Issued Patents All Time
Showing 1–25 of 29 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11582256 | Determining multiple ways for compromising a network node in a penetration testing campaign | Yarden Moskovich, Boaz Gorodissky | 2023-02-14 |
| 11400289 | Apparatus and methods for predicting therapy outcome | Uri Alyagon, Abraham Zangen, Gaby Pell, Yiftach Roth, Amir Geva +4 more | 2022-08-02 |
| 11283827 | Lateral movement strategy during penetration testing of a networked system | Yaron Shani | 2022-03-22 |
| 11206282 | Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign | Boaz Gorodissky, Adi Ashkenazy, Menahem Lasser | 2021-12-21 |
| 11206281 | Validating the use of user credentials in a penetration testing campaign | Yaron Shani, Igal Gofman | 2021-12-21 |
| 10999308 | Setting-up penetration testing campaigns | Boaz Gorodissky, Adi Ashkenazy | 2021-05-04 |
| 10911476 | Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign | Boaz Gorodissky, Adi Ashkenazy, Menahem Lasser | 2021-02-02 |
| 10686822 | Systems and methods for selecting a lateral movement strategy for a penetration testing campaign | — | 2020-06-16 |
| 10686823 | Systems and methods for detecting computer vulnerabilities that are triggered by events | Boaz Gorodissky, Adi Ashkenazy | 2020-06-16 |
| 10652269 | Using information about exportable data in penetration testing | Menahem Lasser | 2020-05-12 |
| 10645113 | Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign | Boaz Gorodissky, Adi Ashkenazy, Menahem Lasser | 2020-05-05 |
| 10637882 | Penetration testing of a networked system | Boaz Gorodissky, Adi Ashkenazy | 2020-04-28 |
| 10637883 | Systems and methods for determining optimal remediation recommendations in penetration testing | Menahem Lasser | 2020-04-28 |
| 10581895 | Time-tagged pre-defined scenarios for penetration testing | Adi Ashkenazy, Menahem Lasser | 2020-03-03 |
| 10574684 | Locally detecting phishing weakness | Menahem Lasser | 2020-02-25 |
| 10534917 | Testing for risk of macro vulnerability | — | 2020-01-14 |
| 10505969 | Setting-up penetration testing campaigns | Boaz Gorodissky, Adi Ashkenazy | 2019-12-10 |
| 10469521 | Using information about exportable data in penetration testing | Menahem Lasser | 2019-11-05 |
| 10462177 | Taking privilege escalation into account in penetration testing campaigns | Menahem Lasser | 2019-10-29 |
| 10454966 | Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign | Boaz Gorodissky, Adi Ashkenazy, Menahem Lasser | 2019-10-22 |
| 10412112 | Time-tagged pre-defined scenarios for penetration testing | Adi Ashkenazy, Menahem Lasser | 2019-09-10 |
| 10367846 | Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign | Boaz Gorodissky, Adi Ashkenazy, Menahem Lasser | 2019-07-30 |
| 10257220 | Verifying success of compromising a network node during penetration testing of a networked system | Boaz Gorodissky, Adi Ashkenazy | 2019-04-09 |
| 10122750 | Setting-up penetration testing campaigns | Boaz Gorodissky, Adi Ashkenazy | 2018-11-06 |
| 10068095 | Systems and methods for selecting a termination rule for a penetration testing campaign | Menahem Lasser | 2018-09-04 |