YC

Yinon COSTICA

WI Wiz: 43 patents #3 of 96Top 4%
Microsoft: 3 patents #13,382 of 40,388Top 35%
Overall (All Time): #61,555 of 4,157,543Top 2%
46
Patents All Time

Issued Patents All Time

Showing 26–46 of 46 patents

Patent #TitleCo-InventorsDate
12093374 Cybersecurity incident response techniques utilizing artificial intelligence Alon SCHINDEL, Barak SHARONI, Amitai Cohen, Ami Luttwak, Roy REZNIK 2024-09-17
12093384 Techniques for improved inspection of container layers Yaniv Joseph Oliver, Ami Luttwak, Roy REZNIK, Yaniv Shaked, Amir Lande Blau 2024-09-17
12095776 Lateral movement analysis using certificate private keys Avi Tal LICHTENSTEIN, Ami Luttwak 2024-09-17
12095912 System and method for encrypted disk inspection utilizing disk cloning techniques Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Yaniv Shaked +1 more 2024-09-17
12079328 Techniques for inspecting running virtualizations for cybersecurity risks Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Niv Roit BEN DAVID +3 more 2024-09-03
12061719 System and method for agentless detection of sensitive data in computing environments Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Ami Luttwak, Moran Cohen +2 more 2024-08-13
12026144 Populating multi-layer technology product catalogs Gal KOZOSHNIK, Raaz HERZBERG, Yaniv Shaked, Daniel Klein, Ami Luttwak 2024-07-02
12001549 Cybersecurity incident response techniques utilizing artificial intelligence Alon SCHINDEL, Barak SHARONI, Amitai Cohen, Ami Luttwak, Roy REZNIK 2024-06-04
12001550 Cybersecurity incident response techniques utilizing artificial intelligence Alon SCHINDEL, Barak SHARONI, Amitai Cohen, Ami Luttwak, Roy REZNIK 2024-06-04
11973794 Technique and method for detection and display of the cybersecurity risk context of a cloud environment Tomer Gil Levi, Ben Grynhaus, Itai Yosephi, Oron Noah, Eyal Wiener 2024-04-30
11949690 System and method for detecting lateral movement using SSH private keys Avi Tal LICHTENSTEIN, Ami Luttwak 2024-04-02
11936785 System and method for encrypted disk inspection utilizing disk cloning techniques Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Ami Luttwak, Yaniv Shaked +1 more 2024-03-19
11936622 Techniques for cybersecurity risk-based firewall configuration Lidor Gonshorowitz, Oron Noah, Ami Luttwak, Roy REZNIK 2024-03-19
11916926 Lateral movement analysis using certificate private keys Avi Tal LICHTENSTEIN, Ami Luttwak 2024-02-27
11875306 System and method for agentless application inventory detection Mattan SHALEV, Yaniv Shaked, Gal KOZOSHNIK, Omri Kornblau, Roy REZNIK +1 more 2024-01-16
11841945 System and method for cybersecurity threat detection utilizing static and runtime data Aviel FOGEL, Udi REITBLAT, Alon SCHINDEL, Ami Luttwak, Roy REZNIK 2023-12-12
11811786 Lateral movement analysis using certificate private keys Avi Tal LICHTENSTEIN, Ami Luttwak 2023-11-07
11799874 System and method for detecting lateral movement using SSH private keys Avi Tal LICHTENSTEIN, Ami Luttwak 2023-10-24
10523676 Techniques for detecting unauthorized access to cloud applications based on velocity events Yonatan Most 2019-12-31
10084807 Detection of bypass vulnerabilities Yonatan Most 2018-09-25
10063554 Techniques for detecting unauthorized access to cloud applications based on velocity events Yonatan Most 2018-08-28