Issued Patents All Time
Showing 25 most recent of 34 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12423468 | Smart sampling for sensitive data detection | Andrey KARPOVSKY, Shimon EZRA, Ron Matchoro, Asaf Nakash, Moran Polack +1 more | 2025-09-23 |
| 12373568 | Malicious activity probability determinations for autonomous systems | Shay Chriba SAKAZI, Andrey KARPOVSKY | 2025-07-29 |
| 12289335 | Security finding categories-based prioritization | Jonathan Gazit, Dotan Patrich | 2025-04-29 |
| 12105802 | Container anomaly detection based on crowd sourcing | Nadav Wolfin, Liran Englender, Benyamin Farshteindiker, Elizabeta Mash Levin, Lior Becker +1 more | 2024-10-01 |
| 11991210 | Machine learning-based techniques for identifying deployment environments and enhancing security thereof | Omer Karin, Amit Magen, Tamer Salman | 2024-05-21 |
| 11888870 | Multitenant sharing anomaly cyberattack campaign detection | Yaakov Garyani, Hani Hana Neuvirth, Ely Abramovitch, Amir KEREN, Timothy William Burrell | 2024-01-30 |
| 11750619 | Modify assigned privilege levels and limit access to resources | Naama Kraus, Tamer Salman, Moshe Shalala, Idan Hen, Avihai Dvir +1 more | 2023-09-05 |
| 11681710 | Entity extraction rules harvesting and performance | Yaakov Garyani, Or Cohen | 2023-06-20 |
| 11580037 | Privilege level assignments to groups | Naama Kraus, Tamer Salman, Moshe Shalala, Rotem Lurie, Avihai Dvir | 2023-02-14 |
| 11509647 | Determination of weak hashed credentials | Shira Itzhaki | 2022-11-22 |
| 11461469 | Container anomaly detection based on crowd sourcing | Nadav Wolfin, Liran Englender, Benyamin Farshteindiker, Elizabeta Mash Levin, Lior Becker +1 more | 2022-10-04 |
| 11429724 | Machine learning detection of unused open ports | Michael Zeev Bargury, Ben Kliger, Yotam Livny | 2022-08-30 |
| 11405400 | Hardening based on access capability exercise sufficiency | Jonathan Gazit | 2022-08-02 |
| 11297086 | Correlation-based network security | Michael Zeev Bargury | 2022-04-05 |
| 11263544 | Similarity based approach for clustering and accelerating multiple incidents investigation | Yotam Livny, Roy Levin, Ram Haim Pliskin, Ben Kliger, Mathias Abraham Marc Scherman +1 more | 2022-03-01 |
| 11184359 | Automated access control policy generation for computer resources | Ben Kliger, Yotam Livny, Ram Haim Pliskin, Roy Levin, Mathias Abraham Marc Scherman +1 more | 2021-11-23 |
| 11159568 | Account management using account activity usage restrictions | Ben Kliger, Royi Ronen | 2021-10-26 |
| 11089024 | System and method for restricting access to web resources | Dotan Patrich, Ram Haim Pliskin, Tomer Koren, Hani Hana Neuvirth, Josef Weizman | 2021-08-10 |
| 11030303 | Time limited application enablement | Ben Kliger | 2021-06-08 |
| 11012476 | Protecting IOT devices by behavioural analysis of their file system | Shira Itzhaki, Yotam Livny | 2021-05-18 |
| 10944791 | Increasing security of network resources utilizing virtual honeypots | Yotam Livny, Mathias Abraham Marc Scherman, Ben Kliger, Ram Haim Pliskin, Roy Levin +1 more | 2021-03-09 |
| 10943009 | System and method to infer investigation steps for security alerts using crowd sourcing | Dotan Patrich, Yaakov Garyani, Yotam Livny | 2021-03-09 |
| 10911479 | Real-time mitigations for unfamiliar threat scenarios | Ben Kliger, Dotan Patrich, Michael Zeev Bargury | 2021-02-02 |
| 10911478 | Detection of attacks in the cloud by crowd sourcing security solutions | Dotan Patrich, Vlad Korsunsky, Maya Maimon, Oran Brill, Tomer Teller | 2021-02-02 |
| 10848463 | Listen mode for machine whitelisting mechanisms | Michael Zeev Bargury, Yotam Livny | 2020-11-24 |