| 12292982 |
System, method, and process for detecting risks across application and infrastructure code |
Yonatan Eldar, Eli Shalom, Ariel Levy |
2025-05-06 |
| 12265618 |
System and method for efficient malicious code detection and malicious open-source software package detection using large language models |
Gil David, Eli Shalom, Yonatan Eldar |
2025-04-01 |
| 11818228 |
Establishing user's presence on internal on-premises network over time using network signals |
Tal Arieh Be'ery, Itai Grady, Tom Jurgenson, Sivan Krigsman, Michael Dubinsky +1 more |
2023-11-14 |
| 11301356 |
System, method, and process for continuously identifying material changes and calculating risk for applications and infrastructure |
Yonatan Eldar |
2022-04-12 |
| 11025668 |
Detecting attacks using compromised credentials via internal network monitoring |
Itai Grady, Michael Dubinsky, Benny Lakunishok, Tal Arieh Be'ery |
2021-06-01 |
| 10505894 |
Active and passive method to perform IP to name resolution in organizational environments |
Sivan Krigsman, Benny Lakunishok, Tal Arieh Be'ery, Michael Dubinsky, Michael Dolinsky |
2019-12-10 |
| 10333944 |
Detecting impossible travel in the on-premise settings |
Tom Jurgenson, Sivan Krigsman, Michael Dubinsky, Tal Arieh Be'ery, Gil David |
2019-06-25 |
| 10298699 |
Physical location determination of internal network components |
Tom Jurgenson, Tal Arieh Be'ery, Michael Dubinsky, Sivan Krigsman, Gil David |
2019-05-21 |
| 10148639 |
Distinguishing vertical brute force attacks from benign errors |
Michael Dolinsky, Sivan Krigsman, Tal Arieh Be'ery, Gil David, Marina Simakov |
2018-12-04 |
| 10129298 |
Detecting attacks using compromised credentials via internal network monitoring |
Itai Grady, Michael Dubinsky, Benny Lakunishok, Tal Arieh Be'ery |
2018-11-13 |
| 9860260 |
Monitoring the life cycle of a computer network connection |
Tal Arieh Be'ery, Itai Grady |
2018-01-02 |
| 9729538 |
System, method and process for detecting advanced and targeted attacks with the recoupling of kerberos authentication and authorization |
Tal Arieh Be'ery, Michael Dolinsky, Ohad Plotnik, Gregory Messerman, Sivan Krigsman |
2017-08-08 |
| 9614861 |
Monitoring the life cycle of a computer network connection |
Tal Arieh Be'ery, Itai Grady |
2017-04-04 |
| 8548998 |
Methods and systems for securing and protecting repositories and directories |
Itay Podhajcer, Ohad Plotnik |
2013-10-01 |