Issued Patents All Time
Showing 1–18 of 18 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12430428 | Determining anomalous tool invocations by applications using large generative models | Ron F. Keller | 2025-09-30 |
| 12401661 | Detecting network activity from sampled network metadata | Omer Karin, Roy Levin | 2025-08-26 |
| 12380096 | Natural language API for security graph exploration | Lior Ziv, Tamer Salman, Amit Dvir Adani | 2025-08-05 |
| 12373757 | Using weighted peer groups to selectively trigger a security alert | Itay Argoety, Dror Cohen | 2025-07-29 |
| 12353547 | Allow list of container images based on deployment configuration at a container orchestration service | Eran Goldstein, Dotan Patrich | 2025-07-08 |
| 12355786 | Machine learning approach for solving the cold start problem in stateful models | Andrey KARPOVSKY | 2025-07-08 |
| 12282546 | Abnormal classic authorization detection systems | Ilay Grossman, Avichai Ben David | 2025-04-22 |
| 12265616 | Detect anomalous container deployment at a container orchestration service | Amit MAGEN MEDINA, Dotan Patrich, Josef Weizman | 2025-04-01 |
| 12242600 | Abnormally permissive role definition detection systems | Ilay Grossman, Avichai Ben David | 2025-03-04 |
| 12132747 | User impact potential for security alert management | Itay Argoety, Jonathan Moshe Monsonego, Payal Rani, Sridhar Periyasamy | 2024-10-29 |
| 12126637 | Anomalous and suspicious role assignment determinations | Ilay Grossman, Avichai BEN DAVID | 2024-10-22 |
| 12095792 | Multi-variate anomalous access detection | Andrey KARPOVSKY | 2024-09-17 |
| 12039042 | Abnormal cross authorization detection systems | Ilay Grossman, Avichai Ben David | 2024-07-16 |
| 11956239 | Identity misconfiguration detection for role-based access control | Aharon Naftali Michaels, Dotan Patrich, Josef Weizman, Amit Magen | 2024-04-09 |
| 11843626 | Connected component-based collaborative filtering in recommendation intrusion detection systems | Roy Levin | 2023-12-12 |
| 11811807 | Conditional security measures using rolling set of risk scores | Itay Argoety, Michael Shlomo NAVAT, Efrat Reef Guttman | 2023-11-07 |
| 11750619 | Modify assigned privilege levels and limit access to resources | Naama Kraus, Tamer Salman, Moshe Israel, Moshe Shalala, Avihai Dvir +1 more | 2023-09-05 |
| 11483327 | Collaborative filtering anomaly detection explainability | Roy Levin | 2022-10-25 |
