Issued Patents All Time
Showing 25 most recent of 44 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11783049 | Automated code analysis tool | Michael Zeev Bargury, Gal Malka, Pnina Weiss | 2023-10-10 |
| 11533240 | Automatic recommendations for deployments in a data center | Hani Hana Neuvirth, Daniel Alon, Royi Ronen, Yair Tor, Gilad Elyashar | 2022-12-20 |
| 11223637 | Detecting attacks on web applications using server logs | Hani Hana Neuvirth, Ram Haim Pliskin, Tomer Koren, Josef Weizman, Karl William Reinsch | 2022-01-11 |
| 10771492 | Enterprise graph method of threat detection | Michal Braverman-Blumenstyk, Daniel Alon, Hani Hana Neuvirth, Royi Ronen, Yuri Gurevich | 2020-09-08 |
| 10764299 | Access control manager | Ben Kliger, Moshe Israel, Steven Jay LIEBERMAN, Mark Frederick Wahl | 2020-09-01 |
| 10516675 | Altering application security to support just-in-time access | Gilad Elyashar, Royi Ronen | 2019-12-24 |
| 10140366 | Finding data in connected corpuses using examples | John C. Platt, Surajit Chaudhuri, Lev Novik, Henricus Johannes Maria Meijer, Kunal Mukerjee +1 more | 2018-11-27 |
| 9910981 | Malicious code infection cause-and-effect analysis | Gregory D. Hartrell, David Steeves | 2018-03-06 |
| 9886578 | Malicious code infection cause-and-effect analysis | Gregory D. Hartrell, David Steeves | 2018-02-06 |
| 9560068 | Network intrusion detection with distributed correlation | Igal Figlin, Arthur Zavalkovsky, Lior Arzi, Jennifer LeMond, Robert Eric Fitzgerald +3 more | 2017-01-31 |
| 9547664 | Selecting candidate rows for deduplication | Yaron Zinar, Yifat Orlin, Gal Novik, Yuri Gurevich, Gad Peleg | 2017-01-17 |
| 9536087 | Controlling malicious activity detection using behavioral models | Shai Rubin, Yosef Dinerstein, Yair Helman, Uri Barash, Arie Friedman | 2017-01-03 |
| 9519862 | Domains for knowledge-based data quality solution | Joseph Malka, Elad Ziklik, Meir Raviv, Gadi Peleg, David Faibish | 2016-12-13 |
| 9398034 | Matrix factorization for automated malware detection | Royi Ronen, Shay Kels, Elad Ziklik, Corina Feuerstein, Tomer Brand | 2016-07-19 |
| 9098702 | Controlling malicious activity detection using behavioral models | Shai Rubin, Yosef Dinerstein, Yair Helman, Uri Barash, Arie Friedman | 2015-08-04 |
| 9043869 | Aggregating the knowledge base of computer systems to proactively protect a computer from malware | Anil Thomas, Michael Kramer, Mihai Costea, Pradeep Bahl, Rajesh Dadhia +1 more | 2015-05-26 |
| 8996479 | Comparing and selecting data cleansing service providers | Neta Haiby, Elad Ziklik, Gad Peleg | 2015-03-31 |
| 8990947 | Analytics engine | Eyal Zangi, Moshe Sapir, Tomer Weisberg, Yair Helman, Shai Rubin +2 more | 2015-03-24 |
| 8983954 | Finding data in connected corpuses using examples | John C. Platt, Surajit Chaudhuri, Lev Novik, Henricus Johannes Maria Meijer, Kunal Mukerjee +1 more | 2015-03-17 |
| 8959568 | Enterprise security assessment sharing | Yair Helman, Joseph Malka, Uri Barash | 2015-02-17 |
| 8955105 | Endpoint enabled for enterprise security assessment sharing | Yair Helman, Joseph Malka, Uri Barash | 2015-02-10 |
| 8955134 | Malicious code infection cause-and-effect analysis | Gregory D. Hartrell, David Steeves | 2015-02-10 |
| 8955135 | Malicious code infection cause-and-effect analysis | Gregory D. Hartrell, David Steeves | 2015-02-10 |
| 8910268 | Enterprise security assessment sharing for consumers using globally distributed infrastructure | Yigal Edery, Oleg Ananiev, John Wohlfert, Nir Nice | 2014-12-09 |
| 8881223 | Enterprise security assessment sharing for off-premise users using globally distributed infrastructure | Yigal Edery, Oleg Ananiev, John Wohlfert, Nir Nice | 2014-11-04 |