| 11818228 |
Establishing user's presence on internal on-premises network over time using network signals |
Tal Arieh Be'ery, Itai Grady, Tom Jurgenson, Idan Plotnik, Sivan Krigsman +1 more |
2023-11-14 |
| 11025668 |
Detecting attacks using compromised credentials via internal network monitoring |
Itai Grady, Benny Lakunishok, Idan Plotnik, Tal Arieh Be'ery |
2021-06-01 |
| 10587611 |
Detection of the network logon protocol used in pass-through authentication |
Tal Joseph Maor, Itai Grady Ashkenazy, Marina Simakov |
2020-03-10 |
| 10505894 |
Active and passive method to perform IP to name resolution in organizational environments |
Idan Plotnik, Sivan Krigsman, Benny Lakunishok, Tal Arieh Be'ery, Michael Dolinsky |
2019-12-10 |
| 10333944 |
Detecting impossible travel in the on-premise settings |
Tom Jurgenson, Sivan Krigsman, Tal Arieh Be'ery, Idan Plotnik, Gil David |
2019-06-25 |
| 10298699 |
Physical location determination of internal network components |
Tom Jurgenson, Tal Arieh Be'ery, Idan Plotnik, Sivan Krigsman, Gil David |
2019-05-21 |
| 10129298 |
Detecting attacks using compromised credentials via internal network monitoring |
Itai Grady, Benny Lakunishok, Idan Plotnik, Tal Arieh Be'ery |
2018-11-13 |