“I have been working with Elad in the past 2 years, since he and his Optier team joined SAP. Professionalism , innovation and “can do” spirit is in Elad’s DNA. Elad is man of many talents: Product, Software development, entrepreneurship and above all a LEADER. Elad is a team player, knows to share , influence as well as get feedback and adjust. He is a true asset to any organization. ”
על אודות
A seasoned tech entrepreneur, with experience in both corporates and start-ups.
CEO…
פעילות
-
🚀 🚀 𝗧𝗵𝗿𝗶𝗹𝗹𝗲𝗱 𝘁𝗼 𝗮𝗻𝗻𝗼𝘂𝗻𝗰𝗲 𝘁𝗵𝗮𝘁 𝗶𝗻 𝗼𝗻𝗲 𝗾𝘂𝗮𝗿𝘁𝗲𝗿 𝘄𝗲 𝗴𝗿𝗲𝘄 𝗼𝘂𝗿 𝗔𝗥𝗥 𝗳𝗿𝗼𝗺 $𝟭𝗠 -> $𝟭.𝟱𝗠 🚀 🚀 When…
🚀 🚀 𝗧𝗵𝗿𝗶𝗹𝗹𝗲𝗱 𝘁𝗼 𝗮𝗻𝗻𝗼𝘂𝗻𝗰𝗲 𝘁𝗵𝗮𝘁 𝗶𝗻 𝗼𝗻𝗲 𝗾𝘂𝗮𝗿𝘁𝗲𝗿 𝘄𝗲 𝗴𝗿𝗲𝘄 𝗼𝘂𝗿 𝗔𝗥𝗥 𝗳𝗿𝗼𝗺 $𝟭𝗠 -> $𝟭.𝟱𝗠 🚀 🚀 When…
נוסף לייק על ידי Elad Schulman
-
Delighted to welcome Alon Cinamon to the Viola Ventures team as Director of Investments! Alon brings remarkable talent and extensive experience as an…
Delighted to welcome Alon Cinamon to the Viola Ventures team as Director of Investments! Alon brings remarkable talent and extensive experience as an…
נוסף לייק על ידי Elad Schulman
-
Lasso is heading to RSA Conference 2025 🤠 📅 Date: April 28- May 1, 2025 📍 Location: San Francisco Meet us at RSAC to explore how GenAI and…
Lasso is heading to RSA Conference 2025 🤠 📅 Date: April 28- May 1, 2025 📍 Location: San Francisco Meet us at RSAC to explore how GenAI and…
נוסף לייק על ידי Elad Schulman
ניסיון
חינוך
פטנטים
-
Identifying, reporting and mitigating unauthorized use of web code
שהונפקו US 11503072
Methods, apparatuses and computer program products implement embodiments of the present invention that include monitoring use of web code by providing a web agent for embedding into the web code of a protected web site, and upon downloading the web code from a server to a client computer and running the web code on the client computer, identifying, by the web agent, attributes of the server. The attributes are analyzed by the web agent so as to detect malicious use of the web code, and a…
Methods, apparatuses and computer program products implement embodiments of the present invention that include monitoring use of web code by providing a web agent for embedding into the web code of a protected web site, and upon downloading the web code from a server to a client computer and running the web code on the client computer, identifying, by the web agent, attributes of the server. The attributes are analyzed by the web agent so as to detect malicious use of the web code, and a notification beacon is transmitted by the web agent in response to detecting the malicious use of the web code.
ממציאים נוספיםראו פטנט -
Detection of domain name impersonation
שהונפקו US 11212313
A method for evaluating domain names includes storing a listing, for a plurality of non-ASCII Unicode characters, of corresponding ASCII characters that are visually similar to the non-ASCII Unicode characters. A record is received of one or more Internationalized Domain Names (IDNs), each IDN containing at least one of the non-ASCII Unicode characters. The corresponding ASCII characters are substituted for the non-ASCII Unicode characters in the record in order to generate candidate ASCII…
A method for evaluating domain names includes storing a listing, for a plurality of non-ASCII Unicode characters, of corresponding ASCII characters that are visually similar to the non-ASCII Unicode characters. A record is received of one or more Internationalized Domain Names (IDNs), each IDN containing at least one of the non-ASCII Unicode characters. The corresponding ASCII characters are substituted for the non-ASCII Unicode characters in the record in order to generate candidate ASCII domain names corresponding to the one or more IDNs. The candidate ASCII domain names are compared to one or more protected ASCII domain names. When a candidate ASCII domain name matches one of the protected ASCII domain names, a protective action is initiated with regard to the IDN corresponding to the candidate ASCII domain name.
ממציאים נוספיםראו פטנט -
Application monitoring
שהונפקו US 10534685
A method, a system, and a computer program product for monitoring of software applications are disclosed. A request for data associated with a software application is received. Based on the received request, a monitoring agent is injected in a response data. The response data is responsive to the received request. Using the monitoring agent, at least one transaction implementing the response data is monitored. The transaction is executed by the software application. Data associated with…
A method, a system, and a computer program product for monitoring of software applications are disclosed. A request for data associated with a software application is received. Based on the received request, a monitoring agent is injected in a response data. The response data is responsive to the received request. Using the monitoring agent, at least one transaction implementing the response data is monitored. The transaction is executed by the software application. Data associated with execution of the transaction is collected based on the monitoring.
ממציאים נוספיםראו פטנט -
Contextual monitoring and tracking of SSH sessions
שהונפקו US 10419452
Abstract: An SSH module is executed as part of a host computing machine, where code for an secure shell (SSH) agent is integrated with code of the SSH module. Incoming and outgoing host computing machine transactions are collected using the SSH agent which transmits the collected host computing machine transactions to an SSH context agent external to the SSH module. The collected host machine transactions are transmitted to a monitoring server for anomalous transaction detection. The monitoring…
Abstract: An SSH module is executed as part of a host computing machine, where code for an secure shell (SSH) agent is integrated with code of the SSH module. Incoming and outgoing host computing machine transactions are collected using the SSH agent which transmits the collected host computing machine transactions to an SSH context agent external to the SSH module. The collected host machine transactions are transmitted to a monitoring server for anomalous transaction detection. The monitoring server returns instructions to perform an action based on an anomalous transaction detection.
ממציאים נוספיםראו פטנט -
Real-time contextual monitoring intrusion detection and prevention
שהונפקו US 10015178
A configuration is received for an agent associated with an application to monitor application transactions. The agent monitors incoming and outgoing application transactions using the agent and transmits monitored transaction data to a monitoring server for anomalous transaction detection. The agent receives instructions from the monitoring server to perform an action based on the transmitted monitored transaction data and reports the status of the performed action to the monitoring server.
ממציאים נוספיםראו פטנט -
SOFTWARE TEST MANAGEMENT SYSTEM AND METHOD WITH FACILITATED REUSE OF TEST COMPONENTS
שהונפקו US 20100114939
שפות
-
English
-
-
Hebrew
-
המלצות התקבל
14 אנשים המליצו Elad
הצטרפו עכשיו כדי נוףעוד פעילות על ידי Elad
-
Lasso's findings highlight the evolving risks posed by AI-driven data retention. The race to train large models has led to aggressive data retention…
Lasso's findings highlight the evolving risks posed by AI-driven data retention. The race to train large models has led to aggressive data retention…
נוסף לייק על ידי Elad Schulman
-
https://lnkd.in/eGW9pZ7h Last week, I gave a keynote speech advocating the need to develop AI from a humanist perspective –especially as it pertains…
https://lnkd.in/eGW9pZ7h Last week, I gave a keynote speech advocating the need to develop AI from a humanist perspective –especially as it pertains…
נוסף לייק על ידי Elad Schulman
-
Last Thursday and Friday were an epic whirlwind of activity and engagement in the Nation’s Capital. I joined the amazing group of professionals with…
Last Thursday and Friday were an epic whirlwind of activity and engagement in the Nation’s Capital. I joined the amazing group of professionals with…
נוסף לייק על ידי Elad Schulman
-
Honoring the Women Who Built, Guided, and Inspired My Journey As I reflect on my journey, I realize that every step I’ve taken has been shaped by…
Honoring the Women Who Built, Guided, and Inspired My Journey As I reflect on my journey, I realize that every step I’ve taken has been shaped by…
נוסף לייק על ידי Elad Schulman
-
Rapaiz! Milhares de repositórios privados expostos, incluindo gigantes como Google e Microsoft. Uma falha no CoPilot e no Bing revelou dados…
Rapaiz! Milhares de repositórios privados expostos, incluindo gigantes como Google e Microsoft. Uma falha no CoPilot e no Bing revelou dados…
נוסף לייק על ידי Elad Schulman
-
𝐇𝐨𝐞 𝐝𝐮𝐢𝐳𝐞𝐧𝐝𝐞𝐧 𝐩𝐫𝐢𝐯𝐚𝐭𝐞 𝐆𝐢𝐭𝐇𝐮𝐛-𝐫𝐞𝐩𝐨’𝐬 𝐢𝐧 𝐂𝐨𝐩𝐢𝐥𝐨𝐭 𝐛𝐞𝐥𝐚𝐧𝐝𝐝𝐞𝐧 Onderzoek van Lasso onthulde een…
𝐇𝐨𝐞 𝐝𝐮𝐢𝐳𝐞𝐧𝐝𝐞𝐧 𝐩𝐫𝐢𝐯𝐚𝐭𝐞 𝐆𝐢𝐭𝐇𝐮𝐛-𝐫𝐞𝐩𝐨’𝐬 𝐢𝐧 𝐂𝐨𝐩𝐢𝐥𝐨𝐭 𝐛𝐞𝐥𝐚𝐧𝐝𝐝𝐞𝐧 Onderzoek van Lasso onthulde een…
נוסף לייק על ידי Elad Schulman
-
Today was my last day at SentinelOne — and it feels surreal to write this. What a journey it’s been — nearly a third of my lifetime. I can’t put into…
Today was my last day at SentinelOne — and it feels surreal to write this. What a journey it’s been — nearly a third of my lifetime. I can’t put into…
נוסף לייק על ידי Elad Schulman
-
🚨 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐂𝐨𝐩𝐢𝐥𝐨𝐭 𝐞𝐱𝐩𝐨𝐧𝐞 𝐫𝐞𝐩𝐨𝐬 𝐩𝐫𝐢𝐯𝐚𝐝𝐨𝐬 𝐝𝐞 𝐆𝐢𝐭𝐇𝐮𝐛: ¿𝐄𝐬 𝐭𝐮 𝐜𝐨́𝐝𝐢𝐠𝐨 𝐫𝐞𝐚𝐥𝐦𝐞𝐧𝐭𝐞…
🚨 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐂𝐨𝐩𝐢𝐥𝐨𝐭 𝐞𝐱𝐩𝐨𝐧𝐞 𝐫𝐞𝐩𝐨𝐬 𝐩𝐫𝐢𝐯𝐚𝐝𝐨𝐬 𝐝𝐞 𝐆𝐢𝐭𝐇𝐮𝐛: ¿𝐄𝐬 𝐭𝐮 𝐜𝐨́𝐝𝐢𝐠𝐨 𝐫𝐞𝐚𝐥𝐦𝐞𝐧𝐭𝐞…
נוסף לייק על ידי Elad Schulman
-
היה לי הכבוד לשתף בדעתי על למה צריך את יום האישה בישראל של 2025 מאת Walla. אמלק- חד משמעית כן. לפני כמה שנים קיבלנו ליום האישה תיק יציאות קטן. מנהלת…
היה לי הכבוד לשתף בדעתי על למה צריך את יום האישה בישראל של 2025 מאת Walla. אמלק- חד משמעית כן. לפני כמה שנים קיבלנו ליום האישה תיק יציאות קטן. מנהלת…
נוסף לייק על ידי Elad Schulman
פרופילים דומים אחרים
אנשים אחרים ששמם Elad Schulman
1 שם Elad Schulman אחר נמצא על לינקדאין
הצג/י אנשים אחרים בשם Elad Schulmanהוסף כישורים חדשים עם קורסים אלה
-
11 דקות
AWS Certified Advanced Networking – Specialty (ANS-C01) Cert Prep: 4 Network Security, Compliance, and Governance
-
1 שע’ 29 דק’
AWS Certified Machine Learning - Specialty (MLS-C01) Cert Prep: 1 Data Engineering
-
1 שע’ 36 דק’
End-to-End Real-World Data Engineering Project with Snowflake