Issued Patents All Time
Showing 1–18 of 18 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12388841 | System and method for threat detection across multiple cloud environments utilizing normalized event logs | George PISHA, Liran Moysi, Itay Vanzetti | 2025-08-12 |
| 12388854 | System and method for generating normalized event logs for cloud detection and response in a multi-layered cloud environment | George PISHA, Liran Moysi, Itay Vanzetti | 2025-08-12 |
| 12284195 | Techniques for detecting cloud identity misuse leveraging runtime context | Ami Luttwak, Shir Tamari, Ron Cohen | 2025-04-22 |
| 12278825 | System and method for cybersecurity threat detection utilizing static and runtime data | Aviel FOGEL, Udi REITBLAT, Ami Luttwak, Roy REZNIK, Yinon COSTICA | 2025-04-15 |
| 12273370 | System and method for detecting cybersecurity risks in managed artificial intelligence models | Amitai Cohen, Barak SHARONI, Alon Weiss, Itay Arbel, George PISHA +2 more | 2025-04-08 |
| 12261877 | Detecting malware infection path in a cloud computing environment utilizing a security graph | Elad Gabay, Yaniv Shaked, Roy REZNIK, Ami Luttwak | 2025-03-25 |
| 12229257 | Techniques for preventing cloud identity misuse leveraging runtime context | Ami Luttwak, Shir Tamari, Ron Cohen | 2025-02-18 |
| 12225037 | Techniques for cybersecurity investigation of cloud entity misuse leveraging runtime context | Ami Luttwak, Shir Tamari, Ron Cohen | 2025-02-11 |
| 12212586 | Techniques for cybersecurity inspection based on runtime data and static analysis from cloned resources | Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA +2 more | 2025-01-28 |
| 12189774 | Techniques for detecting cloud identity misuse based on runtime context and static analysis | Ami Luttwak, Shir Tamari, Ron Cohen | 2025-01-07 |
| 12164963 | Techniques for detecting AI pipelines in cloud computing environments | Ami Luttwak, Amitai Cohen, Yinon COSTICA, Roy REZNIK, Mattan SHALEV | 2024-12-10 |
| 12093374 | Cybersecurity incident response techniques utilizing artificial intelligence | Barak SHARONI, Amitai Cohen, Ami Luttwak, Roy REZNIK, Yinon COSTICA | 2024-09-17 |
| 12028368 | System and method for detecting cybersecurity risks in managed artificial intelligence models | Amitai Cohen, Barak SHARONI, Alon Weiss, Itay Arbel, George PISHA +2 more | 2024-07-02 |
| 12010139 | Detecting malware infection path in a cloud computing environment utilizing a security graph | Elad Gabay, Yaniv Shaked, Roy REZNIK, Ami Luttwak | 2024-06-11 |
| 12001549 | Cybersecurity incident response techniques utilizing artificial intelligence | Barak SHARONI, Amitai Cohen, Ami Luttwak, Roy REZNIK, Yinon COSTICA | 2024-06-04 |
| 12001550 | Cybersecurity incident response techniques utilizing artificial intelligence | Barak SHARONI, Amitai Cohen, Ami Luttwak, Roy REZNIK, Yinon COSTICA | 2024-06-04 |
| 11841945 | System and method for cybersecurity threat detection utilizing static and runtime data | Aviel FOGEL, Udi REITBLAT, Ami Luttwak, Roy REZNIK, Yinon COSTICA | 2023-12-12 |
| 11706252 | Detecting malware infection path in a cloud computing environment utilizing a security graph | Elad Gabay, Yaniv Shaked, Roy REZNIK, Ami Luttwak | 2023-07-18 |