Issued Patents All Time
Showing 26–50 of 64 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12242601 | System and method for agentless host configuration detection in a computing environment | Yaniv Shaked, Mattan SHALEV, Gal KOZOSHNIK, Daniel Klein, Ami Luttwak | 2025-03-04 |
| 12244627 | Techniques for active inspection of vulnerability exploitation using exposure | Matilda LIDGI, Shai Keren, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak | 2025-03-04 |
| 12217079 | Detecting security exceptions across multiple compute environments | Daniel Hershko SHEMESH, Yarin Miran, Ami Luttwak, Yinon COSTICA, Raaz HERZBERG +3 more | 2025-02-04 |
| 12219048 | Techniques for encrypted disk cybersecurity inspection utilizing disk cloning | Daniel Hershko SHEMESH, Yarin Miran, Ami Luttwak, Yinon COSTICA, Yaniv Shaked +1 more | 2025-02-04 |
| 12212586 | Techniques for cybersecurity inspection based on runtime data and static analysis from cloned resources | Daniel Hershko SHEMESH, Yarin Miran, Ami Luttwak, Yinon COSTICA, Aviel FOGEL +2 more | 2025-01-28 |
| 12192270 | System and method for analyzing network objects in a cloud environment | Shai Keren, Daniel Hershko SHEMESH, Ami Luttwak, Avihai Berkovitz | 2025-01-07 |
| 12189779 | Detection of cyber threats embedded in cloud applications | Ami Luttwak, Guy Rozendorn, Yarin Miran | 2025-01-07 |
| 12189785 | System and method for providing third party compliance to computer and software environments | Mattan SHALEV, Avihai Berkovitz, Erez Eyal, Ami Luttwak | 2025-01-07 |
| 12182172 | System and method for agentless detection of sensitive data on managed databases | Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak, Moran Cohen, Yaniv Shaked +2 more | 2024-12-31 |
| 12175428 | System and method for agentless application inventory detection | Mattan SHALEV, Yaniv Shaked, Gal KOZOSHNIK, Omri Kornblau, Ami Luttwak +1 more | 2024-12-24 |
| 12177184 | Techniques for cybersecurity risk-based firewall configuration | Lidor Gonshorowitz, Oron Noah, Ami Luttwak, Yinon COSTICA | 2024-12-24 |
| 12164963 | Techniques for detecting AI pipelines in cloud computing environments | Ami Luttwak, Alon SCHINDEL, Amitai Cohen, Yinon COSTICA, Mattan SHALEV | 2024-12-10 |
| 12141291 | Secured systems development lifecycle of software applications | Assaf RAPPAPORT, Ami Luttwak, Yinon COSTICA | 2024-11-12 |
| 12095912 | System and method for encrypted disk inspection utilizing disk cloning techniques | Daniel Hershko SHEMESH, Yarin Miran, Ami Luttwak, Yinon COSTICA, Yaniv Shaked +1 more | 2024-09-17 |
| 12095786 | System and method for generating cybersecurity remediation in computing environments | Itay Arbel, Bar MAGNEZI, Erez Eyal | 2024-09-17 |
| 12093384 | Techniques for improved inspection of container layers | Yaniv Joseph Oliver, Ami Luttwak, Yinon COSTICA, Yaniv Shaked, Amir Lande Blau | 2024-09-17 |
| 12093374 | Cybersecurity incident response techniques utilizing artificial intelligence | Alon SCHINDEL, Barak SHARONI, Amitai Cohen, Ami Luttwak, Yinon COSTICA | 2024-09-17 |
| 12079328 | Techniques for inspecting running virtualizations for cybersecurity risks | Daniel Hershko SHEMESH, Yarin Miran, Ami Luttwak, Yinon COSTICA, Niv Roit BEN DAVID +3 more | 2024-09-03 |
| 12061719 | System and method for agentless detection of sensitive data in computing environments | Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak, Moran Cohen, Yaniv Shaked +2 more | 2024-08-13 |
| 12028360 | Techniques for multi-tenant vulnerability scanning utilizing sensitive data | Yarin Miran, Ami Luttwak, Avihai Berkovitz, Moran Cohen, Yaniv Shaked +1 more | 2024-07-02 |
| 12010139 | Detecting malware infection path in a cloud computing environment utilizing a security graph | Elad Gabay, Yaniv Shaked, Alon SCHINDEL, Ami Luttwak | 2024-06-11 |
| 12001549 | Cybersecurity incident response techniques utilizing artificial intelligence | Alon SCHINDEL, Barak SHARONI, Amitai Cohen, Ami Luttwak, Yinon COSTICA | 2024-06-04 |
| 12001550 | Cybersecurity incident response techniques utilizing artificial intelligence | Alon SCHINDEL, Barak SHARONI, Amitai Cohen, Ami Luttwak, Yinon COSTICA | 2024-06-04 |
| 12003520 | Techniques for multi-tenant vulnerability scanning | Yarin Miran, Ami Luttwak, Avihai Berkovitz, Moran Cohen, Yaniv Shaked +1 more | 2024-06-04 |
| 11995193 | Architecture of a multi-cloud inspector for any compute type | Yaniv Shaked, Ami Luttwak, Gal KOZOSHNIK, Yarin Miran | 2024-05-28 |