Issued Patents All Time
Showing 25 most recent of 35 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12079330 | Systems and methods for generating cyberattack predictions and responses | — | 2024-09-03 |
| 11991212 | Creation and optimization of security applications for cyber threats detection, investigation and mitigation | Rami Cohen | 2024-05-21 |
| 11509692 | Creation and optimization of security applications for cyber threats detection, investigation and mitigation | Rami Cohen | 2022-11-22 |
| 11444969 | Scoring the performance of security products | — | 2022-09-13 |
| 11228610 | System and method for classifying cyber security threats using natural language processing | Shlomi Medalion, Rami Cohen, Ron Katz, Idan Bellayev | 2022-01-18 |
| 11115437 | Cyber-security system and methods thereof for detecting and mitigating advanced persistent threats | — | 2021-09-07 |
| 10673903 | Classification of security rules | Shlomi Medalion | 2020-06-02 |
| 10601853 | Generation of cyber-attacks investigation policies | — | 2020-03-24 |
| 10505953 | Proactive prediction and mitigation of cyber-threats | Rami Cohen, Shlomi Medalion, Ron Katz | 2019-12-10 |
| 10374918 | Method and system for configuring behavioral network intelligence system using network monitoring programming language | Lev Medvedovsky, David Aviv | 2019-08-06 |
| 10355949 | Behavioral network intelligence system and method thereof | David Aviv, Lev Medvedovsky | 2019-07-16 |
| 10193919 | Risk-chain generation of cyber-threats | — | 2019-01-29 |
| 10122762 | Classification of security rules | Shlomi Medalion | 2018-11-06 |
| 10110485 | Techniques for traffic diversion in software defined networks for mitigating denial of service attacks | Ehud Doron | 2018-10-23 |
| 9979753 | Cyber-security system and methods thereof | — | 2018-05-22 |
| 9967279 | System and method thereof for creating programmable security decision engines in a cyber-security system | Shlomi Medalion | 2018-05-08 |
| 9892270 | System and method for programmably creating and customizing security applications via a graphical user interface | — | 2018-02-13 |
| 9674209 | Method and system for detecting and mitigating attacks performed using cryptographic protocols | Yosefa Shulman, Ziv Ichilov, Iko Azoulay | 2017-06-06 |
| 9647938 | Techniques for providing value-added services in SDN-based networks | Ehud Doron | 2017-05-09 |
| 9591011 | Techniques for separating the processing of clients' traffic to different zones in software defined networks | Yehuda Zisapel, Shay Naeh, David Aviv, Ehud Doron | 2017-03-07 |
| 9565204 | Cyber-security system and methods thereof | — | 2017-02-07 |
| 9450981 | System and method thereof for mitigating denial of service attacks in virtual networks | Ehud Doron | 2016-09-20 |
| 9344448 | Method and system for detecting and mitigating attacks performed using cryptographic protocols | Yosefa Shulman, Ziv Ichilov, Iko Azoulay | 2016-05-17 |
| 9210180 | Techniques for separating the processing of clients' traffic to different zones in software defined networks | Yehuda Zisapel, Shay Naeh, David Aviv, Ehud Doron | 2015-12-08 |
| 9130977 | Techniques for separating the processing of clients' traffic to different zones | Yehuda Zisapel, Shay Naeh, David Aviv | 2015-09-08 |