RR

Roy REZNIK

WI Wiz: 24 patents #2 of 61Top 4%
Overall (2024): #1,672 of 561,600Top 1%
24
Patents 2024

Issued Patents 2024

Showing 1–24 of 24 patents

Patent #TitleCo-InventorsDate
12182172 System and method for agentless detection of sensitive data on managed databases Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak, Moran Cohen, Yaniv Shaked +2 more 2024-12-31
12177184 Techniques for cybersecurity risk-based firewall configuration Lidor Gonshorowitz, Oron Noah, Ami Luttwak, Yinon COSTICA 2024-12-24
12175428 System and method for agentless application inventory detection Mattan SHALEV, Yaniv Shaked, Gal KOZOSHNIK, Omri Kornblau, Ami Luttwak +1 more 2024-12-24
12164963 Techniques for detecting AI pipelines in cloud computing environments Ami Luttwak, Alon SCHINDEL, Amitai Cohen, Yinon COSTICA, Mattan SHALEV 2024-12-10
12141291 Secured systems development lifecycle of software applications Assaf RAPPAPORT, Ami Luttwak, Yinon COSTICA 2024-11-12
12093384 Techniques for improved inspection of container layers Yaniv Joseph Oliver, Ami Luttwak, Yinon COSTICA, Yaniv Shaked, Amir Lande Blau 2024-09-17
12095912 System and method for encrypted disk inspection utilizing disk cloning techniques Daniel Hershko SHEMESH, Yarin Miran, Ami Luttwak, Yinon COSTICA, Yaniv Shaked +1 more 2024-09-17
12095786 System and method for generating cybersecurity remediation in computing environments Itay Arbel, Bar MAGNEZI, Erez Eyal 2024-09-17
12093374 Cybersecurity incident response techniques utilizing artificial intelligence Alon SCHINDEL, Barak SHARONI, Amitai Cohen, Ami Luttwak, Yinon COSTICA 2024-09-17
12079328 Techniques for inspecting running virtualizations for cybersecurity risks Daniel Hershko SHEMESH, Yarin Miran, Ami Luttwak, Yinon COSTICA, Niv Roit BEN DAVID +3 more 2024-09-03
12061719 System and method for agentless detection of sensitive data in computing environments Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak, Moran Cohen, Yaniv Shaked +2 more 2024-08-13
12028360 Techniques for multi-tenant vulnerability scanning utilizing sensitive data Yarin Miran, Ami Luttwak, Avihai Berkovitz, Moran Cohen, Yaniv Shaked +1 more 2024-07-02
12010139 Detecting malware infection path in a cloud computing environment utilizing a security graph Elad Gabay, Yaniv Shaked, Alon SCHINDEL, Ami Luttwak 2024-06-11
12003520 Techniques for multi-tenant vulnerability scanning Yarin Miran, Ami Luttwak, Avihai Berkovitz, Moran Cohen, Yaniv Shaked +1 more 2024-06-04
12001550 Cybersecurity incident response techniques utilizing artificial intelligence Alon SCHINDEL, Barak SHARONI, Amitai Cohen, Ami Luttwak, Yinon COSTICA 2024-06-04
12001549 Cybersecurity incident response techniques utilizing artificial intelligence Alon SCHINDEL, Barak SHARONI, Amitai Cohen, Ami Luttwak, Yinon COSTICA 2024-06-04
11995193 Architecture of a multi-cloud inspector for any compute type Yaniv Shaked, Ami Luttwak, Gal KOZOSHNIK, Yarin Miran 2024-05-28
11985185 System and method for analyzing network objects in a cloud environment Shai Keren, Daniel Hershko SHEMESH, Ami Luttwak, Avihai Berkovitz 2024-05-14
11973770 Techniques for multi-tenant vulnerability scanning Yarin Miran, Ami Luttwak, Avihai Berkovitz, Moran Cohen, Yaniv Shaked +1 more 2024-04-30
11936693 System and method for applying a policy on a network path Matilda LIDGI, Shai Keren, Eliran MAROM 2024-03-19
11936785 System and method for encrypted disk inspection utilizing disk cloning techniques Daniel Hershko SHEMESH, Yarin Miran, Ami Luttwak, Yinon COSTICA, Yaniv Shaked +1 more 2024-03-19
11936622 Techniques for cybersecurity risk-based firewall configuration Lidor Gonshorowitz, Oron Noah, Ami Luttwak, Yinon COSTICA 2024-03-19
11929896 System and method for generation of unified graph models for network entities Daniel Hershko SHEMESH, Liran Moysi, Shai Keren 2024-03-12
11875306 System and method for agentless application inventory detection Mattan SHALEV, Yaniv Shaked, Gal KOZOSHNIK, Omri Kornblau, Ami Luttwak +1 more 2024-01-16