-
公开(公告)号:US10832164B2
公开(公告)日:2020-11-10
申请号:US15366608
申请日:2016-12-01
发明人: Evgeny Chernis , Leonid Gorelik , Alexander Pyasik , Anand Ranganathan , Dmitry Shusterman , Yifat Yulevich
IPC分类号: G06F40/242 , G06N20/00 , G06F16/80 , G06N5/02
摘要: Examples of techniques for generating streaming analytics applications are described herein. An example computer-implemented method includes receiving, via a processor, subject matter requirements in a semi-structured format. The method includes classifying, via the processor, the subject matter requirements based on a predefined taxonomy. The method includes extracting, via the processor, a list of entities from the subject matter requirements based on grammar. The method includes generating a solution based on a glossary and the list of extracted entities. The method includes generating, via the processor, a streaming analytics application based on the solution.
-
公开(公告)号:US20170169359A1
公开(公告)日:2017-06-15
申请号:US15366608
申请日:2016-12-01
发明人: Evgeny Chernis , Leonid Gorelik , Alexander Pyasik , Anand Ranganathan , Dmitry Shusterman , Yifat Yulevich
摘要: Examples of techniques for generating streaming analytics applications are described herein. An example computer-implemented method includes receiving, via a processor, subject matter requirements in a semi-structured format. The method includes classifying, via the processor, the subject matter requirements based on a predefined taxonomy. The method includes extracting, via the processor, a list of entities from the subject matter requirements based on grammar. The method includes generating a solution based on a glossary and the list of extracted entities. The method includes generating, via the processor, a streaming analytics application based on the solution.
-
公开(公告)号:US09734343B2
公开(公告)日:2017-08-15
申请号:US14546422
申请日:2014-11-18
发明人: Guy Galil , Leonid Gorelik , Alexander Pyasik , Oded Sofer , Yifat Yulevich
CPC分类号: G06F21/60 , G06F21/552 , G06F21/6245
摘要: Examples of techniques for detecting and preventing sensitive information leaks are described herein. In one example, a method for detection of sensitive information leaks includes computing, via a processor, a set of rules that identify sensitive information, and sending, via the processor, the set of rules to a dispatcher application using a protocol. The method can also include detecting, via the processor, that at least one data block of the transmitted data matches the set of rules, and executing, via the processor, a corrective action in response to detecting that at least one of the transmitted data blocks matches the set of rules.
-
公开(公告)号:US20160381046A1
公开(公告)日:2016-12-29
申请号:US14747239
申请日:2015-06-23
CPC分类号: G06F17/21 , G06Q10/0635 , H04L63/1416 , H04L63/1483
摘要: Techniques for informing a user about an agreement including agreement terms and trustworthiness of data source are described herein. In some examples, a processor receives agreement document data While the data is in route to a client device. A system receives network sources and content data of the agreement document. The network sources are to be processed by the processor with traffic analytics, and the content data is to be processed with text analytics. The output of these analytics is used to generate an agreement risk event for delivery to the client device with the original agreement document data.
摘要翻译: 本文描述了用于向用户通知包括协议条款和数据源的可信赖性的协议的技术。 在一些示例中,处理器接收协议文档数据,而数据正在路由到客户端设备。 系统接收协议文件的网络源和内容数据。 网络源将由具有流量分析的处理器处理,并且内容数据将通过文本分析进行处理。 这些分析的输出用于生成协议风险事件,以便将原始协议文档数据传送到客户端设备。
-
公开(公告)号:US20150242639A1
公开(公告)日:2015-08-27
申请号:US14546422
申请日:2014-11-18
发明人: Guy Galil , Leonid Gorelik , Alexander Pyasik , Oded Sofer , Yifat Yulevich
IPC分类号: G06F21/60
CPC分类号: G06F21/60 , G06F21/552 , G06F21/6245
摘要: Examples of techniques for detecting and preventing sensitive information leaks are described herein. In one example, a method for detection of sensitive information leaks includes computing, via a processor, a set of rules that identify sensitive information, and sending, via the processor, the set of rules to a dispatcher application using a protocol. The method can also include detecting, via the processor, that at least one data block of the transmitted data matches the set of rules, and executing, via the processor, a corrective action in response to detecting that at least one of the transmitted data blocks matches the set of rules.
摘要翻译: 本文描述了用于检测和防止敏感信息泄漏的技术的示例。 在一个示例中,用于检测敏感信息泄漏的方法包括经由处理器计算识别敏感信息的一组规则,以及经由处理器将该组规则发送到使用协议的调度器应用程序。 该方法还可以包括经由处理器检测所发送的数据的至少一个数据块与该组规则相匹配,并且响应于检测到所发送的数据块中的至少一个,经由处理器执行校正动作 匹配一组规则。
-
公开(公告)号:US11057407B2
公开(公告)日:2021-07-06
申请号:US16693989
申请日:2019-11-25
发明人: Shlomit Avrahami , Tali Finelt , Itai Gordon , Yakir Keisar , Ilan Prager , Alexander Pyasik , Oded Sofer , Or Bar-Yaacov , Yifat Yulevich
摘要: Detecting malware attacks is described herein. A computer-implemented method may include receiving, via a processor, events from a plurality of activity monitors. The method also include extracting, via the processor, a plurality of behavioral features from the received events. The method may further include detecting, via the processor, a malware attack based on the extracted behavioral features using a malware identification model trained on private data and public data using a machine learning technique, wherein the private data includes private enterprise attack findings. The method may also include executing, via the processor, an ad hoc protection improvement based on the detected malware attack.
-
公开(公告)号:US20200092311A1
公开(公告)日:2020-03-19
申请号:US16693989
申请日:2019-11-25
发明人: Shlomit Avrahami , Tali Finelt , ITAI GORDON , Yakir Keisar , Ilan Prager , Alexander Pyasik , ODED SOFER , Or Bar-Yaacov , Yifat Yulevich
摘要: Detecting malware attacks is described herein. A computer-implemented method may include receiving, via a processor, events from a plurality of activity monitors. The method also include extracting, via the processor, a plurality of behavioral features from the received events. The method may further include detecting, via the processor, a malware attack based on the extracted behavioral features using a malware identification model trained on private data and public data using a machine learning technique, wherein the private data includes private enterprise attack findings. The method may also include executing, via the processor, an ad hoc protection improvement based on the detected malware attack.
-
公开(公告)号:US20160380971A1
公开(公告)日:2016-12-29
申请号:US15148087
申请日:2016-05-06
IPC分类号: H04L29/06
CPC分类号: G06F17/21 , G06Q10/0635 , H04L63/1416 , H04L63/1483
摘要: Techniques for informing a user about an agreement including agreement terms and trustworthiness of data source are described herein. In some examples, a processor receives agreement document data while the data is in route to a client device. A system receives network sources and content data of the agreement document. The network sources are to be processed by the processor with traffic analytics, and the content data is to be processed with text analytics. The output of these analytics is used to generate an agreement risk event for delivery to the client device with the original agreement document data.
摘要翻译: 本文描述了用于向用户通知包括协议条款和数据源的可信赖性的协议的技术。 在一些示例中,处理器在数据进入客户端设备的路由器中接收协议文档数据。 系统接收协议文件的网络源和内容数据。 网络源将由具有流量分析的处理器处理,并且内容数据将通过文本分析进行处理。 这些分析的输出用于生成协议风险事件,以便将原始协议文档数据传送到客户端设备。
-
公开(公告)号:US10530787B2
公开(公告)日:2020-01-07
申请号:US15690668
申请日:2017-08-30
发明人: Shlomit Avrahami , Tali Finelt , Itai Gordon , Yakir Keisar , Ilan Prager , Alexander Pyasik , Oded Sofer , Or Bar-Yaacov , Yifat Yulevich
摘要: Detecting malware attacks is described herein. A computer-implemented method may include receiving, via a processor, events from a plurality of activity monitors. The method also include extracting, via the processor, a plurality of behavioral features from the received events. The method may further include detecting, via the processor, a malware attack based on the extracted behavioral features using a malware identification model trained on private data and public data. The method may also include executing, via the processor, an ad hoc protection improvement based on the detected malware attack.
-
公开(公告)号:US10169603B2
公开(公告)日:2019-01-01
申请号:US15071347
申请日:2016-03-16
发明人: Shlomit Becker , Boris Melamed , Alexander Pyasik , Shani Turgeman , Gidi Weber , Yifat Yulevich
摘要: Aspects include detecting that an extract transform load (ETL) job in an ETL system has been submitted for execution. The ETL job can include an input data storage location and an output data storage location. The ETL job is analyzed to predict whether execution of the ETL job will result in sensitive information being made accessible to an unauthorized user. The analyzing can be based on a sensitivity status of contents of the input data storage location and a data lineage of contents of the output data storage location. The ETL job is prevented from executing based on predicting that execution of the ETL job will result in sensitive information being made accessible to an unauthorized user. Execution of the ETL job is initiated based on predicting that execution of the ETL job will not result in sensitive information being made accessible to an unauthorized user.
-
-
-
-
-
-
-
-
-