AS

Amichai Shulman

IM Imperva: 54 patents #1 of 96Top 2%
Overall (All Time): #44,453 of 4,157,543Top 2%
56
Patents All Time

Issued Patents All Time

Showing 25 most recent of 56 patents

Patent #TitleCo-InventorsDate
11706650 Orchestration of multiple wireless sensors for monitoring a wireless spectrum and protocols Shlomo Touboul, Ohad Plotnik, Roi Keren 2023-07-18
11683294 Privacy-preserving learning of web traffic Itsik Mantin, Shelly Hershkovitz, Nitzan Niv 2023-06-20
11645392 Continuous database security and compliance Avidan Reich, Michael Cherny 2023-05-09
11601400 Aggregating alerts of malicious events for computer security Gilad Yehudai, Itsik Mantin, Lior Fisch, Shelly Hershkovitz, Moran Rachel Ambar 2023-03-07
11533295 Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens Sagie Dulce, Daniella Goihman-Shuster, Shahar Ben-Hador 2022-12-20
11436358 Data based web application firewall Shiri Margel, Itsik Mantin, Daniella Goihman-Shuster 2022-09-06
11297518 Orchestration of multiple wireless sensors for monitoring a wireless spectrum and protocols Shlomo Touboul, Ohad Plotnik, Roi Keren 2022-04-05
11218448 Aggregating alerts of malicious events for computer security Gilad Yehudai, Itsik Mantin, Lior Fisch, Shelly Hershkovitz, Moran Rachel Ambar 2022-01-04
11063960 Automatic generation of attribute values for rules of a web application layer attack detector Tal Arieh Be'ery, Shelly Hershkovitz, Nitzan Niv 2021-07-13
11050786 Coordinated detection and differentiation of denial of service attacks Tal Arieh Be'ery 2021-06-29
11003779 Continuous database security and compliance Avidan Reich, Michael Cherny 2021-05-11
10911472 Techniques for targeted botnet protection Nitzan Niv 2021-02-02
10834130 Detection of malicious attempts to access a decoy database object based on connection type Elad Erez 2020-11-10
10824730 Continuous database security and compliance Avidan Reich, Michael Cherny 2020-11-03
10805325 Techniques for detecting enterprise intrusions utilizing active tokens Sagie Dulce 2020-10-13
10567342 Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens Sagie Dulce, Daniella Goihman-Shuster, Shahar Ben-Hador 2020-02-18
10469523 Techniques for detecting compromises of enterprise end stations utilizing noisy tokens Sagie Dulce 2019-11-05
10404742 Coordinated detection and differentiation of denial of service attacks Tal Arieh Be'ery 2019-09-03
10404712 Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets Shiri Margel, Itsik Mantin 2019-09-03
10382400 Techniques for preventing large-scale data breaches utilizing differentiated protection layers Shiri Margel, Itsik Mantin 2019-08-13
10382464 Data access verification for enterprise resources Sagie Dulce 2019-08-13
10104095 Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web applications Michael Boodaei, Shlomo Kramer 2018-10-16
10020941 Virtual encryption patching using multiple transport layer security implementations Itsik Mantin, Nadav Avital, Offir Zigelman, Oren Brezner, Dmitry Babich 2018-07-10
9781133 Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web applications Michael Boodaei, Shlomo Kramer 2017-10-03
9762592 Automatic generation of attribute values for rules of a web application layer attack detector Tal Arieh Be'ery, Shelly Hershkovitz, Nitzan Niv 2017-09-12