Issued Patents All Time
Showing 1–22 of 22 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12289293 | Network security analysis system with reinforcement learning for selecting domains to scan | Eyal Heiman, Elisha Ben-Zvi, Asaf Nadler | 2025-04-29 |
| 12088710 | Key rotation for sensitive data tokenization | Jonathan Herzog, Ittay Dror, Elisha Ben-Zvi | 2024-09-10 |
| 11849036 | Key rotation for sensitive data tokenization | Jonathan Herzog, Ittay Dror, Elisha Ben-Zvi | 2023-12-19 |
| 11831609 | Network security system with enhanced traffic analysis based on feedback loop | Eyal Heiman, Elisha Ben-Zvi, Asaf Nadler | 2023-11-28 |
| 11632356 | Proxy auto-configuration for directing client traffic to a cloud proxy with cloud-based unique identifier assignment | John Devasia, Christopher Dewar, Eyal Heiman | 2023-04-18 |
| 11516257 | Device discovery for cloud-based network security gateways | Michael Graham, John Devasia | 2022-11-29 |
| 11381393 | Key rotation for sensitive data tokenization | Jonathan Herzog, Ittay Dror, Elisha Ben-Zvi | 2022-07-05 |
| 11310201 | Network security system with enhanced traffic analysis based on feedback loop | Eyal Heiman, Elisha Ben-Zvi, Asaf Nadler | 2022-04-19 |
| 11245667 | Network security system with enhanced traffic analysis based on feedback loop and low-risk domain identification | Eyal Heiman, Elisha Ben-Zvi, Robert D. Blumofe | 2022-02-08 |
| 10958624 | Proxy auto-configuration for directing client traffic to a cloud proxy with cloud-based unique identifier assignment | John Devasia, Christopher Dewar, Eyal Heiman | 2021-03-23 |
| 10951589 | Proxy auto-configuration for directing client traffic to a cloud proxy | John Devasia, Christopher Dewar, Eyal Heiman | 2021-03-16 |
| 10834138 | Device discovery for cloud-based network security gateways | Michael Graham, John Devasia | 2020-11-10 |
| 9870424 | Social network based contextual ranking | Ron Karidi, Yitzhak Tzahi Weisfeild, Roy Varshavsky, Avigad Oron, Kira Radinsky | 2018-01-16 |
| 9633110 | Enrichment of data using a semantic auto-discovery of reference and visual data | Meir Mendelovich, Dany Hoter | 2017-04-25 |
| 9443084 | Authentication in a network using client health enforcement framework | Nir Nice, Anat Eyal, Chandrasekhar Nukala, Sreenivas Addagatla | 2016-09-13 |
| 9344432 | Network layer claims based access control | Yair Tor, Daniel Paul Rose, Patrik Schnell, Moshe Sapir, Oleg Ananiev +2 more | 2016-05-17 |
| 9111079 | Trustworthy device claims as a service | Daniel Alon, Yair Tor, Mark F. Novak, Khaja E. Ahmed, Yoav Yassour | 2015-08-18 |
| 8997196 | Flexible end-point compliance and strong authentication for distributed hybrid enterprises | Asaf Kariv, Oleg Ananiev, Eli Tovbeyn, Daniel Kershaw | 2015-03-31 |
| 8918856 | Trusted intermediary for network layer claims-enabled access control | Yair Tor, Patrik Schnell, Oleg Ananiev, Arthur Zavalkovsky, Daniel Paul Rose | 2014-12-23 |
| 8528069 | Trustworthy device claims for enterprise applications | Mark F. Novak, Yair Tor, Yoav Yassour, Alexey Efron, Amos Ortal +2 more | 2013-09-03 |
| 8336102 | Delivering malformed data for fuzz testing to software applications | Nissim Natanov, Meir Shmouely, Yoram Singer | 2012-12-18 |
| 6801603 | Online aggregation | Amos Arev, Yael Shain | 2004-10-05 |