122 patents
Utility
Robust learning of web traffic
17 Oct 23
A method includes monitoring web traffic until a threshold of network traffic is collected.
Itsik Mantin
Filed: 31 Dec 20
Utility
System and method for policy control in databases
19 Sep 23
Embodiments of the present disclosure relate to generating a high level security policy for a data repository without knowledge of the access control, entitlement, and other models of the data repository.
Ron Ben-Natan, Gabriel Beyo, Rosa Miroshnikov, Ury Segal
Filed: 22 Feb 21
Utility
Procedural code generation for challenge code
5 Sep 23
Emil Hernvall, Daniel Spång
Filed: 30 Oct 20
Utility
Accelerating dynamic content delivery in a content delivery network
5 Sep 23
A technique for accelerating dynamic content delivery in a content delivery network.
David Levy Nahum
Filed: 20 Jan 22
Utility
Insider threat detection utilizing user group to data object and/or resource group access analysis
5 Sep 23
Techniques for detecting suspicious data object access requests indicative of potential insider threats are described.
Guy Shtar, Shiri Margel
Filed: 8 Sep 21
Utility
Streaming-friendly technology for detection of data
15 Aug 23
A method by a network device for detecting data in a data stream.
Itsik Mantin
Filed: 20 Jan 22
Utility
Monitoring and preventing outbound network connections in runtime applications
15 Aug 23
A runtime application self protection (RASP) plug-in logic monitors for, and prevents, outbound network connections that are initiated by server application logic and that are not intended by the application logic.
Kunal Anand, Richard Meester, Joseph Rozner, Martin Ryan
Filed: 17 Oct 19
Utility
Forced identification with automated post resubmission
1 Aug 23
A method by a web application layer proxy communicatively coupled between a client and an origin server for performing automated POST resubmission.
Daniel Spång
Filed: 8 Mar 22
Utility
Deploying a Program from Within an Active Cics Region
6 Jul 23
Embodiments of the present disclosure relate to systems and methods for installing a program within a CICS region without an antecedent program.
Scott Heronimus
Filed: 14 Dec 22
Utility
Client-side Firewall
6 Jul 23
A method by a service worker firewall middleware component is disclosed.
Ron MASAS
Filed: 30 Dec 21
Utility
Api User Tracking Via Token to Api Key Mapping
6 Jul 23
Embodiments of the present disclosure relate to tracking a user’s activity using a mapping of their API key to a token.
Jonathan Roy Azaria, Tzlelponit Itzhak, Matan Lion
Filed: 2 Dec 22
Utility
Method for generating a human likeness score
27 Jun 23
A method for determining whether a user is a human is disclosed.
Tyler James Paxton, Reid Michael Tatoris, Benjamin Trenda, Elvis Jakupovic, Steven P. Burkett, Adam Michael Janower
Filed: 23 Jun 22
Utility
Determining the Technical Maturity of a System User to Use As a Risk Indicator When Auditing System Activity
18 May 23
A method by one or more computing devices to detect anomalous accesses to a system.
James Arthur BURTOFT
Filed: 18 Nov 21
Utility
Attack Categorization Based on Machine Learning Feature Contribution
11 May 23
According to some embodiments of the disclosure, a method includes receiving an electronic communication directed to a data resource, determining, by a machine learning (ML) web application firewall (WAF), an attack probability of the electronic communication based on a plurality of features, wherein subsets of the plurality of features are arranged in a plurality of feature groups, adjusting the attack probability based on respective feature weights of the plurality of feature groups.
Ori Nakar, Nadav Avital, Aiah Lerner
Filed: 9 Nov 21
Utility
Securing Data Lakes Via Object Store Monitoring
11 May 23
Embodiments of the present disclosure provide a method for detecting security incidents in an object store by aggregating log files generated by a monitoring program of the object store and monitoring the aggregated log data.
Ori Nakar
Filed: 10 Nov 21
Utility
Continuous database security and compliance
9 May 23
A method by one or more electronic devices to notify an administrator when it is safe to mitigate a non-compliant database configuration of a database.
Avidan Reich, Amichai Shulman, Michael Cherny
Filed: 31 Mar 21
Utility
Enrichment of database logs
9 May 23
A method by a network device to enrich database logs.
Gabriel Beyo, Assaf Cohen, Eytan Naim
Filed: 10 Dec 20
Utility
Layer 7 Network Attack Detection Using Machine Learning Feature Contribution
4 May 23
Embodiments of the present disclosure relate to detecting new attack vectors in web application servers based on analyzing requests (e.g., HTTP/S requests) that were flagged as attacks by a machine learning web application firewall (ML WAF) but not by a rule-based WAF.
Ori Nakar, Jonathan Roy Azaria
Filed: 1 Nov 21
Utility
Waiting Room with Zero Latency
6 Apr 23
A method by one or more computing devices functioning as a ticket master for a website that has a virtual waiting room, wherein the ticket master is communicatively coupled to a plurality of proxies controlling access to the website.
Oren BREZNER, Nir GABAY, Ortal HASID, Shlomit ABERGEL
Filed: 6 Oct 21
Utility
Aggregating alerts of malicious events for computer security
7 Mar 23
A method by a computing device implementing an attack analyzer for processing malicious events.
Gilad Yehudai, Itsik Mantin, Lior Fisch, Shelly Hershkovitz, Amichai Shulman, Moran Rachel Ambar
Filed: 23 Nov 21