| 11818228 |
Establishing user's presence on internal on-premises network over time using network signals |
Tal Arieh Be'ery, Itai Grady, Tom Jurgenson, Idan Plotnik, Michael Dubinsky +1 more |
2023-11-14 |
| 11126713 |
Detecting directory reconnaissance in a directory service |
Tal Joseph Maor, Itai Grady Ashkenazy, Gal Z. Bruchim, Jonathan Moshe Monsonego, Lior Schindler |
2021-09-21 |
| 10623234 |
Managing alerts regarding additions to user groups |
Tal Arieh Be'ery, Itai Grady, Yaron Kaner, Amit Rosenzweig, Tom Jurgenson |
2020-04-14 |
| 10505894 |
Active and passive method to perform IP to name resolution in organizational environments |
Idan Plotnik, Benny Lakunishok, Tal Arieh Be'ery, Michael Dubinsky, Michael Dolinsky |
2019-12-10 |
| 10333944 |
Detecting impossible travel in the on-premise settings |
Tom Jurgenson, Michael Dubinsky, Tal Arieh Be'ery, Idan Plotnik, Gil David |
2019-06-25 |
| 10298699 |
Physical location determination of internal network components |
Tom Jurgenson, Tal Arieh Be'ery, Idan Plotnik, Michael Dubinsky, Gil David |
2019-05-21 |
| 10148639 |
Distinguishing vertical brute force attacks from benign errors |
Idan Plotnik, Michael Dolinsky, Tal Arieh Be'ery, Gil David, Marina Simakov |
2018-12-04 |
| 9729538 |
System, method and process for detecting advanced and targeted attacks with the recoupling of kerberos authentication and authorization |
Idan Plotnik, Tal Arieh Be'ery, Michael Dolinsky, Ohad Plotnik, Gregory Messerman |
2017-08-08 |