| 11743265 |
Method and system for delegating control in network connection access rules using multi-factor authentication (MFA) |
Gil David, Yossef Jossef Harush |
2023-08-29 |
| 11025668 |
Detecting attacks using compromised credentials via internal network monitoring |
Itai Grady, Michael Dubinsky, Idan Plotnik, Tal Arieh Be'ery |
2021-06-01 |
| 11012433 |
Method and system for modifying network connection access rules using multi-factor authentication (MFA) |
Gil David, Yossef Jossef Harush |
2021-05-18 |
| 10505894 |
Active and passive method to perform IP to name resolution in organizational environments |
Idan Plotnik, Sivan Krigsman, Tal Arieh Be'ery, Michael Dubinsky, Michael Dolinsky |
2019-12-10 |
| 10129298 |
Detecting attacks using compromised credentials via internal network monitoring |
Itai Grady, Michael Dubinsky, Idan Plotnik, Tal Arieh Be'ery |
2018-11-13 |