Issued Patents 2025
Showing 1–13 of 13 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12401580 | System and method for generation of unified graph models for network entities | Daniel Hershko SHEMESH, Liran Moysi, Roy REZNIK | 2025-08-26 |
| 12395488 | Techniques for analyzing external exposure in cloud environments | Matilda LIDGI, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak, Roy REZNIK | 2025-08-19 |
| 12395489 | Techniques for active inspection of cloud computing applications utilizing optical character recognition | Matilda LIDGI, Raaz HERZBERG, Ami Luttwak, Roy REZNIK, Avihai Berkovitz +1 more | 2025-08-19 |
| 12395503 | System and method for detecting sensitive data in active inspection of cloud computing resources | Matilda LIDGI, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak, Roy REZNIK | 2025-08-19 |
| 12381939 | System and method for analyzing network objects in a cloud environment | Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Avihai Berkovitz | 2025-08-05 |
| 12333010 | System and method for generating a partitioned view of a security graph in a cloud computing environment | Avihai Berkovitz, Raaz HERZBERG, Ami Luttwak, Roy REZNIK, Yinon COSTICA | 2025-06-17 |
| 12284220 | System and method for applying a policy on a network path | Roy REZNIK, Matilda LIDGI, Eliran MAROM | 2025-04-22 |
| 12273391 | Static analysis techniques for determining reachability properties of network and computing objects | Daniel Hershko SHEMESH | 2025-04-08 |
| 12273412 | System and method for analyzing network objects in a cloud environment | Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Avihai Berkovitz | 2025-04-08 |
| 12267326 | Techniques for detecting resources without authentication using exposure analysis | Matilda LIDGI, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak, Roy REZNIK | 2025-04-01 |
| 12255948 | System and method for analyzing network objects in a cloud environment | Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Avihai Berkovitz | 2025-03-18 |
| 12244627 | Techniques for active inspection of vulnerability exploitation using exposure | Matilda LIDGI, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak, Roy REZNIK | 2025-03-04 |
| 12192270 | System and method for analyzing network objects in a cloud environment | Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Avihai Berkovitz | 2025-01-07 |