Issued Patents All Time
Showing 25 most recent of 38 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12401683 | Techniques for detecting artificial intelligence model cybersecurity risk in a computing environment | Amitai Cohen, Barak SHARONI, Shir Tamari, George PISHA, Itay Arbel +1 more | 2025-08-26 |
| 12380223 | Techniques for risk and constraint-based inspection | Ami Luttwak, Shahar Rand, Eric Abramov, Elad Gabay, Yinon COSTICA | 2025-08-05 |
| 12361140 | Architecture of a multi-cloud inspector for any compute type | Ami Luttwak, Gal KOZOSHNIK, Roy REZNIK, Yarin Miran | 2025-07-15 |
| 12346700 | Techniques for mounting disks in an inspection environment | Roy REZNIK | 2025-07-01 |
| 12287899 | Techniques for detecting sensitive data in cloud computing environments utilizing cloning | Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Ami Luttwak, Moran Cohen +4 more | 2025-04-29 |
| 12277532 | System and method for agentless application inventory detection | Mattan SHALEV, Gal KOZOSHNIK, Omri Kornblau, Roy REZNIK, Ami Luttwak +1 more | 2025-04-15 |
| 12271490 | Unified inspection techniques based on abstracted compute type | Ami Luttwak, Roy REZNIK, Yarin Miran, Moran Cohen | 2025-04-08 |
| 12273372 | Techniques for detecting artificial intelligence model cybersecurity risk in a computing environment | Amitai Cohen, Barak SHARONI, Shir Tamari, George PISHA, Itay Arbel +1 more | 2025-04-08 |
| 12261877 | Detecting malware infection path in a cloud computing environment utilizing a security graph | Elad Gabay, Alon SCHINDEL, Roy REZNIK, Ami Luttwak | 2025-03-25 |
| 12248584 | System and method for agentless host configuration detection of an image in a virtualized environment | Mattan SHALEV, Gal KOZOSHNIK, Daniel Klein, Roy REZNIK, Ami Luttwak | 2025-03-11 |
| 12248909 | System and method for agentless application inventory detection | Mattan SHALEV, Gal KOZOSHNIK, Omri Kornblau, Roy REZNIK, Ami Luttwak +1 more | 2025-03-11 |
| 12248581 | Architecture of a multi-cloud inspector for any compute type | Ami Luttwak, Gal KOZOSHNIK, Roy REZNIK, Yarin Miran | 2025-03-11 |
| 12242601 | System and method for agentless host configuration detection in a computing environment | Mattan SHALEV, Gal KOZOSHNIK, Daniel Klein, Roy REZNIK, Ami Luttwak | 2025-03-04 |
| 12219048 | Techniques for encrypted disk cybersecurity inspection utilizing disk cloning | Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA +1 more | 2025-02-04 |
| 12219053 | Techniques for circumventing provider-imposed limitations in snapshot inspection of disks for cybersecurity | Shahar Rand, Eric Abramov, Elad Gabay | 2025-02-04 |
| 12182172 | System and method for agentless detection of sensitive data on managed databases | Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Ami Luttwak, Moran Cohen +2 more | 2024-12-31 |
| 12175428 | System and method for agentless application inventory detection | Mattan SHALEV, Gal KOZOSHNIK, Omri Kornblau, Roy REZNIK, Ami Luttwak +1 more | 2024-12-24 |
| 12093384 | Techniques for improved inspection of container layers | Yaniv Joseph Oliver, Ami Luttwak, Yinon COSTICA, Roy REZNIK, Amir Lande Blau | 2024-09-17 |
| 12095912 | System and method for encrypted disk inspection utilizing disk cloning techniques | Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA +1 more | 2024-09-17 |
| 12079328 | Techniques for inspecting running virtualizations for cybersecurity risks | Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Yinon COSTICA +3 more | 2024-09-03 |
| 12081656 | Techniques for circumventing provider-imposed limitations in snapshot inspection of disks for cybersecurity | Shahar Rand, Eric Abramov, Elad Gabay | 2024-09-03 |
| 12061719 | System and method for agentless detection of sensitive data in computing environments | Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Ami Luttwak, Moran Cohen +2 more | 2024-08-13 |
| 12061925 | Techniques for inspecting managed workloads deployed in a cloud computing environment | Niv Roit BEN DAVID, Yarin Miran, Raaz HERZBERG, Amir Lande Blau | 2024-08-13 |
| 12028360 | Techniques for multi-tenant vulnerability scanning utilizing sensitive data | Yarin Miran, Ami Luttwak, Roy REZNIK, Avihai Berkovitz, Moran Cohen +1 more | 2024-07-02 |
| 12026144 | Populating multi-layer technology product catalogs | Gal KOZOSHNIK, Raaz HERZBERG, Yinon COSTICA, Daniel Klein, Ami Luttwak | 2024-07-02 |