Issued Patents 2025
Showing 26–46 of 46 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12255900 | System and method for detecting lateral movement using cloud access keys | Avi Tal LICHTENSTEIN, Daniel Hershko SHEMESH | 2025-03-18 |
| 12255948 | System and method for analyzing network objects in a cloud environment | Shai Keren, Daniel Hershko SHEMESH, Roy REZNIK, Avihai Berkovitz | 2025-03-18 |
| 12250231 | System and method for detecting lateral movement using cloud access keys | Avi Tal LICHTENSTEIN, Daniel Hershko SHEMESH | 2025-03-11 |
| 12248581 | Architecture of a multi-cloud inspector for any compute type | Yaniv Shaked, Gal KOZOSHNIK, Roy REZNIK, Yarin Miran | 2025-03-11 |
| 12248855 | Iterative vectoring for constructing data driven machine learning models | Oren Elisha, Hila Yehuda, Adar Kahana, Maya Bechler-Speicher | 2025-03-11 |
| 12248909 | System and method for agentless application inventory detection | Mattan SHALEV, Yaniv Shaked, Gal KOZOSHNIK, Omri Kornblau, Roy REZNIK +1 more | 2025-03-11 |
| 12250230 | Lateral movement analysis using certificate private keys | Avi Tal LICHTENSTEIN, Yinon COSTICA | 2025-03-11 |
| 12248584 | System and method for agentless host configuration detection of an image in a virtualized environment | Yaniv Shaked, Mattan SHALEV, Gal KOZOSHNIK, Daniel Klein, Roy REZNIK | 2025-03-11 |
| 12242601 | System and method for agentless host configuration detection in a computing environment | Yaniv Shaked, Mattan SHALEV, Gal KOZOSHNIK, Daniel Klein, Roy REZNIK | 2025-03-04 |
| 12244627 | Techniques for active inspection of vulnerability exploitation using exposure | Matilda LIDGI, Shai Keren, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK | 2025-03-04 |
| 12244634 | Techniques for cybersecurity identity risk detection utilizing disk cloning and unified identity mapping | Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Yinon COSTICA, Avihai Berkovitz +7 more | 2025-03-04 |
| 12231440 | System and method for detecting lateral movement using cloud access keys | Avi Tal LICHTENSTEIN, Daniel Hershko SHEMESH | 2025-02-18 |
| 12229257 | Techniques for preventing cloud identity misuse leveraging runtime context | Alon SCHINDEL, Shir Tamari, Ron Cohen | 2025-02-18 |
| 12225037 | Techniques for cybersecurity investigation of cloud entity misuse leveraging runtime context | Alon SCHINDEL, Shir Tamari, Ron Cohen | 2025-02-11 |
| 12217079 | Detecting security exceptions across multiple compute environments | Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Yinon COSTICA, Raaz HERZBERG +3 more | 2025-02-04 |
| 12219048 | Techniques for encrypted disk cybersecurity inspection utilizing disk cloning | Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Yinon COSTICA, Yaniv Shaked +1 more | 2025-02-04 |
| 12212586 | Techniques for cybersecurity inspection based on runtime data and static analysis from cloned resources | Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Yinon COSTICA, Aviel FOGEL +2 more | 2025-01-28 |
| 12189779 | Detection of cyber threats embedded in cloud applications | Roy REZNIK, Guy Rozendorn, Yarin Miran | 2025-01-07 |
| 12192270 | System and method for analyzing network objects in a cloud environment | Shai Keren, Daniel Hershko SHEMESH, Roy REZNIK, Avihai Berkovitz | 2025-01-07 |
| 12189785 | System and method for providing third party compliance to computer and software environments | Roy REZNIK, Mattan SHALEV, Avihai Berkovitz, Erez Eyal | 2025-01-07 |
| 12189774 | Techniques for detecting cloud identity misuse based on runtime context and static analysis | Alon SCHINDEL, Shir Tamari, Ron Cohen | 2025-01-07 |