Issued Patents All Time
Showing 1–25 of 25 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12430427 | Methods, systems and computer programs for detecting potentially suspicious resource access events | Daniel DAVRAEV, Shalom Shay SHAVIT | 2025-09-30 |
| 12399976 | Agentless extraction of cloud credentials | Josef Weizman, Lior Sonntag | 2025-08-26 |
| 12388852 | Detecting mass control plane operations | Andrey KARPOVSKY, Evgeny Bogokovsky | 2025-08-12 |
| 12250238 | Threat detection using cloud resource management logs | Roy Levin, Johnathan Samuel Simon | 2025-03-11 |
| 12041117 | Predictive model application for file upload blocking determinations | Omer Karin, Josef Weizman | 2024-07-16 |
| 12021882 | Real-time detection of malicious activity through collaborative filtering | Omer Karin | 2024-06-25 |
| 11979418 | Detecting potential malicious use of a resource management agent using a resource management log | Johnathan Samuel Simon | 2024-05-07 |
| 11973796 | Dangling domain detection and access mitigation | Josef Weizman, Aharon Naftali Michaels, Dotan Patrich | 2024-04-30 |
| 11836250 | Identification and mitigation of permissions elevating attack vector | Ilay Grossman | 2023-12-05 |
| 11716340 | Threat detection using cloud resource management logs | Roy Levin, Johnathan Samuel Simon | 2023-08-01 |
| 11651076 | Detecting spread of malware through shared data storages | Josef Weizman, Andrey KARPOVSKY | 2023-05-16 |
| 11647035 | Fidelity of anomaly alerts using control plane and data plane information | Andrey KARPOVSKY, Roy Levin, Tomer Rotstein, Michael MAKHLEVICH, Tamer Salman | 2023-05-09 |
| 11483375 | Predictive model application for file upload blocking determinations | Omer Karin, Josef Weizman | 2022-10-25 |
| 11416613 | Attack detection through exposure of command abuse | Josef Weizman, Tomer Koren, Dotan Patrich | 2022-08-16 |
| 11368473 | Interface threat assessment in multi-cluster system | Josef Weizman, Dotan Patrich | 2022-06-21 |
| 11363037 | Real-time detection of malicious activity through collaborative filtering | Omer Karin | 2022-06-14 |
| 11263544 | Similarity based approach for clustering and accelerating multiple incidents investigation | Yotam Livny, Roy Levin, Ben Kliger, Mathias Abraham Marc Scherman, Moshe Israel +1 more | 2022-03-01 |
| 11223637 | Detecting attacks on web applications using server logs | Hani Hana Neuvirth, Tomer Koren, Josef Weizman, Karl William Reinsch, Efim Hudis | 2022-01-11 |
| 11196746 | Whitelisting of trusted accessors to restricted web pages | Omer Karin, Hani Hana Neuvirth, Dotan Patrich, Tomer Koren, Josef Weizman +1 more | 2021-12-07 |
| 11184359 | Automated access control policy generation for computer resources | Ben Kliger, Yotam Livny, Roy Levin, Mathias Abraham Marc Scherman, Moshe Israel +1 more | 2021-11-23 |
| 11159567 | Malicious cloud-based resource allocation detection | Roy Levin | 2021-10-26 |
| 11126736 | Protecting storage by detecting unrecommended access | Roy Levin | 2021-09-21 |
| 11089024 | System and method for restricting access to web resources | Dotan Patrich, Tomer Koren, Moshe Israel, Hani Hana Neuvirth, Josef Weizman | 2021-08-10 |
| 10944791 | Increasing security of network resources utilizing virtual honeypots | Yotam Livny, Mathias Abraham Marc Scherman, Moshe Israel, Ben Kliger, Roy Levin +1 more | 2021-03-09 |
| 10887326 | Distributed system for adaptive protection against web-service- targeted vulnerability scanners | Josef Weizman, Tomer Koren, Hani Hana Neuvirth, Dotan Patrich | 2021-01-05 |