Issued Patents All Time
Showing 1–14 of 14 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10972488 | Method and system for modeling all operations and executions of an attack and malicious process entry | Anandabrata Pal, Tamara LEIDERFARB | 2021-04-06 |
| 10880316 | Method and system for determining initial execution of an attack | Anandabrata Pal, Tamara LEIDERFARB | 2020-12-29 |
| 10511616 | Method and system for detecting and remediating polymorphic attacks across an enterprise | Tamara LEIDERFARB, Anandabrata Pal | 2019-12-17 |
| 10462160 | Method and system for identifying uncorrelated suspicious events during an attack | Tamara LEIDERFARB, Anandabrata Pal | 2019-10-29 |
| 10440036 | Method and system for modeling all operations and executions of an attack and malicious process entry | Anandabrata Pal, Tamara LEIDERFARB | 2019-10-08 |
| 10291634 | System and method for determining summary events of an attack | Anandabrata Pal, Tamara LEIDERFARB | 2019-05-14 |
| 10193906 | Method and system for detecting and remediating polymorphic attacks across an enterprise | Tamara LEIDERFARB, Anandabrata Pal | 2019-01-29 |
| 9560068 | Network intrusion detection with distributed correlation | Igal Figlin, Arthur Zavalkovsky, Efim Hudis, Jennifer LeMond, Robert Eric Fitzgerald +3 more | 2017-01-31 |
| 8990947 | Analytics engine | Efim Hudis, Eyal Zangi, Moshe Sapir, Tomer Weisberg, Yair Helman +2 more | 2015-03-24 |
| 8719942 | System and method for prioritizing computers based on anti-malware events | Igal Figlin, Sterling Reasor, Eyal Zangi, Ahmad S. Hussain | 2014-05-06 |
| 8689335 | Mapping between users and machines in an enterprise security assessment sharing system | Yair Helman, Efim Hudis | 2014-04-01 |
| 8516576 | Network intrusion detection with distributed correlation | Igal Figlin, Arthur Zavalkovsky, Efim Hudis, Jennifer LeMond, Robert Eric Fitzgerald +3 more | 2013-08-20 |
| 8402537 | Detection accuracy tuning for security | Arie Friedman, Shai Rubin, Ron Karidi | 2013-03-19 |
| 8181250 | Personalized honeypot for detecting information leaks and security breaches | Ziv Rafalovich, Ron Karidi, Efim Hudis | 2012-05-15 |
