YS

Yaniv Shaked

WI Wiz: 33 patents #4 of 96Top 5%
Apple: 3 patents #7,422 of 18,612Top 40%
IN Inuitive: 1 patents #11 of 26Top 45%
Overall (All Time): #84,122 of 4,157,543Top 3%
38
Patents All Time

Issued Patents All Time

Showing 25 most recent of 38 patents

Patent #TitleCo-InventorsDate
12401683 Techniques for detecting artificial intelligence model cybersecurity risk in a computing environment Amitai Cohen, Barak SHARONI, Shir Tamari, George PISHA, Itay Arbel +1 more 2025-08-26
12380223 Techniques for risk and constraint-based inspection Ami Luttwak, Shahar Rand, Eric Abramov, Elad Gabay, Yinon COSTICA 2025-08-05
12361140 Architecture of a multi-cloud inspector for any compute type Ami Luttwak, Gal KOZOSHNIK, Roy REZNIK, Yarin Miran 2025-07-15
12346700 Techniques for mounting disks in an inspection environment Roy REZNIK 2025-07-01
12287899 Techniques for detecting sensitive data in cloud computing environments utilizing cloning Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Ami Luttwak, Moran Cohen +4 more 2025-04-29
12277532 System and method for agentless application inventory detection Mattan SHALEV, Gal KOZOSHNIK, Omri Kornblau, Roy REZNIK, Ami Luttwak +1 more 2025-04-15
12271490 Unified inspection techniques based on abstracted compute type Ami Luttwak, Roy REZNIK, Yarin Miran, Moran Cohen 2025-04-08
12273372 Techniques for detecting artificial intelligence model cybersecurity risk in a computing environment Amitai Cohen, Barak SHARONI, Shir Tamari, George PISHA, Itay Arbel +1 more 2025-04-08
12261877 Detecting malware infection path in a cloud computing environment utilizing a security graph Elad Gabay, Alon SCHINDEL, Roy REZNIK, Ami Luttwak 2025-03-25
12248584 System and method for agentless host configuration detection of an image in a virtualized environment Mattan SHALEV, Gal KOZOSHNIK, Daniel Klein, Roy REZNIK, Ami Luttwak 2025-03-11
12248909 System and method for agentless application inventory detection Mattan SHALEV, Gal KOZOSHNIK, Omri Kornblau, Roy REZNIK, Ami Luttwak +1 more 2025-03-11
12248581 Architecture of a multi-cloud inspector for any compute type Ami Luttwak, Gal KOZOSHNIK, Roy REZNIK, Yarin Miran 2025-03-11
12242601 System and method for agentless host configuration detection in a computing environment Mattan SHALEV, Gal KOZOSHNIK, Daniel Klein, Roy REZNIK, Ami Luttwak 2025-03-04
12219048 Techniques for encrypted disk cybersecurity inspection utilizing disk cloning Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA +1 more 2025-02-04
12219053 Techniques for circumventing provider-imposed limitations in snapshot inspection of disks for cybersecurity Shahar Rand, Eric Abramov, Elad Gabay 2025-02-04
12182172 System and method for agentless detection of sensitive data on managed databases Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Ami Luttwak, Moran Cohen +2 more 2024-12-31
12175428 System and method for agentless application inventory detection Mattan SHALEV, Gal KOZOSHNIK, Omri Kornblau, Roy REZNIK, Ami Luttwak +1 more 2024-12-24
12093384 Techniques for improved inspection of container layers Yaniv Joseph Oliver, Ami Luttwak, Yinon COSTICA, Roy REZNIK, Amir Lande Blau 2024-09-17
12095912 System and method for encrypted disk inspection utilizing disk cloning techniques Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA +1 more 2024-09-17
12079328 Techniques for inspecting running virtualizations for cybersecurity risks Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA +3 more 2024-09-03
12081656 Techniques for circumventing provider-imposed limitations in snapshot inspection of disks for cybersecurity Shahar Rand, Eric Abramov, Elad Gabay 2024-09-03
12061719 System and method for agentless detection of sensitive data in computing environments Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Ami Luttwak, Moran Cohen +2 more 2024-08-13
12061925 Techniques for inspecting managed workloads deployed in a cloud computing environment Niv Roit BEN DAVID, Yarin Miran, Raaz HERZBERG, Amir Lande Blau 2024-08-13
12028360 Techniques for multi-tenant vulnerability scanning utilizing sensitive data Yarin Miran, Ami Luttwak, Roy REZNIK, Avihai Berkovitz, Moran Cohen +1 more 2024-07-02
12026144 Populating multi-layer technology product catalogs Gal KOZOSHNIK, Raaz HERZBERG, Yinon COSTICA, Daniel Klein, Ami Luttwak 2024-07-02