Issued Patents All Time
Showing 25 most recent of 35 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12380096 | Natural language API for security graph exploration | Lior Ziv, Idan Hen, Amit Dvir Adani | 2025-08-05 |
| 12231448 | Using graph enrichment to detect a potentially malicious access attempt | Shay Chriba SAKAZI, Andrey KARPOVSKY, Amit Magen MEDINA | 2025-02-18 |
| 12175853 | Adaptive severity functions for alerts | Yotam Livny | 2024-12-24 |
| 12069101 | Context-aware security policies and incident identification via automated cloud graph building with security overlays | — | 2024-08-20 |
| 11991210 | Machine learning-based techniques for identifying deployment environments and enhancing security thereof | Omer Karin, Amit Magen, Moshe Israel | 2024-05-21 |
| 11756404 | Adaptive severity functions for alerts | Yotam Livny | 2023-09-12 |
| 11750619 | Modify assigned privilege levels and limit access to resources | Naama Kraus, Moshe Israel, Moshe Shalala, Idan Hen, Avihai Dvir +1 more | 2023-09-05 |
| 11704431 | Data security classification sampling and labeling | Naama Kraus, Salam BASHIR | 2023-07-18 |
| 11647035 | Fidelity of anomaly alerts using control plane and data plane information | Andrey KARPOVSKY, Roy Levin, Tomer Rotstein, Michael MAKHLEVICH, Ram Haim Pliskin | 2023-05-09 |
| 11580037 | Privilege level assignments to groups | Naama Kraus, Moshe Israel, Moshe Shalala, Rotem Lurie, Avihai Dvir | 2023-02-14 |
| 11481478 | Anomalous user session detector | Roy Levin, Naama Kraus, Andrey KARPOVSKY | 2022-10-25 |
| 11418547 | Common framework for translating customer feedback to standard and shareable policy changes of cloud threat detection service | Andrey KARPOVSKY, Yotam Livny, Fady Nasereldeen | 2022-08-16 |
| 11295013 | Dimensionality reduction based on functionality | Fady Copty, Ayman Jarrous, Maksim Shudrak | 2022-04-05 |
| 11165791 | Cloud security using multidimensional hierarchical model | Andrey KARPOVSKY, Ron Matchoro, Haim Saadia Ben Danan, Yotam Livny, Naama Kraus +1 more | 2021-11-02 |
| 11106789 | Dynamic cybersecurity detection of sequence anomalies | Naama Kraus, Roy Levin, Andrey KARPOVSKY | 2021-08-31 |
| 11005893 | Automatic generation of security rules for network micro and nano segmentation | Ben Kliger, Bolous AbuJaber | 2021-05-11 |
| 10931784 | Flexible triggering of triggered code | Hesham Yassin | 2021-02-23 |
| 10795738 | Cloud security using security alert feedback | Roy Levin, Yotam Livny | 2020-10-06 |
| 10657257 | Feature vector aggregation for malware detection | Fady Copty, Cynthia Rae Eisner, Dov Murik | 2020-05-19 |
| 10417412 | Protecting computer code against ROP attacks | Fady Copty, Ayman Jarrous | 2019-09-17 |
| 10387655 | Method, system and product for using a predictive model to predict if inputs reach a vulnerability of a program | Fady Copty, Ayman Jarrous, Sharon Keidar-Barner | 2019-08-20 |
| 10380590 | Transaction authentication based on metadata | Orit Edelstein, Sharon Keidar-Barner | 2019-08-13 |
| 10360402 | Intercepting sensitive data using hashed candidates | Ariel Farkash, Ayman Jarrous, Micha Moffie, Gal Peretz | 2019-07-23 |
| 10311218 | Identifying machine-generated strings | Ehud Aharoni, Onn Menahem Shehory | 2019-06-04 |
| 10223527 | Protecting computer code against ROP attacks | Eitan Farchi, Ayman Jarrous | 2019-03-05 |