Issued Patents All Time
Showing 25 most recent of 26 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11895138 | Methods for improving web scanner accuracy and devices thereof | Ido Breger, Barak Mordechai Amar, Guy Nir | 2024-02-06 |
| 11757946 | Methods for analyzing network traffic and enforcing network policies and devices thereof | Yaniv Shemesh, Ranjeet Sonone | 2023-09-12 |
| 11140178 | Methods and system for client side analysis of responses for server purposes | Shlomo Yona | 2021-10-05 |
| 11122067 | Methods for detecting and mitigating malicious network behavior and devices thereof | Shlomo Yona, Itsik Mantin, Yaniv Shemesh | 2021-09-14 |
| 11108815 | Methods and system for returning requests with javascript for clients before passing a request to a server | Nir Shahaf, Orna Zackaria | 2021-08-31 |
| 10931691 | Methods for detecting and mitigating brute force credential stuffing attacks and devices thereof | Michael Kapelevich, Tomer Zait, Maxim Zavodchik | 2021-02-23 |
| 10834110 | Methods for preventing DDoS attack based on adaptive self learning of session and transport layers and devices thereof | Sergei Edelstein, Michael Kapelevich, Shlomo Yona | 2020-11-10 |
| 10721269 | Methods and system for returning requests with javascript for clients before passing a request to a server | Nir Shahaf, Orna Zackaria | 2020-07-21 |
| 10454768 | Extending policy rulesets with scripting | Paul I. Szabo, Gennady Dosovitsky, Jeroen de Borst, David A. Hansen | 2019-10-22 |
| 10432652 | Methods for detecting and mitigating malicious network behavior and devices thereof | Shlomo Yona, Itsik Mantin, Yaniv Shemesh | 2019-10-01 |
| 10320784 | Methods for utilizing fingerprinting to manage network security and devices thereof | Yaniv Shemesh | 2019-06-11 |
| 9985976 | Methods for identifying network traffic characteristics to correlate and manage one or more subsequent flows and devices thereof | Dmitry Rovniaguin, Ephraim Dan | 2018-05-29 |
| 9906452 | Assisting application classification using predicted subscriber behavior | Gennady Dosovitsky, Dmitry Rovniaguin, Amir Harush, Dan Karpati, Assaf Mendelson | 2018-02-27 |
| 9866489 | Delayed proxy action | Gennady Dosovitsky, Dmitry Rovniaguin, Sumandra Majee | 2018-01-09 |
| 9553845 | Methods for validating and testing firewalls and devices thereof | John N. Nugent, JC Ferguson | 2017-01-24 |
| 9420049 | Client side human user indicator | Shlomo Yona, Orit Margalit, Beni Serfaty | 2016-08-16 |
| 9378005 | Hitless software upgrades | Rajiv Ramanathan, Shao-Kong Kao, Anthony Ho, Rudramahesh Rugge | 2016-06-28 |
| 9270766 | Methods for identifying network traffic characteristics to correlate and manage one or more subsequent flows and devices thereof | Dmitry Rovniaguin, Ephraim Dan | 2016-02-23 |
| 8627467 | System and method for selectively storing web objects in a cache memory based on policy decisions | Yuval Levy, Beni Serfaty | 2014-01-07 |
| 8522311 | Authentication techniques | Mehul Dholakia | 2013-08-27 |
| 8509106 | Techniques for preventing attacks on computer systems and networks | Sheng-Yih Wang | 2013-08-13 |
| 8448162 | Hitless software upgrades | Rajiv Ramanathan, Shao-Kong Kao, Anthony Ho, Rudramahesh Rugge | 2013-05-21 |
| 8122485 | Authentication techniques | Mehul Dholakia | 2012-02-21 |
| 7832009 | Techniques for preventing attacks on computer systems and networks | Sheng-Yih Wang | 2010-11-09 |
| 7831996 | Authentication techniques | Mehul Dholakia | 2010-11-09 |