85 patents
Utility
Visibility and Scanning of a Variety of Entities
18 Jan 24
Systems, methods, and related technologies for entity visibility are described.
Anderson Lam, Sharad Singh, Mihael Sudakovitch
Filed: 28 Sep 23
Utility
Sub-networks Based Security Method, Apparatus and Product
11 Jan 24
A method, apparatus and product for sub-networks based cyber security.
Shmulik Bachar, Yossi Atias
Filed: 21 Sep 23
Utility
Device Classification
11 Jan 24
Systems, methods, and related technologies for device classification are described.
Yang Zhang, Siyang Yang
Filed: 21 Sep 23
Utility
Configurable Network Traffic Parser
4 Jan 24
Systems, methods, and related technologies for parsing network traffic are described.
Samuel Groot
Filed: 13 Sep 23
Utility
Generating Network System Maps Based on Network Traffic
28 Dec 23
Systems, methods, and related technologies for generating a network system map based on network traffic and possibly additional data are described.
Oren Nechushtan, Oded Comay
Filed: 11 Sep 23
Utility
Framework for Investigating Events
28 Dec 23
A method includes accessing events associated with a network and determining an issue based on a correlation of a portion of the events, wherein the issue represents an incident associated with the portion of the events, and wherein the correlation of the portion of the events is based on information associated with the network and at least in part on an event type of the portion of the events.
Daniel Ricardo dos Santos, Elisa Costante, Mario Dagrada, Alessandro Manzi
Filed: 1 Sep 23
Utility
Iterative Development of Protocol Parsers
7 Dec 23
Systems, methods, and related technologies for determining fields of an unknown protocol are described.
Daniel Ricardo dos Santos, Elisa Costante
Filed: 17 Aug 23
Utility
Automatic Generation of Attack Patterns for Threat Detection
16 Nov 23
Systems and methods for automatic attack pattern generation from cyber threat intelligence are described.
Elisa Costante, Daniel Ricardo dos Santos, Cristoffer Leite da Silva
Filed: 30 Nov 22
Utility
Text Classification Based Device Profiling
5 Oct 23
Systems and methods for generating an entity classification model using text classification of raw text information of entities are described.
Yi Zhang, Xiaoming Zhou, Zhiruo Cao
Filed: 30 Dec 22
Utility
Network Access Control from Anywhere
5 Oct 23
Systems, methods, and related technologies for managing network access control from anywhere are described.
Erick Ingleby
Filed: 30 Dec 22
Utility
Decision Optimization Mechanism for Device Classification
5 Oct 23
Systems, methods, and related technologies relate to obtaining a first classification of a device on a network from a first source, obtaining a second classification of the device on the network from a second source wherein the first classification and the second classification are different, and determining a classification result of the device based on selecting at least one of the first classification or the second classification.
Itai Koren, Nadav Gothait, Michael Oks, Shay Shemer
Filed: 7 Dec 22
Utility
Proactive Inspection Technique for Improved Classification
5 Oct 23
Systems, methods, and related technologies for a proactive inspection system for improved classification of devices are described.
Naor Kalbo
Filed: 17 Nov 22
Utility
Risk Driven Planning and Simulation for a Computer Network
5 Oct 23
Systems, methods, and related technologies for a risk driven planning and simulation tool for a computer network are described.
Eli Fainberg, Yafit Maor
Filed: 1 Apr 22
Utility
Assessing Entity Risk Based on Exposed Services
5 Oct 23
Systems and methods for determining a risk associated with an entity based on exposed services are described.
Naor Kalbo
Filed: 23 Nov 22
Utility
Enhanced Device Classification Including Crowdsourced Classifications for Increased Accuracy
5 Oct 23
Systems, methods, and related technologies for classifying a device on a network are described.
Erick Ingleby, Nirmal F. Rajarathnam
Filed: 30 Dec 22
Utility
Matching Common Vulnerabilities and Exposures
5 Oct 23
Systems and methods for identifying common vulnerabilities and exposures (CVEs) associated with an entity are described.
Maxim Bakman, Julia Ballos Shefi
Filed: 30 Sep 22
Utility
Agentless Network Traffic Mapping
28 Sep 23
Systems, methods, and related technologies for generating a network traffic map based on network traffic information and additional data are described.
Eli Fainberg
Filed: 25 Apr 23
Utility
Multiple Granularity Classification
14 Sep 23
Systems, methods, and related technologies for classification are described.
Yuzhou Song, Arun Raghuramu, Yang Zhang
Filed: 17 May 23
Utility
Device Classification Using Machine Learning Models
7 Sep 23
Systems, methods, and related technologies for classification are described.
Itai Koren, Zvika Plotkin
Filed: 4 May 23
Utility
Increasing Data Availability
31 Aug 23
Systems, methods, and related technologies for increasing data availability.
Arun Raghuramu, Aveek Kumar Das, Yang Zhang
Filed: 2 May 23