| 11818228 |
Establishing user's presence on internal on-premises network over time using network signals |
Tal Arieh Be'ery, Tom Jurgenson, Idan Plotnik, Sivan Krigsman, Michael Dubinsky +1 more |
2023-11-14 |
| 11025668 |
Detecting attacks using compromised credentials via internal network monitoring |
Michael Dubinsky, Benny Lakunishok, Idan Plotnik, Tal Arieh Be'ery |
2021-06-01 |
| 10623234 |
Managing alerts regarding additions to user groups |
Sivan Krigsman, Tal Arieh Be'ery, Yaron Kaner, Amit Rosenzweig, Tom Jurgenson |
2020-04-14 |
| 10609048 |
Systems and methods for the detection of advanced attackers using client side honeytokens |
Tal Arieh Be'ery |
2020-03-31 |
| 10129298 |
Detecting attacks using compromised credentials via internal network monitoring |
Michael Dubinsky, Benny Lakunishok, Idan Plotnik, Tal Arieh Be'ery |
2018-11-13 |
| 10063571 |
Systems and methods for the detection of advanced attackers using client side honeytokens |
Tal Arieh Be'ery |
2018-08-28 |
| 9860260 |
Monitoring the life cycle of a computer network connection |
Tal Arieh Be'ery, Idan Plotnik |
2018-01-02 |
| 9614861 |
Monitoring the life cycle of a computer network connection |
Tal Arieh Be'ery, Idan Plotnik |
2017-04-04 |