YM

Yarin Miran

WI Wiz: 19 patents #8 of 96Top 9%
Microsoft: 1 patents #24,826 of 40,388Top 65%
Overall (All Time): #212,540 of 4,157,543Top 6%
20
Patents All Time

Issued Patents All Time

Patent #TitleCo-InventorsDate
12361140 Architecture of a multi-cloud inspector for any compute type Yaniv Shaked, Ami Luttwak, Gal KOZOSHNIK, Roy REZNIK 2025-07-15
12287899 Techniques for detecting sensitive data in cloud computing environments utilizing cloning Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Ami Luttwak, Moran Cohen +4 more 2025-04-29
12277216 Techniques for improved virtual instance inspection utilizing disk cloning Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA 2025-04-15
12278897 System and method for disk inspection utilizing disk cloning techniques Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA 2025-04-15
12271490 Unified inspection techniques based on abstracted compute type Yaniv Shaked, Ami Luttwak, Roy REZNIK, Moran Cohen 2025-04-08
12248581 Architecture of a multi-cloud inspector for any compute type Yaniv Shaked, Ami Luttwak, Gal KOZOSHNIK, Roy REZNIK 2025-03-11
12244634 Techniques for cybersecurity identity risk detection utilizing disk cloning and unified identity mapping Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Avihai Berkovitz +7 more 2025-03-04
12219048 Techniques for encrypted disk cybersecurity inspection utilizing disk cloning Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Yaniv Shaked +1 more 2025-02-04
12217079 Detecting security exceptions across multiple compute environments Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Raaz HERZBERG +3 more 2025-02-04
12212586 Techniques for cybersecurity inspection based on runtime data and static analysis from cloned resources Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Aviel FOGEL +2 more 2025-01-28
12189779 Detection of cyber threats embedded in cloud applications Roy REZNIK, Ami Luttwak, Guy Rozendorn 2025-01-07
12095912 System and method for encrypted disk inspection utilizing disk cloning techniques Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Yaniv Shaked +1 more 2024-09-17
12079328 Techniques for inspecting running virtualizations for cybersecurity risks Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Niv Roit BEN DAVID +3 more 2024-09-03
12061925 Techniques for inspecting managed workloads deployed in a cloud computing environment Niv Roit BEN DAVID, Yaniv Shaked, Raaz HERZBERG, Amir Lande Blau 2024-08-13
12028360 Techniques for multi-tenant vulnerability scanning utilizing sensitive data Ami Luttwak, Roy REZNIK, Avihai Berkovitz, Moran Cohen, Yaniv Shaked +1 more 2024-07-02
12003520 Techniques for multi-tenant vulnerability scanning Ami Luttwak, Roy REZNIK, Avihai Berkovitz, Moran Cohen, Yaniv Shaked +1 more 2024-06-04
11995193 Architecture of a multi-cloud inspector for any compute type Yaniv Shaked, Ami Luttwak, Gal KOZOSHNIK, Roy REZNIK 2024-05-28
11973770 Techniques for multi-tenant vulnerability scanning Ami Luttwak, Roy REZNIK, Avihai Berkovitz, Moran Cohen, Yaniv Shaked +1 more 2024-04-30
11936785 System and method for encrypted disk inspection utilizing disk cloning techniques Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Yaniv Shaked +1 more 2024-03-19
10536446 Single authentication to a multi-tenancy single-page cloud application Nir Mardiks 2020-01-14