Issued Patents All Time
Showing 25 most recent of 27 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12423468 | Smart sampling for sensitive data detection | Moshe Israel, Shimon EZRA, Ron Matchoro, Asaf Nakash, Moran Polack +1 more | 2025-09-23 |
| 12388852 | Detecting mass control plane operations | Ram Haim Pliskin, Evgeny Bogokovsky | 2025-08-12 |
| 12373568 | Malicious activity probability determinations for autonomous systems | Shay Chriba SAKAZI, Moshe Israel | 2025-07-29 |
| 12375364 | Intelligent auto-detection of anomalous web-based access requests | Shay Chriba SAKAZI, Shalom Shay SHAVIT | 2025-07-29 |
| 12355786 | Machine learning approach for solving the cold start problem in stateful models | Idan Hen | 2025-07-08 |
| 12301616 | Detecting malicious obfuscation in a SQL statement based on an effect and/or processed version thereof | Michael MAKHLEVICH, Fady NASER EL DEEN | 2025-05-13 |
| 12282547 | Adaptable framework for spike detection under dynamic constraints | Omer Savion, Fady NASER EL DEEN | 2025-04-22 |
| 12231448 | Using graph enrichment to detect a potentially malicious access attempt | Shay Chriba SAKAZI, Amit Magen MEDINA, Tamer Salman | 2025-02-18 |
| 12147527 | Code injection detection using syntactic deviation | Haim Saadia Bendanan, Inbal Argov | 2024-11-19 |
| 12124577 | Detecting malicious queries using syntax metrics | Michael MAKHLEVICH, Tomer Rotstein | 2024-10-22 |
| 12095792 | Multi-variate anomalous access detection | Idan Hen | 2024-09-17 |
| 11936669 | Detection of abnormal entities based on syntactic grouping of strings preliminary class | Tomer Rotstein, Fady Nasereldeen, Naama Kraus, Roy Levin, Yotam Livny | 2024-03-19 |
| 11856015 | Anomalous action security assessor | Roy Levin | 2023-12-26 |
| 11651076 | Detecting spread of malware through shared data storages | Josef Weizman, Ram Haim Pliskin | 2023-05-16 |
| 11652833 | Detection of anomalous count of new entities | Hani Hana Neuvirth, Dawn Antonette Burns, Yotam Livny | 2023-05-16 |
| 11647034 | Service access data enrichment for cybersecurity | Roy Levin | 2023-05-09 |
| 11647035 | Fidelity of anomaly alerts using control plane and data plane information | Roy Levin, Tomer Rotstein, Michael MAKHLEVICH, Tamer Salman, Ram Haim Pliskin | 2023-05-09 |
| 11614971 | Score calculations for probabilities of types of accessibilities to data resources | Arieh Bibliowicz, Yoav M. Frandzel, Haim Saadia Bendanan, Michael Kuritzky Bakman | 2023-03-28 |
| 11526603 | Model for identifying the most relevant person(s) for an event associated with a resource | Michael MAKHLEVICH, Tomer Rotstein | 2022-12-13 |
| 11481478 | Anomalous user session detector | Roy Levin, Naama Kraus, Tamer Salman | 2022-10-25 |
| 11477167 | Systems and methods for performing dynamic firewall rule evaluation | Tomer Rotstein, Tomer Levav, Ron Matchoro, Michael MAKHLEVICH | 2022-10-18 |
| 11477216 | Detection of abnormal entities based on syntactic grouping of strings | Tomer Rotstein, Fady Nasereldeen, Naama Kraus, Roy Levin, Yotam Livny | 2022-10-18 |
| 11418547 | Common framework for translating customer feedback to standard and shareable policy changes of cloud threat detection service | Yotam Livny, Fady Nasereldeen, Tamer Salman | 2022-08-16 |
| 11165791 | Cloud security using multidimensional hierarchical model | Ron Matchoro, Haim Saadia Ben Danan, Yotam Livny, Naama Kraus, Roy Levin +1 more | 2021-11-02 |
| 11106789 | Dynamic cybersecurity detection of sequence anomalies | Naama Kraus, Roy Levin, Tamer Salman | 2021-08-31 |