AB

Avihai Berkovitz

WI Wiz: 16 patents #10 of 96Top 15%
Microsoft: 2 patents #17,506 of 40,388Top 45%
Overall (All Time): #243,130 of 4,157,543Top 6%
18
Patents All Time

Issued Patents All Time

Patent #TitleCo-InventorsDate
12395489 Techniques for active inspection of cloud computing applications utilizing optical character recognition Matilda LIDGI, Shai Keren, Raaz HERZBERG, Ami Luttwak, Roy REZNIK +1 more 2025-08-19
12381939 System and method for analyzing network objects in a cloud environment Shai Keren, Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak 2025-08-05
12333010 System and method for generating a partitioned view of a security graph in a cloud computing environment Raaz HERZBERG, Ami Luttwak, Roy REZNIK, Shai Keren, Yinon COSTICA 2025-06-17
12278840 Efficient representation of multiple cloud computing environments through unified identity mapping George PISHA, Yaniv Joseph Oliver, Udi REITBLAT 2025-04-15
12278819 Cybersecurity threat detection utilizing unified identity mapping and permission detection George PISHA, Yaniv Joseph Oliver, Udi REITBLAT 2025-04-15
12273412 System and method for analyzing network objects in a cloud environment Shai Keren, Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak 2025-04-08
12255948 System and method for analyzing network objects in a cloud environment Shai Keren, Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak 2025-03-18
12244634 Techniques for cybersecurity identity risk detection utilizing disk cloning and unified identity mapping Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA +7 more 2025-03-04
12189785 System and method for providing third party compliance to computer and software environments Roy REZNIK, Mattan SHALEV, Erez Eyal, Ami Luttwak 2025-01-07
12192270 System and method for analyzing network objects in a cloud environment Shai Keren, Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak 2025-01-07
12028360 Techniques for multi-tenant vulnerability scanning utilizing sensitive data Yarin Miran, Ami Luttwak, Roy REZNIK, Moran Cohen, Yaniv Shaked +1 more 2024-07-02
12003520 Techniques for multi-tenant vulnerability scanning Yarin Miran, Ami Luttwak, Roy REZNIK, Moran Cohen, Yaniv Shaked +1 more 2024-06-04
11985185 System and method for analyzing network objects in a cloud environment Shai Keren, Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak 2024-05-14
11973770 Techniques for multi-tenant vulnerability scanning Yarin Miran, Ami Luttwak, Roy REZNIK, Moran Cohen, Yaniv Shaked +1 more 2024-04-30
11722554 System and method for analyzing network objects in a cloud environment Shai Keren, Danny Shemesh, Roy REZNIK, Ami Luttwak 2023-08-08
11431786 System and method for analyzing network objects in a cloud environment Shai Keren, Danny Shemesh, Roy REZNIK, Ami Luttwak 2022-08-30
11233867 On-demand push notification mechanism Vitaly Khait 2022-01-25
10867033 Load distribution enabling detection of first appearance of a new property value in pipeline data processing Shai Keren, Ido Barav, Shai Kaplan 2020-12-15