Issued Patents All Time
Showing 25 most recent of 64 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12401580 | System and method for generation of unified graph models for network entities | Daniel Hershko SHEMESH, Liran Moysi, Shai Keren | 2025-08-26 |
| 12395489 | Techniques for active inspection of cloud computing applications utilizing optical character recognition | Matilda LIDGI, Shai Keren, Raaz HERZBERG, Ami Luttwak, Avihai Berkovitz +1 more | 2025-08-19 |
| 12395488 | Techniques for analyzing external exposure in cloud environments | Matilda LIDGI, Shai Keren, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak | 2025-08-19 |
| 12395503 | System and method for detecting sensitive data in active inspection of cloud computing resources | Matilda LIDGI, Shai Keren, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak | 2025-08-19 |
| 12381939 | System and method for analyzing network objects in a cloud environment | Shai Keren, Daniel Hershko SHEMESH, Ami Luttwak, Avihai Berkovitz | 2025-08-05 |
| 12361140 | Architecture of a multi-cloud inspector for any compute type | Yaniv Shaked, Ami Luttwak, Gal KOZOSHNIK, Yarin Miran | 2025-07-15 |
| 12348646 | Techniques for validating a virtual workload signature from a software repository | Amir Lande Blau, Bar MAGNEZI | 2025-07-01 |
| 12346700 | Techniques for mounting disks in an inspection environment | Yaniv Shaked | 2025-07-01 |
| 12333010 | System and method for generating a partitioned view of a security graph in a cloud computing environment | Avihai Berkovitz, Raaz HERZBERG, Ami Luttwak, Shai Keren, Yinon COSTICA | 2025-06-17 |
| 12287899 | Techniques for detecting sensitive data in cloud computing environments utilizing cloning | Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak, Moran Cohen, Yaniv Shaked +4 more | 2025-04-29 |
| 12284220 | System and method for applying a policy on a network path | Matilda LIDGI, Shai Keren, Eliran MAROM | 2025-04-22 |
| 12278825 | System and method for cybersecurity threat detection utilizing static and runtime data | Aviel FOGEL, Udi REITBLAT, Alon SCHINDEL, Ami Luttwak, Yinon COSTICA | 2025-04-15 |
| 12277216 | Techniques for improved virtual instance inspection utilizing disk cloning | Daniel Hershko SHEMESH, Yarin Miran, Ami Luttwak, Yinon COSTICA | 2025-04-15 |
| 12278897 | System and method for disk inspection utilizing disk cloning techniques | Daniel Hershko SHEMESH, Yarin Miran, Ami Luttwak, Yinon COSTICA | 2025-04-15 |
| 12277532 | System and method for agentless application inventory detection | Mattan SHALEV, Yaniv Shaked, Gal KOZOSHNIK, Omri Kornblau, Ami Luttwak +1 more | 2025-04-15 |
| 12271485 | Detecting vulnerabilities in virtual instances in a cloud environment utilizing infrastructure as code | Yinon COSTICA, Osher HAZAN, Raaz HERZBERG | 2025-04-08 |
| 12273412 | System and method for analyzing network objects in a cloud environment | Shai Keren, Daniel Hershko SHEMESH, Ami Luttwak, Avihai Berkovitz | 2025-04-08 |
| 12271490 | Unified inspection techniques based on abstracted compute type | Yaniv Shaked, Ami Luttwak, Yarin Miran, Moran Cohen | 2025-04-08 |
| 12267326 | Techniques for detecting resources without authentication using exposure analysis | Matilda LIDGI, Shai Keren, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak | 2025-04-01 |
| 12261877 | Detecting malware infection path in a cloud computing environment utilizing a security graph | Elad Gabay, Yaniv Shaked, Alon SCHINDEL, Ami Luttwak | 2025-03-25 |
| 12255948 | System and method for analyzing network objects in a cloud environment | Shai Keren, Daniel Hershko SHEMESH, Ami Luttwak, Avihai Berkovitz | 2025-03-18 |
| 12248581 | Architecture of a multi-cloud inspector for any compute type | Yaniv Shaked, Ami Luttwak, Gal KOZOSHNIK, Yarin Miran | 2025-03-11 |
| 12248584 | System and method for agentless host configuration detection of an image in a virtualized environment | Yaniv Shaked, Mattan SHALEV, Gal KOZOSHNIK, Daniel Klein, Ami Luttwak | 2025-03-11 |
| 12248909 | System and method for agentless application inventory detection | Mattan SHALEV, Yaniv Shaked, Gal KOZOSHNIK, Omri Kornblau, Ami Luttwak +1 more | 2025-03-11 |
| 12244634 | Techniques for cybersecurity identity risk detection utilizing disk cloning and unified identity mapping | Daniel Hershko SHEMESH, Yarin Miran, Ami Luttwak, Yinon COSTICA, Avihai Berkovitz +7 more | 2025-03-04 |