RR

Roy REZNIK

WI Wiz: 61 patents #2 of 96Top 3%
Microsoft: 2 patents #17,506 of 40,388Top 45%
Overall (All Time): #34,065 of 4,157,543Top 1%
64
Patents All Time

Issued Patents All Time

Showing 26–50 of 64 patents

Patent #TitleCo-InventorsDate
12242601 System and method for agentless host configuration detection in a computing environment Yaniv Shaked, Mattan SHALEV, Gal KOZOSHNIK, Daniel Klein, Ami Luttwak 2025-03-04
12244627 Techniques for active inspection of vulnerability exploitation using exposure Matilda LIDGI, Shai Keren, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak 2025-03-04
12217079 Detecting security exceptions across multiple compute environments Daniel Hershko SHEMESH, Yarin Miran, Ami Luttwak, Yinon COSTICA, Raaz HERZBERG +3 more 2025-02-04
12219048 Techniques for encrypted disk cybersecurity inspection utilizing disk cloning Daniel Hershko SHEMESH, Yarin Miran, Ami Luttwak, Yinon COSTICA, Yaniv Shaked +1 more 2025-02-04
12212586 Techniques for cybersecurity inspection based on runtime data and static analysis from cloned resources Daniel Hershko SHEMESH, Yarin Miran, Ami Luttwak, Yinon COSTICA, Aviel FOGEL +2 more 2025-01-28
12192270 System and method for analyzing network objects in a cloud environment Shai Keren, Daniel Hershko SHEMESH, Ami Luttwak, Avihai Berkovitz 2025-01-07
12189779 Detection of cyber threats embedded in cloud applications Ami Luttwak, Guy Rozendorn, Yarin Miran 2025-01-07
12189785 System and method for providing third party compliance to computer and software environments Mattan SHALEV, Avihai Berkovitz, Erez Eyal, Ami Luttwak 2025-01-07
12182172 System and method for agentless detection of sensitive data on managed databases Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak, Moran Cohen, Yaniv Shaked +2 more 2024-12-31
12175428 System and method for agentless application inventory detection Mattan SHALEV, Yaniv Shaked, Gal KOZOSHNIK, Omri Kornblau, Ami Luttwak +1 more 2024-12-24
12177184 Techniques for cybersecurity risk-based firewall configuration Lidor Gonshorowitz, Oron Noah, Ami Luttwak, Yinon COSTICA 2024-12-24
12164963 Techniques for detecting AI pipelines in cloud computing environments Ami Luttwak, Alon SCHINDEL, Amitai Cohen, Yinon COSTICA, Mattan SHALEV 2024-12-10
12141291 Secured systems development lifecycle of software applications Assaf RAPPAPORT, Ami Luttwak, Yinon COSTICA 2024-11-12
12095912 System and method for encrypted disk inspection utilizing disk cloning techniques Daniel Hershko SHEMESH, Yarin Miran, Ami Luttwak, Yinon COSTICA, Yaniv Shaked +1 more 2024-09-17
12095786 System and method for generating cybersecurity remediation in computing environments Itay Arbel, Bar MAGNEZI, Erez Eyal 2024-09-17
12093384 Techniques for improved inspection of container layers Yaniv Joseph Oliver, Ami Luttwak, Yinon COSTICA, Yaniv Shaked, Amir Lande Blau 2024-09-17
12093374 Cybersecurity incident response techniques utilizing artificial intelligence Alon SCHINDEL, Barak SHARONI, Amitai Cohen, Ami Luttwak, Yinon COSTICA 2024-09-17
12079328 Techniques for inspecting running virtualizations for cybersecurity risks Daniel Hershko SHEMESH, Yarin Miran, Ami Luttwak, Yinon COSTICA, Niv Roit BEN DAVID +3 more 2024-09-03
12061719 System and method for agentless detection of sensitive data in computing environments Raaz HERZBERG, Avi Tal LICHTENSTEIN, Ami Luttwak, Moran Cohen, Yaniv Shaked +2 more 2024-08-13
12028360 Techniques for multi-tenant vulnerability scanning utilizing sensitive data Yarin Miran, Ami Luttwak, Avihai Berkovitz, Moran Cohen, Yaniv Shaked +1 more 2024-07-02
12010139 Detecting malware infection path in a cloud computing environment utilizing a security graph Elad Gabay, Yaniv Shaked, Alon SCHINDEL, Ami Luttwak 2024-06-11
12001549 Cybersecurity incident response techniques utilizing artificial intelligence Alon SCHINDEL, Barak SHARONI, Amitai Cohen, Ami Luttwak, Yinon COSTICA 2024-06-04
12001550 Cybersecurity incident response techniques utilizing artificial intelligence Alon SCHINDEL, Barak SHARONI, Amitai Cohen, Ami Luttwak, Yinon COSTICA 2024-06-04
12003520 Techniques for multi-tenant vulnerability scanning Yarin Miran, Ami Luttwak, Avihai Berkovitz, Moran Cohen, Yaniv Shaked +1 more 2024-06-04
11995193 Architecture of a multi-cloud inspector for any compute type Yaniv Shaked, Ami Luttwak, Gal KOZOSHNIK, Yarin Miran 2024-05-28