Issued Patents All Time
Showing 25 most recent of 56 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11706650 | Orchestration of multiple wireless sensors for monitoring a wireless spectrum and protocols | Shlomo Touboul, Ohad Plotnik, Roi Keren | 2023-07-18 |
| 11683294 | Privacy-preserving learning of web traffic | Itsik Mantin, Shelly Hershkovitz, Nitzan Niv | 2023-06-20 |
| 11645392 | Continuous database security and compliance | Avidan Reich, Michael Cherny | 2023-05-09 |
| 11601400 | Aggregating alerts of malicious events for computer security | Gilad Yehudai, Itsik Mantin, Lior Fisch, Shelly Hershkovitz, Moran Rachel Ambar | 2023-03-07 |
| 11533295 | Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens | Sagie Dulce, Daniella Goihman-Shuster, Shahar Ben-Hador | 2022-12-20 |
| 11436358 | Data based web application firewall | Shiri Margel, Itsik Mantin, Daniella Goihman-Shuster | 2022-09-06 |
| 11297518 | Orchestration of multiple wireless sensors for monitoring a wireless spectrum and protocols | Shlomo Touboul, Ohad Plotnik, Roi Keren | 2022-04-05 |
| 11218448 | Aggregating alerts of malicious events for computer security | Gilad Yehudai, Itsik Mantin, Lior Fisch, Shelly Hershkovitz, Moran Rachel Ambar | 2022-01-04 |
| 11063960 | Automatic generation of attribute values for rules of a web application layer attack detector | Tal Arieh Be'ery, Shelly Hershkovitz, Nitzan Niv | 2021-07-13 |
| 11050786 | Coordinated detection and differentiation of denial of service attacks | Tal Arieh Be'ery | 2021-06-29 |
| 11003779 | Continuous database security and compliance | Avidan Reich, Michael Cherny | 2021-05-11 |
| 10911472 | Techniques for targeted botnet protection | Nitzan Niv | 2021-02-02 |
| 10834130 | Detection of malicious attempts to access a decoy database object based on connection type | Elad Erez | 2020-11-10 |
| 10824730 | Continuous database security and compliance | Avidan Reich, Michael Cherny | 2020-11-03 |
| 10805325 | Techniques for detecting enterprise intrusions utilizing active tokens | Sagie Dulce | 2020-10-13 |
| 10567342 | Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens | Sagie Dulce, Daniella Goihman-Shuster, Shahar Ben-Hador | 2020-02-18 |
| 10469523 | Techniques for detecting compromises of enterprise end stations utilizing noisy tokens | Sagie Dulce | 2019-11-05 |
| 10404742 | Coordinated detection and differentiation of denial of service attacks | Tal Arieh Be'ery | 2019-09-03 |
| 10404712 | Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets | Shiri Margel, Itsik Mantin | 2019-09-03 |
| 10382400 | Techniques for preventing large-scale data breaches utilizing differentiated protection layers | Shiri Margel, Itsik Mantin | 2019-08-13 |
| 10382464 | Data access verification for enterprise resources | Sagie Dulce | 2019-08-13 |
| 10104095 | Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web applications | Michael Boodaei, Shlomo Kramer | 2018-10-16 |
| 10020941 | Virtual encryption patching using multiple transport layer security implementations | Itsik Mantin, Nadav Avital, Offir Zigelman, Oren Brezner, Dmitry Babich | 2018-07-10 |
| 9781133 | Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web applications | Michael Boodaei, Shlomo Kramer | 2017-10-03 |
| 9762592 | Automatic generation of attribute values for rules of a web application layer attack detector | Tal Arieh Be'ery, Shelly Hershkovitz, Nitzan Niv | 2017-09-12 |