entities and rules. A rule violation processor allows traversal of notifications according to rule violations, organizing the violation according to severity and recurrence, and identifies related rules and network entities which may be related to the rule violation. The resulting graphical user interface provides efficient, timely traversal and analysis of rule violations across the network to allow quick, efficient identification of the underlying cause or condition of the rule violation.Type: GrantFiled: September 28, 2007Date of Patent: July 23, 2013Assignee: EMC CorporationInventors: Hanna Yehuda, Daniel C. Lanzi, Oran Epelbaum, Frank Murphy
-
Publication number: 20110258690Abstract: A method for authentication includes, in a first computer (14), receiving from a second computer (16) over a net-work (18) a communication containing an identification token. At the first computer, the identification token is stored only in a memory (30) of an information protection device (20), which is connected to the first computer by a local interface (34).Type: ApplicationFiled: November 29, 2009Publication date: October 20, 2011Applicant: HUMAN INTERFACE SECURITY LTD.Inventors: Marc Gaffan, Oran Epelbaum, Amir Zilberstein, Lior Frenkel
-
Patent number: 8024320Abstract: Novel methods for expressing paths contained in queries are provided. The path expressions are composed from tokens selected from the group consisting of object identifiers, attribute identifiers, a relationship operator, and path qualifiers. Path expressions can be more easily created than by creating the path expressions directly in SQL. The path expressions can easily be incorporated into queries for querying data structured according to an object model. Examples of such queries include queries for implementing rules for checking data corresponding to IT infrastructures to see if the IT infrastructure is compliant with policies created for the IT infrastructure.Type: GrantFiled: October 2, 2007Date of Patent: September 20, 2011Assignee: EMC CorporationInventors: Hanna Yehuda, Daniel C. Lanzi, Oran Epelbaum, Frank Murphy
-
Patent number: 7934248Abstract: A network compliance application performs a method of coalescing violation data based on rule and policy violations by retrieving network event data indicative of compliance with a set of policies, in which each of the policies has a set of rules. The application computes, for each of the policies, violations, each violation indicative of a deviation from a particular rule, and displays a summary view indicative of a plurality of policies in the set of policies, the summary view indicative of violations attributable to each of the policies. From the displayed summary view, the application receives a detail selection corresponding to a subset of the displayed violations in the summary view; displays, for the received detail selection, a violation view having a sequence of ranked violation entries corresponding to the detail selection.Type: GrantFiled: June 27, 2007Date of Patent: April 26, 2011Assignee: EMC CorporationInventors: Hanna Yehuda, Daniel C. Lanzi, Oran Epelbaum, Frank Murphy
-
Patent number: 7885943Abstract: Compliance rules are created that can be used to help detect violations of compliance policies imposed on an IT infrastructure. Each of one or more compliance rules associated with a respective IT-infrastructure compliance policy is defined by specifying three items: 1) the type of configuration items to which the rule is to be applied, 2) the rule scope that determines which configuration items of the configuration type are to be checked for compliance, and 3) a desired state that each configuration item checked must satisfy in order to be considered in compliance.Type: GrantFiled: October 2, 2007Date of Patent: February 8, 2011Assignee: EMC CorporationInventors: Hanna Yehuda, Daniel C. Lanzi, Oran Epelbaum, Frank Murphy
-
Patent number: 7809667Abstract: A compliance manager enables creation of policies and corresponding rules to test compliancy of network resources via evaluation of collected data associated with the network resources. For example, each of one or more rules associated with a respective network compliance policy has a corresponding rule scope definition indicating which portion of collected network resource data to use for verification purposes. Each rule also has a corresponding set of selected compliance conditions. The compliance conditions specify what values the portions of collected resource data as specified by the rule scope definition should be in order to be compliant. During a compliancy check, the compliance manager applies the rule scope definition to the collected data to produce a set of network resource data to be verified. Thereafter, the compliance manager determines compliancy by checking whether the produced set of network resource data matches the corresponding compliance conditions as specified for the rule.Type: GrantFiled: June 27, 2007Date of Patent: October 5, 2010Assignee: EMC CorporationInventors: Hanna Yehuda, Daniel C. Lanzi, Oran Epelbaum, Frank Murphy