על אודות
מאמרים מאת Idan
פעילות
-
איל וולדמן הוא אחד האנשים שהכי קשה להישאר אדישים אליהם. יזם-על, מי שהקים ומכר את מלאנוקס ל-NVIDIA ב-7 מיליארד דולר, חתן פרס ישראל. אב שכול שאיבד את…
איל וולדמן הוא אחד האנשים שהכי קשה להישאר אדישים אליהם. יזם-על, מי שהקים ומכר את מלאנוקס ל-NVIDIA ב-7 מיליארד דולר, חתן פרס ישראל. אב שכול שאיבד את…
נוסף לייק על ידי Idan Plotnik
-
After an incredible 5 year journey, I’ve wrapped up my time at GitHub. I have endless appreciation for the people, the company, and the technology…
After an incredible 5 year journey, I’ve wrapped up my time at GitHub. I have endless appreciation for the people, the company, and the technology…
נוסף לייק על ידי Idan Plotnik
-
[פוסט אישי] אתמול יצאנו אישתי, אחי הקטן והילדים מהבית בלי שום תכנון. פשוט נסענו. הרגשנו צורך לראות בעיניים, לגעת במקומות שסימלו את הכאב אבל גם את…
[פוסט אישי] אתמול יצאנו אישתי, אחי הקטן והילדים מהבית בלי שום תכנון. פשוט נסענו. הרגשנו צורך לראות בעיניים, לגעת במקומות שסימלו את הכאב אבל גם את…
שותף על ידי Idan Plotnik
ניסיון חינוך
פטנטים
-
System, method and process for detecting advanced and targeted attacks with the recoupling of kerberos authentication and authorization
שהונפקו US WO2016035015 A9
ראו פטנטA method, system and computer program for recoupling Kerberos Authentication and Authorization requests, the method including the steps of: (a) extracting authorization information, including a copy of a Ticket Granting Ticket (TGT), from an authorization request; (b) retrieving authentication information including the TGT, the authentication information having been previously extracted from an authentication transaction and stored; (c) cross-referencing the extracted authorization information…
A method, system and computer program for recoupling Kerberos Authentication and Authorization requests, the method including the steps of: (a) extracting authorization information, including a copy of a Ticket Granting Ticket (TGT), from an authorization request; (b) retrieving authentication information including the TGT, the authentication information having been previously extracted from an authentication transaction and stored; (c) cross-referencing the extracted authorization information with the retrieved authentication information, such that a discrepancy between the cross-referenced information invokes a security event alert.
-
System, Method and Process for Mitigating Advanced and Targeted Attacks with Authentication Error Injection
שהונפקו US US20160014077 A1
ראו פטנטA method system and computer program product for protecting Directory Services (DS) by monitoring traffic to the DS; deciding to block a client access request in the monitored traffic originating from a network client; synthesizing an error message based at least in part on the client access request; and sending the synthesized error message to the network client, causing the network client to abort access request process such as an authentication process or an authorization process.
-
Monitoring the life cycle of a computer network connection
מתויק US US20170063882A1
ראו פטנטMonitoring of a life cycle of a connection of a network client device to a network via monitoring time synchronization traffic flowing between one or more network client devices and a time server in a network is provided. A system for monitoring a life cycle of a connection of a network client device to a network includes a security device operable to identify a true identity of the one or more network client devices, identify a network client device's connections to and disconnections from the…
Monitoring of a life cycle of a connection of a network client device to a network via monitoring time synchronization traffic flowing between one or more network client devices and a time server in a network is provided. A system for monitoring a life cycle of a connection of a network client device to a network includes a security device operable to identify a true identity of the one or more network client devices, identify a network client device's connections to and disconnections from the network, determine which network client devices have been associated with a particular internet protocol (IP) address, and generate an output of connection and disconnection information associated with a network client device. In some examples, the security device is operable to detect anomalies and malicious patterns in the network.
-
Methods and systems for securing and protecting repositories and directories
שהונפקו IL US 20110258208
כבוד ופרסים
-
Microsoft Most Valuable Professional, Enterprise Security
Microsoft
Congratulations! We are pleased to present you with the 2013 Microsoft® MVP Award! This award is given to exceptional technical community leaders who actively share their high quality, real world expertise with others. We appreciate your outstanding contributions in Enterprise Security technical communities during the past year.
-
Microsoft MVP
Microsoft
Congratulations! We are pleased to present you with the 2011 Microsoft® MVP Award! This award is given to exceptional technical community leaders who actively share their high quality, real world expertise with others. We appreciate your outstanding contributions in Forefront technical communities during the past year.
המלצות התקבל
10 אנשים המליצו Idan
הצטרפו עכשיו כדי נוףעוד פעילות על ידי Idan
-
🚀 Innovation. Collaboration. Creativity. 🚀 The energy here in Pune today is electric! ⚡ We just kicked off the first-ever NetSPI India Hackathon…
🚀 Innovation. Collaboration. Creativity. 🚀 The energy here in Pune today is electric! ⚡ We just kicked off the first-ever NetSPI India Hackathon…
נוסף לייק על ידי Idan Plotnik
פרופילים דומים אחרים
-
Oren Farage
Oren Farage
-
Guy Flechter
Guy Flechter
-
Or Shoshani
Or Shoshani
-
Ohad Bobrov
Ohad Bobrov
-
Arik Ben-Dov
Arik Ben-Dov
-
Nadav Poplawski
Nadav Poplawski
-
Guy Zipori
Guy Zipori