| 12314393 |
Detection of ransomware attack using entropy values |
Alex Veprinsky, Gil Barash |
2025-05-27 |
| 10157109 |
Method for restoring files from a continuous recovery system |
Tomer Ben-Or, Gil Barash |
2018-12-18 |
| 9892005 |
System and method for object-based continuous data protection |
Tomer Ben-Or |
2018-02-13 |
| 9817729 |
Method for restoring files from a continuous recovery system |
Tomer Ben-Or, Gil Barash |
2017-11-14 |
| 9639592 |
Dynamically switching between synchronous and asynchronous replication |
Assaf Natanzon, Lev Ayzenbergv, Yossi Mossel, Ido Singer |
2017-05-02 |
| 9256498 |
System and method for generating backups of a protected system from a recovery system |
Nathaniel Leibowitz, Gil Barash, Gil Levonai, Yair Manor |
2016-02-09 |
| 8977593 |
Virtualized CG |
Assaf Natanzon, Yuval Aharoni, Tzach Schechner |
2015-03-10 |
| 8341115 |
Dynamically switching between synchronous and asynchronous replication |
Assaf Natanzon, Lev Ayzenberg, Yossi Mossel, Ido Singer |
2012-12-25 |
| 8271441 |
Virtualized CG |
Assaf Natanzon, Yuval Aharoni, Tzach Schechner |
2012-09-18 |
| 8108634 |
Replicating a thin logical unit |
Assaf Natanzon |
2012-01-31 |
| 7908515 |
Methods and apparatus for action regulation for continuous data replication systems |
Tzach Schechner, Nir Shasha, Avi Owshanko, Alex Solan |
2011-03-15 |
| 7849361 |
Methods and apparatus for multiple point in time data access |
Shlomo Ahal, Assaf Natanzon |
2010-12-07 |
| 7627612 |
Methods and apparatus for optimal journaling for continuous data replication |
Shlomo Ahal, Assaf Natanzon, Tzach Sechner, Evgeny Drukh |
2009-12-01 |
| 7516287 |
Methods and apparatus for optimal journaling for continuous data replication |
Shlomo Ahal, Assaf Natanzon, Tzach Sechner, Evgeny Drukh |
2009-04-07 |