IP

Idan Plotnik

Microsoft: 10 patents #4,352 of 40,388Top 15%
Overall (All Time): #332,602 of 4,157,543Top 8%
14
Patents All Time

Issued Patents All Time

Patent #TitleCo-InventorsDate
12292982 System, method, and process for detecting risks across application and infrastructure code Yonatan Eldar, Eli Shalom, Ariel Levy 2025-05-06
12265618 System and method for efficient malicious code detection and malicious open-source software package detection using large language models Gil David, Eli Shalom, Yonatan Eldar 2025-04-01
11818228 Establishing user's presence on internal on-premises network over time using network signals Tal Arieh Be'ery, Itai Grady, Tom Jurgenson, Sivan Krigsman, Michael Dubinsky +1 more 2023-11-14
11301356 System, method, and process for continuously identifying material changes and calculating risk for applications and infrastructure Yonatan Eldar 2022-04-12
11025668 Detecting attacks using compromised credentials via internal network monitoring Itai Grady, Michael Dubinsky, Benny Lakunishok, Tal Arieh Be'ery 2021-06-01
10505894 Active and passive method to perform IP to name resolution in organizational environments Sivan Krigsman, Benny Lakunishok, Tal Arieh Be'ery, Michael Dubinsky, Michael Dolinsky 2019-12-10
10333944 Detecting impossible travel in the on-premise settings Tom Jurgenson, Sivan Krigsman, Michael Dubinsky, Tal Arieh Be'ery, Gil David 2019-06-25
10298699 Physical location determination of internal network components Tom Jurgenson, Tal Arieh Be'ery, Michael Dubinsky, Sivan Krigsman, Gil David 2019-05-21
10148639 Distinguishing vertical brute force attacks from benign errors Michael Dolinsky, Sivan Krigsman, Tal Arieh Be'ery, Gil David, Marina Simakov 2018-12-04
10129298 Detecting attacks using compromised credentials via internal network monitoring Itai Grady, Michael Dubinsky, Benny Lakunishok, Tal Arieh Be'ery 2018-11-13
9860260 Monitoring the life cycle of a computer network connection Tal Arieh Be'ery, Itai Grady 2018-01-02
9729538 System, method and process for detecting advanced and targeted attacks with the recoupling of kerberos authentication and authorization Tal Arieh Be'ery, Michael Dolinsky, Ohad Plotnik, Gregory Messerman, Sivan Krigsman 2017-08-08
9614861 Monitoring the life cycle of a computer network connection Tal Arieh Be'ery, Itai Grady 2017-04-04
8548998 Methods and systems for securing and protecting repositories and directories Itay Podhajcer, Ohad Plotnik 2013-10-01