| 12395488 |
Techniques for analyzing external exposure in cloud environments |
Shai Keren, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak, Roy REZNIK |
2025-08-19 |
| 12395489 |
Techniques for active inspection of cloud computing applications utilizing optical character recognition |
Shai Keren, Raaz HERZBERG, Ami Luttwak, Roy REZNIK, Avihai Berkovitz +1 more |
2025-08-19 |
| 12395503 |
System and method for detecting sensitive data in active inspection of cloud computing resources |
Shai Keren, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak, Roy REZNIK |
2025-08-19 |
| 12284220 |
System and method for applying a policy on a network path |
Roy REZNIK, Shai Keren, Eliran MAROM |
2025-04-22 |
| 12267326 |
Techniques for detecting resources without authentication using exposure analysis |
Shai Keren, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak, Roy REZNIK |
2025-04-01 |
| 12244627 |
Techniques for active inspection of vulnerability exploitation using exposure |
Shai Keren, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak, Roy REZNIK |
2025-03-04 |
| 12170682 |
Application endpoint cybersecurity techniques |
Danielle Aminov, Eliran MAROM, Ron David Ben Arzi, Rotem Lipowitch, Amitai Cohen |
2024-12-17 |
| 11936693 |
System and method for applying a policy on a network path |
Roy REZNIK, Shai Keren, Eliran MAROM |
2024-03-19 |