Issued Patents All Time
Showing 1–25 of 46 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12380223 | Techniques for risk and constraint-based inspection | Ami Luttwak, Yaniv Shaked, Shahar Rand, Eric Abramov, Elad Gabay | 2025-08-05 |
| 12375499 | System and method for detecting lateral movement using SSH private keys | Avi Tal LICHTENSTEIN, Ami Luttwak | 2025-07-29 |
| 12341803 | Technique and method for detection and display of the cybersecurity risk context of a cloud environment | Tomer Gil Levi, Ben Grynhaus, Itai Yosephi, Oron Noah, Eyal Wiener | 2025-06-24 |
| 12333010 | System and method for generating a partitioned view of a security graph in a cloud computing environment | Avihai Berkovitz, Raaz HERZBERG, Ami Luttwak, Roy REZNIK, Shai Keren | 2025-06-17 |
| 12287899 | Techniques for detecting sensitive data in cloud computing environments utilizing cloning | Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Ami Luttwak, Moran Cohen +4 more | 2025-04-29 |
| 12278897 | System and method for disk inspection utilizing disk cloning techniques | Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak | 2025-04-15 |
| 12278825 | System and method for cybersecurity threat detection utilizing static and runtime data | Aviel FOGEL, Udi REITBLAT, Alon SCHINDEL, Ami Luttwak, Roy REZNIK | 2025-04-15 |
| 12277532 | System and method for agentless application inventory detection | Mattan SHALEV, Yaniv Shaked, Gal KOZOSHNIK, Omri Kornblau, Roy REZNIK +1 more | 2025-04-15 |
| 12277216 | Techniques for improved virtual instance inspection utilizing disk cloning | Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak | 2025-04-15 |
| 12273359 | Lateral movement analysis using certificate private keys | Avi Tal LICHTENSTEIN, Ami Luttwak | 2025-04-08 |
| 12273357 | System and method for detecting lateral movement using SSH private keys | Avi Tal LICHTENSTEIN, Ami Luttwak | 2025-04-08 |
| 12271485 | Detecting vulnerabilities in virtual instances in a cloud environment utilizing infrastructure as code | Roy REZNIK, Osher HAZAN, Raaz HERZBERG | 2025-04-08 |
| 12250230 | Lateral movement analysis using certificate private keys | Avi Tal LICHTENSTEIN, Ami Luttwak | 2025-03-11 |
| 12248909 | System and method for agentless application inventory detection | Mattan SHALEV, Yaniv Shaked, Gal KOZOSHNIK, Omri Kornblau, Roy REZNIK +1 more | 2025-03-11 |
| 12244634 | Techniques for cybersecurity identity risk detection utilizing disk cloning and unified identity mapping | Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Avihai Berkovitz +7 more | 2025-03-04 |
| 12231459 | Technique and method for detection and display of the cybersecurity risk context of a cloud environment | Tomer Gil Levi, Ben Grynhaus, Itai Yosephi, Oron Noah, Eyal Wiener | 2025-02-18 |
| 12217079 | Detecting security exceptions across multiple compute environments | Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Raaz HERZBERG +3 more | 2025-02-04 |
| 12219048 | Techniques for encrypted disk cybersecurity inspection utilizing disk cloning | Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Yaniv Shaked +1 more | 2025-02-04 |
| 12212586 | Techniques for cybersecurity inspection based on runtime data and static analysis from cloned resources | Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Aviel FOGEL +2 more | 2025-01-28 |
| 12182172 | System and method for agentless detection of sensitive data on managed databases | Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Ami Luttwak, Moran Cohen +2 more | 2024-12-31 |
| 12175428 | System and method for agentless application inventory detection | Mattan SHALEV, Yaniv Shaked, Gal KOZOSHNIK, Omri Kornblau, Roy REZNIK +1 more | 2024-12-24 |
| 12177184 | Techniques for cybersecurity risk-based firewall configuration | Lidor Gonshorowitz, Oron Noah, Ami Luttwak, Roy REZNIK | 2024-12-24 |
| 12164963 | Techniques for detecting AI pipelines in cloud computing environments | Ami Luttwak, Alon SCHINDEL, Amitai Cohen, Roy REZNIK, Mattan SHALEV | 2024-12-10 |
| 12141291 | Secured systems development lifecycle of software applications | Assaf RAPPAPORT, Ami Luttwak, Roy REZNIK | 2024-11-12 |
| 12095777 | System and method for detecting lateral movement using SSH private keys | Avi Tal LICHTENSTEIN, Ami Luttwak | 2024-09-17 |