Patents by Inventor Roy Rotem

Roy Rotem has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11736496
    Abstract: A data security system, including a security manager computer making network application programming interface (API) calls to a cloud-based service that performs data exchange transactions among end users, the API calls remotely controlling the cloud-based service so that the security manager computer accesses transactions that have entered the cloud-based service, whereby an end user may forward a transaction received through the cloud-based service to a central authority as being a potentially harmful or deceptive transaction, and a data inspector operative to analyze a transaction as being indeed harmful or deceptive, by applying machine learning, wherein the security manager computer controls the cloud-based service so as to transmit to the security manager transactions forwarded to the central authority, instead of or in addition to transmitting these transactions to the central authority, for analysis by the data inspector.
    Type: Grant
    Filed: February 16, 2021
    Date of Patent: August 22, 2023
    Assignee: AVANAN, INC.
    Inventors: Roy Rotem, Gil Friedrich
  • Patent number: 11647047
    Abstract: A data security system, including a security manager computer making network application programming interface (API) calls to a cloud-based service that (i) performs data exchange transactions for end users, and (ii) includes a mechanism for an end user to invoke in order to report a transaction received by the end user to a central authority as being a potentially harmful or deceptive transaction, the API calls remotely controlling the cloud-based service so that the security manager computer accesses transactions that have entered the cloud-based service, and a data inspector operative to analyze a transaction as being harmful or deceptive, by applying machine learning, wherein the security manager computer controls the cloud-based service so as to transmit transactions reported by the mechanism to the security manager, instead of or in addition to the central authority, for analysis by the data inspector.
    Type: Grant
    Filed: January 6, 2021
    Date of Patent: May 9, 2023
    Assignee: AVANAN INC.
    Inventors: Roy Rotem, Gil Friedrich
  • Publication number: 20220200991
    Abstract: Disclosed is a method of transparently detecting authentication status of endpoint devices in a network. This method may be used for differentiating guest or rogue endpoints from enterprise endpoints.
    Type: Application
    Filed: October 8, 2021
    Publication date: June 23, 2022
    Inventors: Gil Friedrich, Roy Rotem
  • Patent number: 11146559
    Abstract: Disclosed is a method of transparently detecting authentication status of endpoint devices in a network. This method may be used for differentiating guest or rogue endpoints from enterprise endpoints.
    Type: Grant
    Filed: January 13, 2014
    Date of Patent: October 12, 2021
    Assignee: ForeScout Technologies, Inc.
    Inventors: Gil Friedrich, Roy Rotem
  • Publication number: 20210258326
    Abstract: A data security system, including a security manager computer making network application programming interface (API) calls to a cloud-based service that performs data exchange transactions among end users, the API calls remotely controlling the cloud-based service so that the security manager computer accesses transactions that have entered the cloud-based service, whereby an end user may forward a transaction received through the cloud-based service to a central authority as being a potentially harmful or deceptive transaction, and a data inspector operative to analyze a transaction as being indeed harmful or deceptive, by applying machine learning, wherein the security manager computer controls the cloud-based service so as to transmit to the security manager transactions forwarded to the central authority, instead of or in addition to transmitting these transactions to the central authority, for analysis by the data inspector.
    Type: Application
    Filed: February 16, 2021
    Publication date: August 19, 2021
    Inventors: Roy Rotem, Gil Friedrich
  • Publication number: 20210211464
    Abstract: A data security system, including a security manager computer making network application programming interface (API) calls to a cloud-based service that (i) performs data exchange transactions for end users, and (ii) includes a mechanism for an end user to invoke in order to report a transaction received by the end user to a central authority as being a potentially harmful or deceptive transaction, the API calls remotely controlling the cloud-based service so that the security manager computer accesses transactions that have entered the cloud-based service, and a data inspector operative to analyze a transaction as being harmful or deceptive, by applying machine learning, wherein the security manager computer controls the cloud-based service so as to transmit transactions reported by the mechanism to the security manager, instead of or in addition to the central authority, for analysis by the data inspector.
    Type: Application
    Filed: January 6, 2021
    Publication date: July 8, 2021
    Inventors: Roy Rotem, Gil Friedrich
  • Patent number: 10509917
    Abstract: A data security system, including a security manager computer making network API calls to a service that performs data-exchange transactions for end users, the API calls remotely controlling the service so that the security manager computer accesses an outgoing transaction that has already entered the cloud-based service, by generating one or more security platform rules that are applied by the service and cause the service to automatically transmit the outgoing transaction to an inspection location prior to transmission of the outgoing transaction to a destination, and a data inspector operative to inspect data of the outgoing transaction in the inspection location for data leakage, wherein the security manager computer further controls the service so as to transmit the outgoing transaction to the destinations when the data inspector clears the data, and to perform a remedial action regarding the outgoing transaction when the data inspector does not clear the data.
    Type: Grant
    Filed: August 22, 2017
    Date of Patent: December 17, 2019
    Assignee: Avanan Inc.
    Inventors: Roy Rotem, Gil Friedrich, Avraham Zelovich
  • Patent number: 10498835
    Abstract: A system for shadow IT discovery, including a message monitor monitoring an enterprise messaging service that provides communication between users belonging to the enterprise and cloud services, and discovering a message relating to a specific cloud service, a message analyzer analyzing the message discovered by the message monitor to determine (i) the nature of the specific cloud service, and (ii) one or more enterprise users who use the specific cloud service, and a reporter reporting the results of the message analyzer to an administrator of the enterprise.
    Type: Grant
    Filed: November 2, 2016
    Date of Patent: December 3, 2019
    Assignee: Avanan Inc.
    Inventors: Roy Rotem, Avraham Zelovich, Gil Friedrich
  • Patent number: 10372931
    Abstract: A data security system, including a security manager remotely controlling, via a network application programming interface, a cloud-based service that performs data-exchange transactions for end users, operative to cause the service to prevent end user access to incoming transactions so that the security manager accesses the incoming transactions prior to end users being able to access the incoming transactions, and a data inspector operative to inspect data of incoming transactions for security clearance by invoking one or more content scanners, wherein the security manager is further operative to cause the service to restore end user access to the incoming transactions, when the security inspector clears the data, and to cause the service to perform a remedial action vis-à-vis the incoming transactions, when the security inspector does not the data.
    Type: Grant
    Filed: December 1, 2016
    Date of Patent: August 6, 2019
    Assignee: Avanan Inc.
    Inventors: Roy Rotem, Gil Friedrich, Avraham Zelovich
  • Publication number: 20170351875
    Abstract: A data security system, including a security manager computer making network API calls to a service that performs data-exchange transactions for end users, the API calls remotely controlling the service so that the security manager computer accesses an outgoing transaction that has already entered the cloud-based service, by generating one or more security platform rules that are applied by the service and cause the service to automatically transmit the outgoing transaction to an inspection location prior to transmission of the outgoing transaction to a destination, and a data inspector operative to inspect data of the outgoing transaction in the inspection location for data leakage, wherein the security manager computer further controls the service so as to transmit the outgoing transaction to the destinations when the data inspector clears the data, and to perform a remedial action regarding the outgoing transaction when the data inspector does not clear the data.
    Type: Application
    Filed: August 22, 2017
    Publication date: December 7, 2017
    Inventors: Roy Rotem, Gil Friedrich, Avraham Zelovich
  • Publication number: 20170185793
    Abstract: A data security system, including a security manager remotely controlling, via a network application programming interface, a cloud-based service that performs data-exchange transactions for end users, operative to cause the service to prevent end user access to incoming transactions so that the security manager accesses the incoming transactions prior to end users being able to access the incoming transactions, and a data inspector operative to inspect data of incoming transactions for security clearance by invoking one or more content scanners, wherein the security manager is further operative to cause the service to restore end user access to the incoming transactions, when the security inspector clears the data, and to cause the service to perform a remedial action vis-à-vis the incoming transactions, when the security inspector does not the data.
    Type: Application
    Filed: December 1, 2016
    Publication date: June 29, 2017
    Inventors: Roy Rotem, Gil Friedrich, Avraham Zelovich
  • Publication number: 20170134506
    Abstract: A system for shadow IT discovery, including a message monitor monitoring an enterprise messaging service that provides communication between users belonging to the enterprise and cloud services, and discovering a message relating to a specific cloud service, a message analyzer analyzing the message discovered by the message monitor to determine (i) the nature of the specific cloud service, and (ii) one or more enterprise users who use the specific cloud service, and a reporter reporting the results of the message analyzer to an administrator of the enterprise.
    Type: Application
    Filed: November 2, 2016
    Publication date: May 11, 2017
    Inventors: Roy Rotem, Avraham Zelovich, Gil Friedrich
  • Publication number: 20140130131
    Abstract: Disclosed is a method of transparently detecting authentication status of endpoint devices in a network. This method may be used for differentiating guest or rogue endpoints from enterprise endpoints.
    Type: Application
    Filed: January 13, 2014
    Publication date: May 8, 2014
    Applicant: ForeScout Technologies, Inc.
    Inventors: Gil Friedrich, Roy Rotem
  • Patent number: 8639800
    Abstract: Disclosed is a method of transparently detecting authentication status of endpoint devices in a network. This method may be used for differentiating guest or rogue endpoints from enterprise endpoints.
    Type: Grant
    Filed: February 14, 2008
    Date of Patent: January 28, 2014
    Assignee: Forescout Technologies, Inc.
    Inventors: Gil Friedrich, Roy Rotem
  • Publication number: 20100106824
    Abstract: Disclosed is a method of transparently detecting authentication status of endpoint devices in a network. This method may be used for differentiating guest or rogue endpoints from enterprise endpoints.
    Type: Application
    Filed: February 14, 2008
    Publication date: April 29, 2010
    Inventors: Gil Friedrich, Roy Rotem
  • Publication number: 20020194045
    Abstract: A computer-assisted method, system, medium of allocating resources within an organization. For instance, the method includes the steps of receiving a request containing at least one business change relating to allocating the resources within the organization, and generating at least one task to implement the requested business change. The method may also include the steps of identifying at least one of a person capable of handling the at least one task and a software module configured to perform the at least one task and issuing at least one instruction to the at least one of a person capable of handling the at least one task and a software module configured to perform the at least one task. These steps may allocate the resources within the organization in accordance with the at least one business change.
    Type: Application
    Filed: April 30, 2002
    Publication date: December 19, 2002
    Inventors: Izhar Shay, Amir Weinstein, David A. Lavenda, Chaim Amram, Roy Rotem