| 12423406 |
Techniques, machine intelligence, and mechanisms for suspicious entity clustering using credential information |
Kobi Ben Naim, Yossi Dantes, Guy Ben Arie |
2025-09-23 |
| 11392766 |
Understanding and mediating among diversely structured operational policies |
Lavi Lazarovitz |
2022-07-19 |
| 11263317 |
Understanding and mediating among diversely structured operational policies |
Lavi Lazarovitz |
2022-03-01 |
| 11140194 |
Measuring and comparing security efficiency and importance in virtualized environments |
Asaf Hecht |
2021-10-05 |
| 10985924 |
Verification of client identities based on non-distributed data |
Evgeni Aizikovich, Boris Spivak, Michael Yavnilovich, Hadas Elkabir |
2021-04-20 |
| 10862689 |
Verification of client identities based on non-distributed data |
Evgeni Aizikovich, Boris Spivak, Michael Yavnilovich, Hadas Elkabir |
2020-12-08 |
| 10839185 |
Multi-context encoding and secure communication of data |
Tal Zigman, Arthur Bendersky |
2020-11-17 |
| 10754506 |
Monitoring and controlling risk compliance in network environments |
Noa Moyal, Rotem Elias, Guy Ben Arie, Gil Makmel |
2020-08-25 |
| 10749886 |
Analyzing diversely structured operational policies |
Lavi Lazarovitz |
2020-08-18 |
| 10642715 |
Dynamic authorization of requested actions using adaptive context-based matching |
Dor Simca, Alex Gelman, Daniel Schwartzer |
2020-05-05 |
| 10554637 |
Secure and reconstructible distribution of data among network resources |
Arthur Bendersky, Hadas Elkabir |
2020-02-04 |
| 10305914 |
Secure transfer of secrets for computing devices to access network resources |
Max Brin |
2019-05-28 |
| 10148701 |
Automatic development and enforcement of least-privilege security policies |
Asaf Hecht |
2018-12-04 |
| 10135835 |
Passwordless and decentralized identity verification |
Max Brin, Dima Barboi, Noam Zweig |
2018-11-20 |