Issued Patents All Time
Showing 1–23 of 23 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12432252 | Method and system for predicting malicious entities | Yoni Zukerman, Idan BELAIEV, Dror Cohen, Miriam Weissler | 2025-09-30 |
| 12289321 | Automated generation and deployment of honey tokens in provisioned resources on a remote computer resource platform | Tomer Weinberger, Yaniv Zohar, Craig A. Nelson, Andrew Johnson | 2025-04-29 |
| 12026253 | Determination of likely related security incidents | Dawn Antonette Burns | 2024-07-02 |
| 11991201 | Likelihood assessment for security incident alerts | Ishai Wertheimer, Ely Abramovitch, Yaron David Fruchtmann, Amir KEREN | 2024-05-21 |
| 11888870 | Multitenant sharing anomaly cyberattack campaign detection | Yaakov Garyani, Moshe Israel, Ely Abramovitch, Amir KEREN, Timothy William Burrell | 2024-01-30 |
| 11652833 | Detection of anomalous count of new entities | Dawn Antonette Burns, Andrey KARPOVSKY, Yotam Livny | 2023-05-16 |
| 11533240 | Automatic recommendations for deployments in a data center | Efim Hudis, Daniel Alon, Royi Ronen, Yair Tor, Gilad Elyashar | 2022-12-20 |
| 11405413 | Anomaly lookup for cyber security hunting | Gueorgui Chkodrov, Dotan Patrich, Elad Yom-Tov, Dawn Antonette Burns, Yotam Livny | 2022-08-02 |
| 11290473 | Automatic generation of detection alerts | Owen Joseph Davis, Scott Elliott Gorlick, Gueorgui Chkodrov, Yotam Livny, Dawn Antonette Burns +2 more | 2022-03-29 |
| 11223637 | Detecting attacks on web applications using server logs | Ram Haim Pliskin, Tomer Koren, Josef Weizman, Karl William Reinsch, Efim Hudis | 2022-01-11 |
| 11212298 | Automated onboarding of detections for security operations center monitoring | Dawn Antonette Burns | 2021-12-28 |
| 11196746 | Whitelisting of trusted accessors to restricted web pages | Omer Karin, Dotan Patrich, Tomer Koren, Ram Haim Pliskin, Josef Weizman +1 more | 2021-12-07 |
| 11159542 | Cloud view detection of virtual machine brute force attacks | Tomer Weinberger, Tomer Koren, Omer Karin | 2021-10-26 |
| 11089024 | System and method for restricting access to web resources | Dotan Patrich, Ram Haim Pliskin, Tomer Koren, Moshe Israel, Josef Weizman | 2021-08-10 |
| 11038913 | Providing context associated with a potential security issue for an analyst | Sangeetha MADDERLA, Larry J. Matuska, William K. Hollis, Gueorgui Chkodrov, Yotam Livny | 2021-06-15 |
| 10922405 | Data generation for data protection | Elad Yom-Tov, Ron Matchoro, Nir Rosenfeld | 2021-02-16 |
| 10887326 | Distributed system for adaptive protection against web-service- targeted vulnerability scanners | Josef Weizman, Tomer Koren, Ram Haim Pliskin, Dotan Patrich | 2021-01-05 |
| 10771492 | Enterprise graph method of threat detection | Efim Hudis, Michal Braverman-Blumenstyk, Daniel Alon, Royi Ronen, Yuri Gurevich | 2020-09-08 |
| 10511615 | Non-protocol specific system and method for classifying suspect IP addresses as sources of non-targeted attacks on cloud based machines | Royi Ronen, Tomer Koren, Omer Karin | 2019-12-17 |
| 10397256 | Spam classification system based on network flow data | Ori Kashi, Philip Newman, Daniel Alon, Elad Yom-Tov, Royi Ronen | 2019-08-27 |
| 10237300 | System and method for detecting directed cyber-attacks targeting a particular set of cloud based machines | Jonathan Gazit, Moshe Israel | 2019-03-19 |
| 10129295 | Clustering approach for detecting DDoS botnets on the cloud from IPFix data | Omer Karin, Royi Ronen, Roey Vilnai | 2018-11-13 |
| 8140476 | Statistical quality monitoring and enhancement | Ehud Aharoni, Saharon Rosset | 2012-03-20 |

