AL

Ami Luttwak

WI Wiz: 26 patents #1 of 61Top 2%
Microsoft: 1 patents #1,185 of 4,715Top 30%
📍 Binyamina - Givat Ada, IL: #1 of 29 inventorsTop 4%
Overall (2024): #1,380 of 561,600Top 1%
27
Patents 2024

Issued Patents 2024

Showing 1–25 of 27 patents

Patent #TitleCo-InventorsDate
12182172 System and method for agentless detection of sensitive data on managed databases Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Moran Cohen, Yaniv Shaked +2 more 2024-12-31
12177184 Techniques for cybersecurity risk-based firewall configuration Lidor Gonshorowitz, Oron Noah, Yinon COSTICA, Roy REZNIK 2024-12-24
12175428 System and method for agentless application inventory detection Mattan SHALEV, Yaniv Shaked, Gal KOZOSHNIK, Omri Kornblau, Roy REZNIK +1 more 2024-12-24
12164963 Techniques for detecting AI pipelines in cloud computing environments Alon SCHINDEL, Amitai Cohen, Yinon COSTICA, Roy REZNIK, Mattan SHALEV 2024-12-10
12141291 Secured systems development lifecycle of software applications Assaf RAPPAPORT, Roy REZNIK, Yinon COSTICA 2024-11-12
12093384 Techniques for improved inspection of container layers Yaniv Joseph Oliver, Yinon COSTICA, Roy REZNIK, Yaniv Shaked, Amir Lande Blau 2024-09-17
12095912 System and method for encrypted disk inspection utilizing disk cloning techniques Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Yinon COSTICA, Yaniv Shaked +1 more 2024-09-17
12095777 System and method for detecting lateral movement using SSH private keys Avi Tal LICHTENSTEIN, Yinon COSTICA 2024-09-17
12095776 Lateral movement analysis using certificate private keys Avi Tal LICHTENSTEIN, Yinon COSTICA 2024-09-17
12093374 Cybersecurity incident response techniques utilizing artificial intelligence Alon SCHINDEL, Barak SHARONI, Amitai Cohen, Roy REZNIK, Yinon COSTICA 2024-09-17
12079328 Techniques for inspecting running virtualizations for cybersecurity risks Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Yinon COSTICA, Niv Roit BEN DAVID +3 more 2024-09-03
12061719 System and method for agentless detection of sensitive data in computing environments Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Moran Cohen, Yaniv Shaked +2 more 2024-08-13
12026144 Populating multi-layer technology product catalogs Gal KOZOSHNIK, Raaz HERZBERG, Yinon COSTICA, Yaniv Shaked, Daniel Klein 2024-07-02
12028360 Techniques for multi-tenant vulnerability scanning utilizing sensitive data Yarin Miran, Roy REZNIK, Avihai Berkovitz, Moran Cohen, Yaniv Shaked +1 more 2024-07-02
12010139 Detecting malware infection path in a cloud computing environment utilizing a security graph Elad Gabay, Yaniv Shaked, Alon SCHINDEL, Roy REZNIK 2024-06-11
12003520 Techniques for multi-tenant vulnerability scanning Yarin Miran, Roy REZNIK, Avihai Berkovitz, Moran Cohen, Yaniv Shaked +1 more 2024-06-04
12001550 Cybersecurity incident response techniques utilizing artificial intelligence Alon SCHINDEL, Barak SHARONI, Amitai Cohen, Roy REZNIK, Yinon COSTICA 2024-06-04
12001549 Cybersecurity incident response techniques utilizing artificial intelligence Alon SCHINDEL, Barak SHARONI, Amitai Cohen, Roy REZNIK, Yinon COSTICA 2024-06-04
11995193 Architecture of a multi-cloud inspector for any compute type Yaniv Shaked, Gal KOZOSHNIK, Roy REZNIK, Yarin Miran 2024-05-28
11985185 System and method for analyzing network objects in a cloud environment Shai Keren, Daniel Hershko SHEMESH, Roy REZNIK, Avihai Berkovitz 2024-05-14
11973770 Techniques for multi-tenant vulnerability scanning Yarin Miran, Roy REZNIK, Avihai Berkovitz, Moran Cohen, Yaniv Shaked +1 more 2024-04-30
11949690 System and method for detecting lateral movement using SSH private keys Avi Tal LICHTENSTEIN, Yinon COSTICA 2024-04-02
11936622 Techniques for cybersecurity risk-based firewall configuration Lidor Gonshorowitz, Oron Noah, Yinon COSTICA, Roy REZNIK 2024-03-19
11936785 System and method for encrypted disk inspection utilizing disk cloning techniques Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Yinon COSTICA, Yaniv Shaked +1 more 2024-03-19
11928567 System and method for improving machine learning models by detecting and removing inaccurate training data Oren Elisha, Hila Yehuda, Adar Kahana, Maya Bechler-Speicher 2024-03-12