“I have been working with Elad in the past 2 years, since he and his Optier team joined SAP. Professionalism , innovation and “can do” spirit is in Elad’s DNA. Elad is man of many talents: Product, Software development, entrepreneurship and above all a LEADER. Elad is a team player, knows to share , influence as well as get feedback and adjust. He is a true asset to any organization. ”
על אודות
A seasoned tech entrepreneur, with experience in both corporates and start-ups.
CEO…
פעילות
-
These are the 10 hottest cybersecurity startups of 2024: - Cyera - Cynomi - Descope - Endor Labs - Island - Legit Security - Reality Defender -…
These are the 10 hottest cybersecurity startups of 2024: - Cyera - Cynomi - Descope - Endor Labs - Island - Legit Security - Reality Defender -…
נוסף לייק על ידי Elad Schulman
-
*Registration closes by January 5, 2025* Excited to be returning to Genesis Accelerator as a mentor once again! This time, I’m also honored to serve…
*Registration closes by January 5, 2025* Excited to be returning to Genesis Accelerator as a mentor once again! This time, I’m also honored to serve…
נוסף לייק על ידי Elad Schulman
-
Last night was filled with celebrations and new beginnings! We kicked off Batch 16’s journey just a week before they head to the Valley. As always,…
Last night was filled with celebrations and new beginnings! We kicked off Batch 16’s journey just a week before they head to the Valley. As always,…
נוסף לייק על ידי Elad Schulman
ניסיון
חינוך
-
Bar-Ilan University
-
Graduated Summa Cum Laude.
Winner of the Merage Foundation Scholarship, and participation in the Merage foundations 2006 summer leadership program for outstanding MBA students.
Taught by professors from highly ranked U.S. business schools and top business leaders, the program provides tools to initiate successful marketing, sales & distribution, networking, negotiation and procurement strategies in the U.S. -
-
Graduated Summa Cum Laude.
-
-
פטנטים
-
Identifying, reporting and mitigating unauthorized use of web code
שהונפקו US 11503072
Methods, apparatuses and computer program products implement embodiments of the present invention that include monitoring use of web code by providing a web agent for embedding into the web code of a protected web site, and upon downloading the web code from a server to a client computer and running the web code on the client computer, identifying, by the web agent, attributes of the server. The attributes are analyzed by the web agent so as to detect malicious use of the web code, and a…
Methods, apparatuses and computer program products implement embodiments of the present invention that include monitoring use of web code by providing a web agent for embedding into the web code of a protected web site, and upon downloading the web code from a server to a client computer and running the web code on the client computer, identifying, by the web agent, attributes of the server. The attributes are analyzed by the web agent so as to detect malicious use of the web code, and a notification beacon is transmitted by the web agent in response to detecting the malicious use of the web code.
אַחֵר ממציאיםראה פטנט -
Detection of domain name impersonation
שהונפקו US 11212313
A method for evaluating domain names includes storing a listing, for a plurality of non-ASCII Unicode characters, of corresponding ASCII characters that are visually similar to the non-ASCII Unicode characters. A record is received of one or more Internationalized Domain Names (IDNs), each IDN containing at least one of the non-ASCII Unicode characters. The corresponding ASCII characters are substituted for the non-ASCII Unicode characters in the record in order to generate candidate ASCII…
A method for evaluating domain names includes storing a listing, for a plurality of non-ASCII Unicode characters, of corresponding ASCII characters that are visually similar to the non-ASCII Unicode characters. A record is received of one or more Internationalized Domain Names (IDNs), each IDN containing at least one of the non-ASCII Unicode characters. The corresponding ASCII characters are substituted for the non-ASCII Unicode characters in the record in order to generate candidate ASCII domain names corresponding to the one or more IDNs. The candidate ASCII domain names are compared to one or more protected ASCII domain names. When a candidate ASCII domain name matches one of the protected ASCII domain names, a protective action is initiated with regard to the IDN corresponding to the candidate ASCII domain name.
אַחֵר ממציאיםראה פטנט -
Application monitoring
שהונפקו US 10534685
A method, a system, and a computer program product for monitoring of software applications are disclosed. A request for data associated with a software application is received. Based on the received request, a monitoring agent is injected in a response data. The response data is responsive to the received request. Using the monitoring agent, at least one transaction implementing the response data is monitored. The transaction is executed by the software application. Data associated with…
A method, a system, and a computer program product for monitoring of software applications are disclosed. A request for data associated with a software application is received. Based on the received request, a monitoring agent is injected in a response data. The response data is responsive to the received request. Using the monitoring agent, at least one transaction implementing the response data is monitored. The transaction is executed by the software application. Data associated with execution of the transaction is collected based on the monitoring.
אַחֵר ממציאיםראה פטנט -
Contextual monitoring and tracking of SSH sessions
שהונפקו US 10419452
Abstract: An SSH module is executed as part of a host computing machine, where code for an secure shell (SSH) agent is integrated with code of the SSH module. Incoming and outgoing host computing machine transactions are collected using the SSH agent which transmits the collected host computing machine transactions to an SSH context agent external to the SSH module. The collected host machine transactions are transmitted to a monitoring server for anomalous transaction detection. The monitoring…
Abstract: An SSH module is executed as part of a host computing machine, where code for an secure shell (SSH) agent is integrated with code of the SSH module. Incoming and outgoing host computing machine transactions are collected using the SSH agent which transmits the collected host computing machine transactions to an SSH context agent external to the SSH module. The collected host machine transactions are transmitted to a monitoring server for anomalous transaction detection. The monitoring server returns instructions to perform an action based on an anomalous transaction detection.
אַחֵר ממציאיםראה פטנט -
Real-time contextual monitoring intrusion detection and prevention
שהונפקו US 10015178
A configuration is received for an agent associated with an application to monitor application transactions. The agent monitors incoming and outgoing application transactions using the agent and transmits monitored transaction data to a monitoring server for anomalous transaction detection. The agent receives instructions from the monitoring server to perform an action based on the transmitted monitored transaction data and reports the status of the performed action to the monitoring server.
אַחֵר ממציאיםראה פטנט -
SOFTWARE TEST MANAGEMENT SYSTEM AND METHOD WITH FACILITATED REUSE OF TEST COMPONENTS
שהונפקו US 20100114939
שפות
-
English
-
-
Hebrew
-
המלצות התקבל
14 אנשים המליצו Elad
הצטרפו עכשיו כדי נוףעוד פעילות על ידי Elad
-
The first-ever deep dive into Israeli cyber exits. What's the average exit size? How long does a cyber exit take, from day 1 to acquisition? Who has…
The first-ever deep dive into Israeli cyber exits. What's the average exit size? How long does a cyber exit take, from day 1 to acquisition? Who has…
נוסף לייק על ידי Elad Schulman
-
Data is the new perimeter At least that’s a common phrase we hear, especially when discussing paradigm shifts such as zero trust. Data is…
Data is the new perimeter At least that’s a common phrase we hear, especially when discussing paradigm shifts such as zero trust. Data is…
נוסף לייק על ידי Elad Schulman
-
Lasso is excited to welcome Gal Klein our new Senior Backend Engineer to the team! We’re thrilled to have him on board as we continue shaping the…
Lasso is excited to welcome Gal Klein our new Senior Backend Engineer to the team! We’re thrilled to have him on board as we continue shaping the…
נוסף לייק על ידי Elad Schulman
-
Honored to be named among the "Top Cyber Security Founders to Watch in 2025" by Forbes Technology Council! This recognition belongs to the entire…
Honored to be named among the "Top Cyber Security Founders to Watch in 2025" by Forbes Technology Council! This recognition belongs to the entire…
נוסף לייק על ידי Elad Schulman
-
אז מה היה לנו בראינבנט 2024 בשרותי האבטחה והפיצ׳רים הקשורים לאבטחה בשירותים השונים ב aws? הצוות היקר שלי הרימו הפקה מטורפת של צילומים שבה צילמנו לכם…
אז מה היה לנו בראינבנט 2024 בשרותי האבטחה והפיצ׳רים הקשורים לאבטחה בשירותים השונים ב aws? הצוות היקר שלי הרימו הפקה מטורפת של צילומים שבה צילמנו לכם…
נוסף לייק על ידי Elad Schulman
-
“Most Dangerous” Software Weaknesses MITRE recently published their 2024 Most Dangerous Software Weaknesses - Common Weaknesses and Enumerations…
“Most Dangerous” Software Weaknesses MITRE recently published their 2024 Most Dangerous Software Weaknesses - Common Weaknesses and Enumerations…
נוסף לייק על ידי Elad Schulman
-
That was quite a ride! Yesterday’s US VC Road Trip panel was an absolute #FullHouse with over 150 founders coming together to sharpen their…
That was quite a ride! Yesterday’s US VC Road Trip panel was an absolute #FullHouse with over 150 founders coming together to sharpen their…
נוסף לייק על ידי Elad Schulman
פרופילים דומים אחרים
אנשים אחרים ששמם Elad Schulman
1 שם Elad Schulman אחר נמצא על לינקדאין
הצג/י אנשים אחרים בשם Elad Schulman