RS

Ronen Segal

XC Xm Cyber: 24 patents #1 of 10Top 10%
CO Comigo: 3 patents #4 of 10Top 40%
BA B.G. Negev Technologies And Applications: 1 patents #17 of 91Top 20%
BR Brainsway: 1 patents #10 of 19Top 55%
EL Elminda: 1 patents #14 of 20Top 70%
Overall (All Time): #129,976 of 4,157,543Top 4%
29
Patents All Time

Issued Patents All Time

Showing 1–25 of 29 patents

Patent #TitleCo-InventorsDate
11582256 Determining multiple ways for compromising a network node in a penetration testing campaign Yarden Moskovich, Boaz Gorodissky 2023-02-14
11400289 Apparatus and methods for predicting therapy outcome Uri Alyagon, Abraham Zangen, Gaby Pell, Yiftach Roth, Amir Geva +4 more 2022-08-02
11283827 Lateral movement strategy during penetration testing of a networked system Yaron Shani 2022-03-22
11206282 Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign Boaz Gorodissky, Adi Ashkenazy, Menahem Lasser 2021-12-21
11206281 Validating the use of user credentials in a penetration testing campaign Yaron Shani, Igal Gofman 2021-12-21
10999308 Setting-up penetration testing campaigns Boaz Gorodissky, Adi Ashkenazy 2021-05-04
10911476 Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign Boaz Gorodissky, Adi Ashkenazy, Menahem Lasser 2021-02-02
10686822 Systems and methods for selecting a lateral movement strategy for a penetration testing campaign 2020-06-16
10686823 Systems and methods for detecting computer vulnerabilities that are triggered by events Boaz Gorodissky, Adi Ashkenazy 2020-06-16
10652269 Using information about exportable data in penetration testing Menahem Lasser 2020-05-12
10645113 Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign Boaz Gorodissky, Adi Ashkenazy, Menahem Lasser 2020-05-05
10637882 Penetration testing of a networked system Boaz Gorodissky, Adi Ashkenazy 2020-04-28
10637883 Systems and methods for determining optimal remediation recommendations in penetration testing Menahem Lasser 2020-04-28
10581895 Time-tagged pre-defined scenarios for penetration testing Adi Ashkenazy, Menahem Lasser 2020-03-03
10574684 Locally detecting phishing weakness Menahem Lasser 2020-02-25
10534917 Testing for risk of macro vulnerability 2020-01-14
10505969 Setting-up penetration testing campaigns Boaz Gorodissky, Adi Ashkenazy 2019-12-10
10469521 Using information about exportable data in penetration testing Menahem Lasser 2019-11-05
10462177 Taking privilege escalation into account in penetration testing campaigns Menahem Lasser 2019-10-29
10454966 Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign Boaz Gorodissky, Adi Ashkenazy, Menahem Lasser 2019-10-22
10412112 Time-tagged pre-defined scenarios for penetration testing Adi Ashkenazy, Menahem Lasser 2019-09-10
10367846 Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign Boaz Gorodissky, Adi Ashkenazy, Menahem Lasser 2019-07-30
10257220 Verifying success of compromising a network node during penetration testing of a networked system Boaz Gorodissky, Adi Ashkenazy 2019-04-09
10122750 Setting-up penetration testing campaigns Boaz Gorodissky, Adi Ashkenazy 2018-11-06
10068095 Systems and methods for selecting a termination rule for a penetration testing campaign Menahem Lasser 2018-09-04