AL

Ami Luttwak

WI Wiz: 45 patents #1 of 61Top 2%
Microsoft: 1 patents #894 of 4,126Top 25%
📍 Binyamina - Givat Ada, IL: #1 of 34 inventorsTop 3%
Overall (2025): #286 of 469,880Top 1%
46
Patents 2025

Issued Patents 2025

Showing 26–46 of 46 patents

Patent #TitleCo-InventorsDate
12255900 System and method for detecting lateral movement using cloud access keys Avi Tal LICHTENSTEIN, Daniel Hershko SHEMESH 2025-03-18
12255948 System and method for analyzing network objects in a cloud environment Shai Keren, Daniel Hershko SHEMESH, Roy REZNIK, Avihai Berkovitz 2025-03-18
12250231 System and method for detecting lateral movement using cloud access keys Avi Tal LICHTENSTEIN, Daniel Hershko SHEMESH 2025-03-11
12248581 Architecture of a multi-cloud inspector for any compute type Yaniv Shaked, Gal KOZOSHNIK, Roy REZNIK, Yarin Miran 2025-03-11
12248855 Iterative vectoring for constructing data driven machine learning models Oren Elisha, Hila Yehuda, Adar Kahana, Maya Bechler-Speicher 2025-03-11
12248909 System and method for agentless application inventory detection Mattan SHALEV, Yaniv Shaked, Gal KOZOSHNIK, Omri Kornblau, Roy REZNIK +1 more 2025-03-11
12250230 Lateral movement analysis using certificate private keys Avi Tal LICHTENSTEIN, Yinon COSTICA 2025-03-11
12248584 System and method for agentless host configuration detection of an image in a virtualized environment Yaniv Shaked, Mattan SHALEV, Gal KOZOSHNIK, Daniel Klein, Roy REZNIK 2025-03-11
12242601 System and method for agentless host configuration detection in a computing environment Yaniv Shaked, Mattan SHALEV, Gal KOZOSHNIK, Daniel Klein, Roy REZNIK 2025-03-04
12244627 Techniques for active inspection of vulnerability exploitation using exposure Matilda LIDGI, Shai Keren, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK 2025-03-04
12244634 Techniques for cybersecurity identity risk detection utilizing disk cloning and unified identity mapping Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Yinon COSTICA, Avihai Berkovitz +7 more 2025-03-04
12231440 System and method for detecting lateral movement using cloud access keys Avi Tal LICHTENSTEIN, Daniel Hershko SHEMESH 2025-02-18
12229257 Techniques for preventing cloud identity misuse leveraging runtime context Alon SCHINDEL, Shir Tamari, Ron Cohen 2025-02-18
12225037 Techniques for cybersecurity investigation of cloud entity misuse leveraging runtime context Alon SCHINDEL, Shir Tamari, Ron Cohen 2025-02-11
12217079 Detecting security exceptions across multiple compute environments Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Yinon COSTICA, Raaz HERZBERG +3 more 2025-02-04
12219048 Techniques for encrypted disk cybersecurity inspection utilizing disk cloning Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Yinon COSTICA, Yaniv Shaked +1 more 2025-02-04
12212586 Techniques for cybersecurity inspection based on runtime data and static analysis from cloned resources Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Yinon COSTICA, Aviel FOGEL +2 more 2025-01-28
12189779 Detection of cyber threats embedded in cloud applications Roy REZNIK, Guy Rozendorn, Yarin Miran 2025-01-07
12192270 System and method for analyzing network objects in a cloud environment Shai Keren, Daniel Hershko SHEMESH, Roy REZNIK, Avihai Berkovitz 2025-01-07
12189785 System and method for providing third party compliance to computer and software environments Roy REZNIK, Mattan SHALEV, Avihai Berkovitz, Erez Eyal 2025-01-07
12189774 Techniques for detecting cloud identity misuse based on runtime context and static analysis Alon SCHINDEL, Shir Tamari, Ron Cohen 2025-01-07