Issued Patents All Time
Showing 1–20 of 20 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12361140 | Architecture of a multi-cloud inspector for any compute type | Yaniv Shaked, Ami Luttwak, Gal KOZOSHNIK, Roy REZNIK | 2025-07-15 |
| 12287899 | Techniques for detecting sensitive data in cloud computing environments utilizing cloning | Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Ami Luttwak, Moran Cohen +4 more | 2025-04-29 |
| 12277216 | Techniques for improved virtual instance inspection utilizing disk cloning | Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA | 2025-04-15 |
| 12278897 | System and method for disk inspection utilizing disk cloning techniques | Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA | 2025-04-15 |
| 12271490 | Unified inspection techniques based on abstracted compute type | Yaniv Shaked, Ami Luttwak, Roy REZNIK, Moran Cohen | 2025-04-08 |
| 12248581 | Architecture of a multi-cloud inspector for any compute type | Yaniv Shaked, Ami Luttwak, Gal KOZOSHNIK, Roy REZNIK | 2025-03-11 |
| 12244634 | Techniques for cybersecurity identity risk detection utilizing disk cloning and unified identity mapping | Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Avihai Berkovitz +7 more | 2025-03-04 |
| 12219048 | Techniques for encrypted disk cybersecurity inspection utilizing disk cloning | Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Yaniv Shaked +1 more | 2025-02-04 |
| 12217079 | Detecting security exceptions across multiple compute environments | Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Raaz HERZBERG +3 more | 2025-02-04 |
| 12212586 | Techniques for cybersecurity inspection based on runtime data and static analysis from cloned resources | Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Aviel FOGEL +2 more | 2025-01-28 |
| 12189779 | Detection of cyber threats embedded in cloud applications | Roy REZNIK, Ami Luttwak, Guy Rozendorn | 2025-01-07 |
| 12095912 | System and method for encrypted disk inspection utilizing disk cloning techniques | Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Yaniv Shaked +1 more | 2024-09-17 |
| 12079328 | Techniques for inspecting running virtualizations for cybersecurity risks | Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Niv Roit BEN DAVID +3 more | 2024-09-03 |
| 12061925 | Techniques for inspecting managed workloads deployed in a cloud computing environment | Niv Roit BEN DAVID, Yaniv Shaked, Raaz HERZBERG, Amir Lande Blau | 2024-08-13 |
| 12028360 | Techniques for multi-tenant vulnerability scanning utilizing sensitive data | Ami Luttwak, Roy REZNIK, Avihai Berkovitz, Moran Cohen, Yaniv Shaked +1 more | 2024-07-02 |
| 12003520 | Techniques for multi-tenant vulnerability scanning | Ami Luttwak, Roy REZNIK, Avihai Berkovitz, Moran Cohen, Yaniv Shaked +1 more | 2024-06-04 |
| 11995193 | Architecture of a multi-cloud inspector for any compute type | Yaniv Shaked, Ami Luttwak, Gal KOZOSHNIK, Roy REZNIK | 2024-05-28 |
| 11973770 | Techniques for multi-tenant vulnerability scanning | Ami Luttwak, Roy REZNIK, Avihai Berkovitz, Moran Cohen, Yaniv Shaked +1 more | 2024-04-30 |
| 11936785 | System and method for encrypted disk inspection utilizing disk cloning techniques | Daniel Hershko SHEMESH, Roy REZNIK, Ami Luttwak, Yinon COSTICA, Yaniv Shaked +1 more | 2024-03-19 |
| 10536446 | Single authentication to a multi-tenancy single-page cloud application | Nir Mardiks | 2020-01-14 |