RR

Roy REZNIK

WI Wiz: 61 patents #2 of 96Top 3%
Microsoft: 2 patents #17,506 of 40,388Top 45%
Overall (All Time): #34,065 of 4,157,543Top 1%
64
Patents All Time

Issued Patents All Time

Showing 25 most recent of 64 patents

Patent #TitleCo-InventorsDate
12401580 System and method for generation of unified graph models for network entities Daniel Hershko SHEMESH, Liran Moysi, Shai Keren 2025-08-26
12395489 Techniques for active inspection of cloud computing applications utilizing optical character recognition Matilda LIDGI, Shai Keren, Raaz HERZBERG, Ami Luttwak, Avihai Berkovitz +1 more 2025-08-19
12395488 Techniques for analyzing external exposure in cloud environments Matilda LIDGI, Shai Keren, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak 2025-08-19
12395503 System and method for detecting sensitive data in active inspection of cloud computing resources Matilda LIDGI, Shai Keren, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak 2025-08-19
12381939 System and method for analyzing network objects in a cloud environment Shai Keren, Daniel Hershko SHEMESH, Ami Luttwak, Avihai Berkovitz 2025-08-05
12361140 Architecture of a multi-cloud inspector for any compute type Yaniv Shaked, Ami Luttwak, Gal KOZOSHNIK, Yarin Miran 2025-07-15
12348646 Techniques for validating a virtual workload signature from a software repository Amir Lande Blau, Bar MAGNEZI 2025-07-01
12346700 Techniques for mounting disks in an inspection environment Yaniv Shaked 2025-07-01
12333010 System and method for generating a partitioned view of a security graph in a cloud computing environment Avihai Berkovitz, Raaz HERZBERG, Ami Luttwak, Shai Keren, Yinon COSTICA 2025-06-17
12287899 Techniques for detecting sensitive data in cloud computing environments utilizing cloning Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak, Moran Cohen, Yaniv Shaked +4 more 2025-04-29
12284220 System and method for applying a policy on a network path Matilda LIDGI, Shai Keren, Eliran MAROM 2025-04-22
12278825 System and method for cybersecurity threat detection utilizing static and runtime data Aviel FOGEL, Udi REITBLAT, Alon SCHINDEL, Ami Luttwak, Yinon COSTICA 2025-04-15
12277216 Techniques for improved virtual instance inspection utilizing disk cloning Daniel Hershko SHEMESH, Yarin Miran, Ami Luttwak, Yinon COSTICA 2025-04-15
12278897 System and method for disk inspection utilizing disk cloning techniques Daniel Hershko SHEMESH, Yarin Miran, Ami Luttwak, Yinon COSTICA 2025-04-15
12277532 System and method for agentless application inventory detection Mattan SHALEV, Yaniv Shaked, Gal KOZOSHNIK, Omri Kornblau, Ami Luttwak +1 more 2025-04-15
12271485 Detecting vulnerabilities in virtual instances in a cloud environment utilizing infrastructure as code Yinon COSTICA, Osher HAZAN, Raaz HERZBERG 2025-04-08
12273412 System and method for analyzing network objects in a cloud environment Shai Keren, Daniel Hershko SHEMESH, Ami Luttwak, Avihai Berkovitz 2025-04-08
12271490 Unified inspection techniques based on abstracted compute type Yaniv Shaked, Ami Luttwak, Yarin Miran, Moran Cohen 2025-04-08
12267326 Techniques for detecting resources without authentication using exposure analysis Matilda LIDGI, Shai Keren, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak 2025-04-01
12261877 Detecting malware infection path in a cloud computing environment utilizing a security graph Elad Gabay, Yaniv Shaked, Alon SCHINDEL, Ami Luttwak 2025-03-25
12255948 System and method for analyzing network objects in a cloud environment Shai Keren, Daniel Hershko SHEMESH, Ami Luttwak, Avihai Berkovitz 2025-03-18
12248581 Architecture of a multi-cloud inspector for any compute type Yaniv Shaked, Ami Luttwak, Gal KOZOSHNIK, Yarin Miran 2025-03-11
12248584 System and method for agentless host configuration detection of an image in a virtualized environment Yaniv Shaked, Mattan SHALEV, Gal KOZOSHNIK, Daniel Klein, Ami Luttwak 2025-03-11
12248909 System and method for agentless application inventory detection Mattan SHALEV, Yaniv Shaked, Gal KOZOSHNIK, Omri Kornblau, Ami Luttwak +1 more 2025-03-11
12244634 Techniques for cybersecurity identity risk detection utilizing disk cloning and unified identity mapping Daniel Hershko SHEMESH, Yarin Miran, Ami Luttwak, Yinon COSTICA, Avihai Berkovitz +7 more 2025-03-04