| 12353547 |
Allow list of container images based on deployment configuration at a container orchestration service |
Idan Hen, Eran Goldstein |
2025-07-08 |
| 12289335 |
Security finding categories-based prioritization |
Jonathan Gazit, Moshe Israel |
2025-04-29 |
| 12265616 |
Detect anomalous container deployment at a container orchestration service |
Amit MAGEN MEDINA, Josef Weizman, Idan Hen |
2025-04-01 |
| 12124572 |
Anomalous activity detection in container images |
Josef Weizman, Tomer Koren, Eran Goldstein |
2024-10-22 |
| 11973796 |
Dangling domain detection and access mitigation |
Josef Weizman, Aharon Naftali Michaels, Ram Haim Pliskin |
2024-04-30 |
| 11956239 |
Identity misconfiguration detection for role-based access control |
Idan Hen, Aharon Naftali Michaels, Josef Weizman, Amit Magen |
2024-04-09 |
| 11416613 |
Attack detection through exposure of command abuse |
Josef Weizman, Ram Haim Pliskin, Tomer Koren |
2022-08-16 |
| 11405413 |
Anomaly lookup for cyber security hunting |
Hani Hana Neuvirth, Gueorgui Chkodrov, Elad Yom-Tov, Dawn Antonette Burns, Yotam Livny |
2022-08-02 |
| 11368473 |
Interface threat assessment in multi-cluster system |
Josef Weizman, Ram Haim Pliskin |
2022-06-21 |
| 11196746 |
Whitelisting of trusted accessors to restricted web pages |
Omer Karin, Hani Hana Neuvirth, Tomer Koren, Ram Haim Pliskin, Josef Weizman +1 more |
2021-12-07 |
| 11089024 |
System and method for restricting access to web resources |
Ram Haim Pliskin, Tomer Koren, Moshe Israel, Hani Hana Neuvirth, Josef Weizman |
2021-08-10 |
| 10943009 |
System and method to infer investigation steps for security alerts using crowd sourcing |
Yaakov Garyani, Moshe Israel, Yotam Livny |
2021-03-09 |
| 10911478 |
Detection of attacks in the cloud by crowd sourcing security solutions |
Vlad Korsunsky, Maya Maimon, Moshe Israel, Oran Brill, Tomer Teller |
2021-02-02 |
| 10911479 |
Real-time mitigations for unfamiliar threat scenarios |
Ben Kliger, Moshe Israel, Michael Zeev Bargury |
2021-02-02 |
| 10887326 |
Distributed system for adaptive protection against web-service- targeted vulnerability scanners |
Josef Weizman, Tomer Koren, Ram Haim Pliskin, Hani Hana Neuvirth |
2021-01-05 |
| 10826756 |
Automatic generation of threat remediation steps by crowd sourcing security solutions |
Ben Kliger, Moshe Israel, Michael Zeev Bargury |
2020-11-03 |
| 10474966 |
Detecting cyber attacks by correlating alerts sequences in a cluster environment |
Moshe Israel |
2019-11-12 |
| 10447525 |
Validating correlation between chains of alerts using cloud view |
Tomer Koren, Mathias Scherman |
2019-10-15 |