| 12395489 |
Techniques for active inspection of cloud computing applications utilizing optical character recognition |
Matilda LIDGI, Shai Keren, Raaz HERZBERG, Ami Luttwak, Roy REZNIK +1 more |
2025-08-19 |
| 12381939 |
System and method for analyzing network objects in a cloud environment |
Shai Keren, Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak |
2025-08-05 |
| 12333010 |
System and method for generating a partitioned view of a security graph in a cloud computing environment |
Raaz HERZBERG, Ami Luttwak, Roy REZNIK, Shai Keren, Yinon COSTICA |
2025-06-17 |
| 12278840 |
Efficient representation of multiple cloud computing environments through unified identity mapping |
George PISHA, Yaniv Joseph Oliver, Udi REITBLAT |
2025-04-15 |
| 12278819 |
Cybersecurity threat detection utilizing unified identity mapping and permission detection |
George PISHA, Yaniv Joseph Oliver, Udi REITBLAT |
2025-04-15 |
| 12273412 |
System and method for analyzing network objects in a cloud environment |
Shai Keren, Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak |
2025-04-08 |
| 12255948 |
System and method for analyzing network objects in a cloud environment |
Shai Keren, Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak |
2025-03-18 |
| 12244634 |
Techniques for cybersecurity identity risk detection utilizing disk cloning and unified identity mapping |
Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA +7 more |
2025-03-04 |
| 12189785 |
System and method for providing third party compliance to computer and software environments |
Roy REZNIK, Mattan SHALEV, Erez Eyal, Ami Luttwak |
2025-01-07 |
| 12192270 |
System and method for analyzing network objects in a cloud environment |
Shai Keren, Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak |
2025-01-07 |
| 12028360 |
Techniques for multi-tenant vulnerability scanning utilizing sensitive data |
Yarin Miran, Ami Luttwak, Roy REZNIK, Moran Cohen, Yaniv Shaked +1 more |
2024-07-02 |
| 12003520 |
Techniques for multi-tenant vulnerability scanning |
Yarin Miran, Ami Luttwak, Roy REZNIK, Moran Cohen, Yaniv Shaked +1 more |
2024-06-04 |
| 11985185 |
System and method for analyzing network objects in a cloud environment |
Shai Keren, Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak |
2024-05-14 |
| 11973770 |
Techniques for multi-tenant vulnerability scanning |
Yarin Miran, Ami Luttwak, Roy REZNIK, Moran Cohen, Yaniv Shaked +1 more |
2024-04-30 |
| 11722554 |
System and method for analyzing network objects in a cloud environment |
Shai Keren, Danny Shemesh, Roy REZNIK, Ami Luttwak |
2023-08-08 |
| 11431786 |
System and method for analyzing network objects in a cloud environment |
Shai Keren, Danny Shemesh, Roy REZNIK, Ami Luttwak |
2022-08-30 |
| 11233867 |
On-demand push notification mechanism |
Vitaly Khait |
2022-01-25 |
| 10867033 |
Load distribution enabling detection of first appearance of a new property value in pipeline data processing |
Shai Keren, Ido Barav, Shai Kaplan |
2020-12-15 |