| 11323426 |
Method to identify users behind a shared VPN tunnel |
Lior DRIHEM, Yair Ziv, Jeremy Sinai, Tsemach Mizrachi |
2022-05-03 |
| 10567468 |
Method and system for transparently manipulating downloaded files |
Lior DRIHEM |
2020-02-18 |
| 10382493 |
Method and system for creating and receiving neutralized data items |
Daniel Mondy FINCHELSTEIN |
2019-08-13 |
| 10057390 |
Method and system for modifying HTTP request headers without terminating the connection |
Lior DRIHEM |
2018-08-21 |
| 9672189 |
Methods for effective network-security inspection in virtualized environments |
Ofer Raz, Erez Berkner |
2017-06-06 |
| 9210128 |
Filtering of applications for access to an enterprise network |
Lior DRIHEM |
2015-12-08 |
| 8959047 |
Reducing false positives in data validation using statistical heuristics |
Limor Ganon, Meir Dahan |
2015-02-17 |
| 8948193 |
Methods for intelligent NIC bonding and load-balancing |
Benzi Waisman |
2015-02-03 |
| 8902900 |
Predictive synchronization for clustered devices |
Amir Erman, Ben Zion Weissman |
2014-12-02 |
| 8776017 |
Scripting language processing engine in data leak prevention application |
Aviad Mor, Oded Gonda, Ofer Raz, Matt LeGrow |
2014-07-08 |
| 8644328 |
Methods for intelligent NIC bonding and load-balancing |
Benzi Waisman |
2014-02-04 |
| 8406233 |
Predictive synchronization for clustered devices |
Amir Erman, Ben Zion Weissman |
2013-03-26 |