| 12361140 |
Architecture of a multi-cloud inspector for any compute type |
Yaniv Shaked, Ami Luttwak, Gal KOZOSHNIK, Roy REZNIK |
2025-07-15 |
| 12287899 |
Techniques for detecting sensitive data in cloud computing environments utilizing cloning |
Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Ami Luttwak, Moran Cohen +4 more |
2025-04-29 |
| 12277216 |
Techniques for improved virtual instance inspection utilizing disk cloning |
Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA |
2025-04-15 |
| 12278897 |
System and method for disk inspection utilizing disk cloning techniques |
Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA |
2025-04-15 |
| 12271490 |
Unified inspection techniques based on abstracted compute type |
Yaniv Shaked, Ami Luttwak, Roy REZNIK, Moran Cohen |
2025-04-08 |
| 12248581 |
Architecture of a multi-cloud inspector for any compute type |
Yaniv Shaked, Ami Luttwak, Gal KOZOSHNIK, Roy REZNIK |
2025-03-11 |
| 12244634 |
Techniques for cybersecurity identity risk detection utilizing disk cloning and unified identity mapping |
Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Avihai Berkovitz +7 more |
2025-03-04 |
| 12219048 |
Techniques for encrypted disk cybersecurity inspection utilizing disk cloning |
Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Yaniv Shaked +1 more |
2025-02-04 |
| 12217079 |
Detecting security exceptions across multiple compute environments |
Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Raaz HERZBERG +3 more |
2025-02-04 |
| 12212586 |
Techniques for cybersecurity inspection based on runtime data and static analysis from cloned resources |
Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Aviel FOGEL +2 more |
2025-01-28 |
| 12189779 |
Detection of cyber threats embedded in cloud applications |
Roy REZNIK, Ami Luttwak, Guy Rozendorn |
2025-01-07 |
| 12095912 |
System and method for encrypted disk inspection utilizing disk cloning techniques |
Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Yaniv Shaked +1 more |
2024-09-17 |
| 12079328 |
Techniques for inspecting running virtualizations for cybersecurity risks |
Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Niv Roit BEN DAVID +3 more |
2024-09-03 |
| 12061925 |
Techniques for inspecting managed workloads deployed in a cloud computing environment |
Niv Roit BEN DAVID, Yaniv Shaked, Raaz HERZBERG, Amir Lande Blau |
2024-08-13 |
| 12028360 |
Techniques for multi-tenant vulnerability scanning utilizing sensitive data |
Ami Luttwak, Roy REZNIK, Avihai Berkovitz, Moran Cohen, Yaniv Shaked +1 more |
2024-07-02 |
| 12003520 |
Techniques for multi-tenant vulnerability scanning |
Ami Luttwak, Roy REZNIK, Avihai Berkovitz, Moran Cohen, Yaniv Shaked +1 more |
2024-06-04 |
| 11995193 |
Architecture of a multi-cloud inspector for any compute type |
Yaniv Shaked, Ami Luttwak, Gal KOZOSHNIK, Roy REZNIK |
2024-05-28 |
| 11973770 |
Techniques for multi-tenant vulnerability scanning |
Ami Luttwak, Roy REZNIK, Avihai Berkovitz, Moran Cohen, Yaniv Shaked +1 more |
2024-04-30 |
| 11936785 |
System and method for encrypted disk inspection utilizing disk cloning techniques |
Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Yaniv Shaked +1 more |
2024-03-19 |
| 10536446 |
Single authentication to a multi-tenancy single-page cloud application |
Nir Mardiks |
2020-01-14 |