Issued Patents All Time
Showing 1–15 of 15 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12395488 | Techniques for analyzing external exposure in cloud environments | Matilda LIDGI, Shai Keren, Avi Tal LICHTENSTEIN, Ami Luttwak, Roy REZNIK | 2025-08-19 |
| 12395489 | Techniques for active inspection of cloud computing applications utilizing optical character recognition | Matilda LIDGI, Shai Keren, Ami Luttwak, Roy REZNIK, Avihai Berkovitz +1 more | 2025-08-19 |
| 12395503 | System and method for detecting sensitive data in active inspection of cloud computing resources | Matilda LIDGI, Shai Keren, Avi Tal LICHTENSTEIN, Ami Luttwak, Roy REZNIK | 2025-08-19 |
| 12333010 | System and method for generating a partitioned view of a security graph in a cloud computing environment | Avihai Berkovitz, Ami Luttwak, Roy REZNIK, Shai Keren, Yinon COSTICA | 2025-06-17 |
| 12287899 | Techniques for detecting sensitive data in cloud computing environments utilizing cloning | Avi Tal LICHTENSTEIN, Roy REZNIK, Ami Luttwak, Moran Cohen, Yaniv Shaked +4 more | 2025-04-29 |
| 12271485 | Detecting vulnerabilities in virtual instances in a cloud environment utilizing infrastructure as code | Roy REZNIK, Yinon COSTICA, Osher HAZAN | 2025-04-08 |
| 12267326 | Techniques for detecting resources without authentication using exposure analysis | Matilda LIDGI, Shai Keren, Avi Tal LICHTENSTEIN, Ami Luttwak, Roy REZNIK | 2025-04-01 |
| 12244627 | Techniques for active inspection of vulnerability exploitation using exposure | Matilda LIDGI, Shai Keren, Avi Tal LICHTENSTEIN, Ami Luttwak, Roy REZNIK | 2025-03-04 |
| 12244634 | Techniques for cybersecurity identity risk detection utilizing disk cloning and unified identity mapping | Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA +7 more | 2025-03-04 |
| 12217079 | Detecting security exceptions across multiple compute environments | Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA +3 more | 2025-02-04 |
| 12182172 | System and method for agentless detection of sensitive data on managed databases | Avi Tal LICHTENSTEIN, Roy REZNIK, Ami Luttwak, Moran Cohen, Yaniv Shaked +2 more | 2024-12-31 |
| 12079328 | Techniques for inspecting running virtualizations for cybersecurity risks | Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA +3 more | 2024-09-03 |
| 12061719 | System and method for agentless detection of sensitive data in computing environments | Avi Tal LICHTENSTEIN, Roy REZNIK, Ami Luttwak, Moran Cohen, Yaniv Shaked +2 more | 2024-08-13 |
| 12061925 | Techniques for inspecting managed workloads deployed in a cloud computing environment | Niv Roit BEN DAVID, Yaniv Shaked, Yarin Miran, Amir Lande Blau | 2024-08-13 |
| 12026144 | Populating multi-layer technology product catalogs | Gal KOZOSHNIK, Yinon COSTICA, Yaniv Shaked, Daniel Klein, Ami Luttwak | 2024-07-02 |