Search

Jacob Kazakevich Phones & Addresses

  • Manalapan, NJ
  • Sunny Isles Beach, FL
  • 20 Utopia Ct, Staten Island, NY 10304 (917) 830-0089
  • 49 Dalton Ave, Staten Island, NY 10306 (718) 980-7210
  • 34 Filipe Ln, Staten Island, NY 10308 (718) 667-2142
  • Brooklyn, NY
  • New York, NY
  • 34B Filipe Ln, Staten Island, NY 10308 (718) 980-7210

Resumes

Resumes

Jacob Kazakevich Photo 1

Jacob Kazakevich

View page
Location:
United States
Jacob Kazakevich Photo 2

Jacob Kazakevich

View page

Business Records

Name / Title
Company / Classification
Phones & Addresses
Jacob Kazakevich
SECRETARY
XT STAFFING CORP
12-06 149 St, Whitestone, NY 11357
1204 149 St C/O Miller & Co, Whitestone, NY 11357
10440 N Central Expy, Dallas, TX 75231
Jacob Kazakevich
Chief Information Officer
EXTERNAL IT USA, INC
Data Processing/Preparation
140 Broadway FL 46, New York, NY 10005
(646) 233-2841
Jacob Kazakevich
President
EXTERNAL NETWORK CORPORATION
Computer Sales
14 Wall St 5 Flr, New York, NY 10005
14 Wall St, New York, NY 10005
(212) 686-8950

Publications

Us Patents

Computer Network Security

View page
US Patent:
20230101145, Mar 30, 2023
Filed:
Sep 28, 2022
Appl. No.:
17/954977
Inventors:
- New York NY, US
Jacob Kazakevich - Manalapan NJ, US
Zachary Nakaska - Frisco TX, US
Assignee:
Venn Technology Corporation - New York NY
International Classification:
H04L 9/40
Abstract:
A computer determines, by a security event detector, that an active threat exists at the computer. The security event detector resides at the computer or in a cloud resource. The security event detector identifies active threats at the computer or a network associated with the computer. The computer prevents, in response to determining that the active threat exists, access to a subset of computing resources accessible via the computer. The subset of computing resources is identified via a security policy that applies to the subset of computing resources. The security policy does not apply to one or more computing resources stored at the computer that are not in the subset. The computer determines, subsequent to determining that the active threat exists, that the active threat no longer exists. The computer allows, in response to determining that the active threat no longer exists, access to the subset of computing resources.

Security Policy For A Portion Of Resources On A Machine

View page
US Patent:
20230053983, Feb 23, 2023
Filed:
Aug 18, 2022
Appl. No.:
17/890853
Inventors:
- New York NY, US
Jacob Kazakevich - Manalapan NJ, US
David Matalon - Great Neck NY, US
Alexander Chermyanin - Nizhni Novgorod, RU
Aleksandr Sedunov - Nizhni Novgorod, RU
Assignee:
Venn Technology Corporation - New York NY
International Classification:
H04L 9/40
Abstract:
A computer stores, within a single user account, multiple supervised computing resources and multiple additional computing resources. The multiple supervised computing resources are associated with a security policy. The computer executes a first instance of a specified application that lacks read access and lacks write access to any and all of the multiple supervised computing resources. The computer executes, simultaneously with the first instance, a second instance of the specified application that accesses at least a portion of the multiple supervised computing resources. The computer applies rules from the security policy to the second instance of the specified application while foregoing applying the rules from the security policy to the first instance of the specified application.

Indicator Of Security Policy Application For A Portion Of Resources On A Machine

View page
US Patent:
20230054350, Feb 23, 2023
Filed:
Aug 18, 2022
Appl. No.:
17/890879
Inventors:
- New York NY, US
Jacob Kazakevich - Manalapan NJ, US
David Matalon - Great Neck NY, US
Alexander Chermyanin - Nizhni Novgorod, RU
Aleksandr Sedunov - Nizhni Novgorod, RU
Assignee:
Venn Technology Corporation - New York NY
International Classification:
H04L 9/40
Abstract:
A computer stores, within a single user account, multiple supervised computing resources and multiple additional computing resources. The multiple supervised computing resources are associated with a security policy. The computer executes a first instance of a specified application that lacks read access and lacks write access to any and all of the multiple supervised computing resources. The computer executes, simultaneously with the first instance, a second instance of the specified application that accesses at least a portion of the multiple supervised computing resources. The computer applies rules from the security policy to the second instance of the specified application while foregoing applying the rules from the security policy to the first instance of the specified application.

Secure Visual And Computational Boundary For A Subset Of Resources On A Computing Machine

View page
US Patent:
20230056056, Feb 23, 2023
Filed:
Aug 18, 2022
Appl. No.:
17/890798
Inventors:
- New York NY, US
Jacob Kazakevich - Manalapan NJ, US
David Matalon - Great Neck NY, US
Alexander Chermyanin - Nizhni Novgorod, RU
Aleksandr Sedunov - Nizhni Novgorod, RU
Assignee:
Venn Technology Corporation - New York NY
International Classification:
H04L 9/40
Abstract:
A computer stores, within a single user account, multiple supervised computing resources and multiple additional computing resources. The multiple supervised computing resources are associated with a security policy. The computer executes a first instance of a specified application that lacks read access and lacks write access to any and all of the multiple supervised computing resources. The computer executes, simultaneously with the first instance, a second instance of the specified application that accesses at least a portion of the multiple supervised computing resources. The computer applies rules from the security policy to the second instance of the specified application while foregoing applying the rules from the security policy to the first instance of the specified application.

Application Access Permissions In Supervised Zone

View page
US Patent:
20230057286, Feb 23, 2023
Filed:
Aug 19, 2022
Appl. No.:
17/891382
Inventors:
- New York NY, US
Jacob Kazakevich - Manalapan NJ, US
David Matalon - Great Neck NY, US
Alexander Chermyanin - Nizhni Novgorod, RU
Aleksandr Sedunov - Nizhni Novgorod, RU
Assignee:
Venn Technology Corporation - New York NY
International Classification:
H04L 9/40
G06F 9/54
Abstract:
A computer stores, within a single user account, multiple supervised computing resources and multiple additional computing resources. The multiple supervised computing resources are associated with a security policy. The computer executes a first instance of a specified application that lacks read access and lacks write access to any and all of the multiple supervised computing resources. The computer executes, simultaneously with the first instance, a second instance of the specified application that accesses at least a portion of the multiple supervised computing resources. The computer applies rules from the security policy to the second instance of the specified application while foregoing applying the rules from the security policy to the first instance of the specified application.

Operation Restriction Based On Security Policy

View page
US Patent:
20230057378, Feb 23, 2023
Filed:
Aug 19, 2022
Appl. No.:
17/891399
Inventors:
- New York NY, US
Jacob Kazakevich - Manalapan NJ, US
David Matalon - Great Neck NY, US
Alexander Chermyanin - Nizhni Novgorod, RU
Aleksandr Sedunov - Nizhni Novgorod, RU
Assignee:
Venn Technology Corporation - New York NY
International Classification:
H04L 9/40
G06F 21/16
Abstract:
A computer stores, within a single user account, multiple supervised computing resources and multiple additional computing resources. The multiple supervised computing resources are associated with a security policy. The computer executes a first instance of a specified application that lacks read access and lacks write access to any and all of the multiple supervised computing resources. The computer executes, simultaneously with the first instance, a second instance of the specified application that accesses at least a portion of the multiple supervised computing resources. The computer applies rules from the security policy to the second instance of the specified application while foregoing applying the rules from the security policy to the first instance of the specified application.

Applying A Security Policy To An Instance Of An Application

View page
US Patent:
20230058203, Feb 23, 2023
Filed:
Aug 19, 2022
Appl. No.:
17/891370
Inventors:
- Mew York NY, US
Jacob Kazakevich - Manalapan NJ, US
David Matalon - Great Neck NY, US
Alexander Chermyanin - Nizhni Novgorod, RU
Aleksandr Sedunov - Nizhni Novgorod, RU
Assignee:
Venn Technology Corporation - New York NY
International Classification:
G06F 21/53
G06F 21/57
Abstract:
A computer stores, within a single user account, multiple supervised computing resources and multiple additional computing resources. The multiple supervised computing resources are associated with a security policy. The computer executes a first instance of a specified application that lacks read access and lacks write access to any and all of the multiple supervised computing resources. The computer executes, simultaneously with the first instance, a second instance of the specified application that accesses at least a portion of the multiple supervised computing resources. The computer applies rules from the security policy to the second instance of the specified application while foregoing applying the rules from the security policy to the first instance of the specified application.

Visual Indicator For Organizational Computing Resource

View page
US Patent:
20230058346, Feb 23, 2023
Filed:
Aug 19, 2022
Appl. No.:
17/891392
Inventors:
- New York NY, US
Jacob Kazakevich - Manalapan NJ, US
David Matalon - Great Neck NY, US
Alexander Chermyanin - Nizhni Novgorod, RU
Aleksandr Sedunov - Nizhni Novgorod, RU
Assignee:
Venn Technology Corporation - New York NY
International Classification:
G06F 21/53
G06F 21/31
Abstract:
A computer stores, within a single user account, multiple supervised computing resources and multiple additional computing resources. The multiple supervised computing resources are associated with a security policy. The computer executes a first instance of a specified application that lacks read access and lacks write access to any and all of the multiple supervised computing resources. The computer executes, simultaneously with the first instance, a second instance of the specified application that accesses at least a portion of the multiple supervised computing resources. The computer applies rules from the security policy to the second instance of the specified application while foregoing applying the rules from the security policy to the first instance of the specified application.
Jacob Kazakevich from Manalapan, NJ, age ~50 Get Report