DS

Daniel Hershko SHEMESH

WI Wiz: 28 patents #5 of 96Top 6%
Overall (All Time): #133,280 of 4,157,543Top 4%
28
Patents All Time

Issued Patents All Time

Showing 25 most recent of 28 patents

Patent #TitleCo-InventorsDate
12401580 System and method for generation of unified graph models for network entities Liran Moysi, Roy REZNIK, Shai Keren 2025-08-26
12381939 System and method for analyzing network objects in a cloud environment Shai Keren, Roy REZNIK, Ami Luttwak, Avihai Berkovitz 2025-08-05
12346457 System and method for scanning private code and CI/CD registries Arnon Trabelsi 2025-07-01
12287899 Techniques for detecting sensitive data in cloud computing environments utilizing cloning Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Ami Luttwak, Moran Cohen +4 more 2025-04-29
12278897 System and method for disk inspection utilizing disk cloning techniques Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA 2025-04-15
12277216 Techniques for improved virtual instance inspection utilizing disk cloning Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA 2025-04-15
12273391 Static analysis techniques for determining reachability properties of network and computing objects Shai Keren 2025-04-08
12273412 System and method for analyzing network objects in a cloud environment Shai Keren, Roy REZNIK, Ami Luttwak, Avihai Berkovitz 2025-04-08
12273358 System and method for detecting lateral movement using cloud access keys Avi Tal LICHTENSTEIN, Ami Luttwak 2025-04-08
12255900 System and method for detecting lateral movement using cloud access keys Avi Tal LICHTENSTEIN, Ami Luttwak 2025-03-18
12255948 System and method for analyzing network objects in a cloud environment Shai Keren, Roy REZNIK, Ami Luttwak, Avihai Berkovitz 2025-03-18
12250231 System and method for detecting lateral movement using cloud access keys Avi Tal LICHTENSTEIN, Ami Luttwak 2025-03-11
12244634 Techniques for cybersecurity identity risk detection utilizing disk cloning and unified identity mapping Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Avihai Berkovitz +7 more 2025-03-04
12231440 System and method for detecting lateral movement using cloud access keys Avi Tal LICHTENSTEIN, Ami Luttwak 2025-02-18
12217079 Detecting security exceptions across multiple compute environments Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Raaz HERZBERG +3 more 2025-02-04
12219048 Techniques for encrypted disk cybersecurity inspection utilizing disk cloning Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Yaniv Shaked +1 more 2025-02-04
12212586 Techniques for cybersecurity inspection based on runtime data and static analysis from cloned resources Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Aviel FOGEL +2 more 2025-01-28
12192270 System and method for analyzing network objects in a cloud environment Shai Keren, Roy REZNIK, Ami Luttwak, Avihai Berkovitz 2025-01-07
12095912 System and method for encrypted disk inspection utilizing disk cloning techniques Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Yaniv Shaked +1 more 2024-09-17
12079328 Techniques for inspecting running virtualizations for cybersecurity risks Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Niv Roit BEN DAVID +3 more 2024-09-03
11985185 System and method for analyzing network objects in a cloud environment Shai Keren, Roy REZNIK, Ami Luttwak, Avihai Berkovitz 2024-05-14
11962623 Static analysis techniques for determining reachability properties of network and computing objects Shai Keren 2024-04-16
11936785 System and method for encrypted disk inspection utilizing disk cloning techniques Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Yaniv Shaked +1 more 2024-03-19
11929896 System and method for generation of unified graph models for network entities Liran Moysi, Roy REZNIK, Shai Keren 2024-03-12
11902333 Static analysis techniques for determining reachability properties of network and computing objects Shai Keren 2024-02-13