Issued Patents All Time
Showing 26–44 of 44 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8839419 | Distributive security investigation | Yair Helman, Tomer Weisberg, Oren Yossef, Ziv Rafalovich | 2014-09-16 |
| 8812411 | Domains for knowledge-based data quality solution | Joseph Malka, Elad Ziklik, Meir Raviv, Gadi Peleg, David Faibish | 2014-08-19 |
| 8719236 | Selecting candidate rows for deduplication | Yaron Zinar, Yifat Orlin, Gal Novik, Yuri Gurevich, Gad Peleg | 2014-05-06 |
| 8689335 | Mapping between users and machines in an enterprise security assessment sharing system | Yair Helman, Lior Arzi | 2014-04-01 |
| 8677479 | Detection of adversaries through collection and correlation of assessments | John Neystadt | 2014-03-18 |
| 8538934 | Contextual gravitation of datasets and data services | Christopher Eakins | 2013-09-17 |
| 8516576 | Network intrusion detection with distributed correlation | Igal Figlin, Arthur Zavalkovsky, Lior Arzi, Jennifer LeMond, Robert Eric Fitzgerald +3 more | 2013-08-20 |
| 8516583 | Aggregating the knowledge base of computer systems to proactively protect a computer from malware | Anil Thomas, Michael Kramer, Mihai Costea, Pradeep Bahl, Rajesh Dadhia +1 more | 2013-08-20 |
| 8510276 | Comparing and selecting data cleansing service providers | Neta Haiby, Elad Ziklik, Gad Peleg | 2013-08-13 |
| 8490187 | Controlling malicious activity detection using behavioral models | Shai Rubin, Yosef Dinerstein, Yair Helman, Uri Barash, Arie Friedman | 2013-07-16 |
| 8424094 | Automated collection of forensic evidence associated with a network security incident | John Neystadt, Yair Helman, Alexandra Faynburd | 2013-04-16 |
| 8413247 | Adaptive data collection for root-cause analysis and intrusion detection | Yair Helman, Joseph Malka, Uri Barash | 2013-04-02 |
| 8296178 | Services using globally distributed infrastructure for secure content management | Yigal Edery, Oleg Ananiev, John Wohlfert, Nir Nice | 2012-10-23 |
| 8181250 | Personalized honeypot for detecting information leaks and security breaches | Ziv Rafalovich, Lior Arzi, Ron Karidi | 2012-05-15 |
| 8136164 | Manual operations in an enterprise security assessment sharing system | Yair Helman | 2012-03-13 |
| 8117659 | Malicious code infection cause-and-effect analysis | Gregory D. Hartrell, David Steeves | 2012-02-14 |
| 8095979 | Analysis of event information to perform contextual audit | Ellen McDermott | 2012-01-10 |
| 7953969 | Reduction of false positive reputations through collection of overrides from customer deployments | John Neystadt | 2011-05-31 |
| 7882542 | Detecting compromised computers by correlating reputation data with web access logs | John Neystadt, Yair Helman, Alexandra Faynburd | 2011-02-01 |