| 12401580 |
System and method for generation of unified graph models for network entities |
Daniel Hershko SHEMESH, Roy REZNIK, Shai Keren |
2025-08-26 |
| 12388841 |
System and method for threat detection across multiple cloud environments utilizing normalized event logs |
George PISHA, Itay Vanzetti, Alon SCHINDEL |
2025-08-12 |
| 12388854 |
System and method for generating normalized event logs for cloud detection and response in a multi-layered cloud environment |
George PISHA, Itay Vanzetti, Alon SCHINDEL |
2025-08-12 |
| 11929896 |
System and method for generation of unified graph models for network entities |
Daniel Hershko SHEMESH, Roy REZNIK, Shai Keren |
2024-03-12 |
| 11115417 |
Secured access control to cloud-based applications |
Vitaly Khait, Ami Luttwak, Ariel Stolovich, Greg Vishnepolsky |
2021-09-07 |
| 10834055 |
Cross-tenant data leakage isolation |
Noam Liran |
2020-11-10 |
| 10642600 |
Cloud suffix proxy and a method thereof |
Gregory Vishnepolsky |
2020-05-05 |
| 10558641 |
Trigger system for databases using proxy |
Aviram Cohen, Noam Liran |
2020-02-11 |
| 10389528 |
On-demand generation and distribution of cryptographic certificates |
Aviram Cohen, Noam Liran |
2019-08-20 |
| 10324702 |
Cloud suffix proxy and a method thereof |
Gregory Vishnepolsky |
2019-06-18 |
| 10305861 |
Cross-tenant data leakage isolation |
Noam Liran |
2019-05-28 |
| 10091169 |
Method and system for protecting cloud-based applications executed in a cloud computing platform |
Aviram Cohen, Ami Luttwak, Roy REZNIK, Greg Vishnepolsky |
2018-10-02 |
| 9438565 |
Cloud service security broker and proxy |
Aviram Cohen, Ami Luttwak, Roy REZNIK, Greg Vishnepolsky |
2016-09-06 |