Elad Schulman

Elad Schulman

Israel
13K‏ עוקבים מעל 500 קשרים

על אודות

A seasoned tech entrepreneur, with experience in both corporates and start-ups.
CEO…

פעילות

הצטרפו עכשיו כדי לראות את כל פעילות

ניסיון

  • Lasso Security גרפי

    Lasso Security

    Tel Aviv-Yafo, Tel Aviv District, Israel

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

    Tel Aviv, Israel

  • -

  • -

  • -

  • -

  • -

    Tel Aviv

  • -

    Tel Aviv Area, Israel

  • -

    Israel

  • -

    Potsdam Area, Germany

  • -

    Israel

  • -

    Israel

  • -

    Ramat Gan, Tel Aviv District, Israel

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

חינוך

  • Bar-Ilan University גרפי

    Bar-Ilan University

    -

    Graduated Summa Cum Laude.

    Winner of the Merage Foundation Scholarship, and participation in the Merage foundations 2006 summer leadership program for outstanding MBA students.
    Taught by professors from highly ranked U.S. business schools and top business leaders, the program provides tools to initiate successful marketing, sales & distribution, networking, negotiation and procurement strategies in the U.S.

  • -

    Graduated Summa Cum Laude.

  • -

פטנטים

  • Identifying, reporting and mitigating unauthorized use of web code

    שהונפקו US 11503072

    Methods, apparatuses and computer program products implement embodiments of the present invention that include monitoring use of web code by providing a web agent for embedding into the web code of a protected web site, and upon downloading the web code from a server to a client computer and running the web code on the client computer, identifying, by the web agent, attributes of the server. The attributes are analyzed by the web agent so as to detect malicious use of the web code, and a…

    Methods, apparatuses and computer program products implement embodiments of the present invention that include monitoring use of web code by providing a web agent for embedding into the web code of a protected web site, and upon downloading the web code from a server to a client computer and running the web code on the client computer, identifying, by the web agent, attributes of the server. The attributes are analyzed by the web agent so as to detect malicious use of the web code, and a notification beacon is transmitted by the web agent in response to detecting the malicious use of the web code.

    אַחֵר ממציאים
    ראה פטנט
  • Detection of domain name impersonation

    שהונפקו US 11212313

    A method for evaluating domain names includes storing a listing, for a plurality of non-ASCII Unicode characters, of corresponding ASCII characters that are visually similar to the non-ASCII Unicode characters. A record is received of one or more Internationalized Domain Names (IDNs), each IDN containing at least one of the non-ASCII Unicode characters. The corresponding ASCII characters are substituted for the non-ASCII Unicode characters in the record in order to generate candidate ASCII…

    A method for evaluating domain names includes storing a listing, for a plurality of non-ASCII Unicode characters, of corresponding ASCII characters that are visually similar to the non-ASCII Unicode characters. A record is received of one or more Internationalized Domain Names (IDNs), each IDN containing at least one of the non-ASCII Unicode characters. The corresponding ASCII characters are substituted for the non-ASCII Unicode characters in the record in order to generate candidate ASCII domain names corresponding to the one or more IDNs. The candidate ASCII domain names are compared to one or more protected ASCII domain names. When a candidate ASCII domain name matches one of the protected ASCII domain names, a protective action is initiated with regard to the IDN corresponding to the candidate ASCII domain name.

    אַחֵר ממציאים
    ראה פטנט
  • Application monitoring

    שהונפקו US 10534685

    A method, a system, and a computer program product for monitoring of software applications are disclosed. A request for data associated with a software application is received. Based on the received request, a monitoring agent is injected in a response data. The response data is responsive to the received request. Using the monitoring agent, at least one transaction implementing the response data is monitored. The transaction is executed by the software application. Data associated with…

    A method, a system, and a computer program product for monitoring of software applications are disclosed. A request for data associated with a software application is received. Based on the received request, a monitoring agent is injected in a response data. The response data is responsive to the received request. Using the monitoring agent, at least one transaction implementing the response data is monitored. The transaction is executed by the software application. Data associated with execution of the transaction is collected based on the monitoring.

    אַחֵר ממציאים
    ראה פטנט
  • Contextual monitoring and tracking of SSH sessions

    שהונפקו US 10419452

    Abstract: An SSH module is executed as part of a host computing machine, where code for an secure shell (SSH) agent is integrated with code of the SSH module. Incoming and outgoing host computing machine transactions are collected using the SSH agent which transmits the collected host computing machine transactions to an SSH context agent external to the SSH module. The collected host machine transactions are transmitted to a monitoring server for anomalous transaction detection. The monitoring…

    Abstract: An SSH module is executed as part of a host computing machine, where code for an secure shell (SSH) agent is integrated with code of the SSH module. Incoming and outgoing host computing machine transactions are collected using the SSH agent which transmits the collected host computing machine transactions to an SSH context agent external to the SSH module. The collected host machine transactions are transmitted to a monitoring server for anomalous transaction detection. The monitoring server returns instructions to perform an action based on an anomalous transaction detection.

    אַחֵר ממציאים
    ראה פטנט
  • Real-time contextual monitoring intrusion detection and prevention

    שהונפקו US 10015178

    A configuration is received for an agent associated with an application to monitor application transactions. The agent monitors incoming and outgoing application transactions using the agent and transmits monitored transaction data to a monitoring server for anomalous transaction detection. The agent receives instructions from the monitoring server to perform an action based on the transmitted monitored transaction data and reports the status of the performed action to the monitoring server.

    אַחֵר ממציאים
    ראה פטנט
  • SOFTWARE TEST MANAGEMENT SYSTEM AND METHOD WITH FACILITATED REUSE OF TEST COMPONENTS

    שהונפקו US 20100114939

    אַחֵר ממציאים
    ראה פטנט

שפות

  • English

    -

  • Hebrew

    -

המלצות התקבל

עוד פעילות על ידי Elad

הצג Elad את הפרופיל המלא

  • ראה את מי שאתה מכיר במשותף
  • הכירו
  • צור קשר Elad ישירות
הצטרפו נוף הפרופיל המלא

פרופילים דומים אחרים

אנשים אחרים ששמם Elad Schulman

הוסף כישורים חדשים עם קורסים אלה