122 patents
Page 5 of 7
Utility
Detecting behavioral anomalies in user-data access logs
1 Jun 21
A method for detecting anomalies in audit logs of database operations performed on databases.
Itsik Mantin, Craig Burlingame, Brian Anderson, Kunal Anand, Ran Rosin, Peter Klimek, Joseph Moore
Filed: 3 Apr 20
Utility
Selective database logging with smart sampling
1 Jun 21
A method by a security analysis server to generate a traffic monitoring rule.
Ehud Eshet, Ophir Bleiberg
Filed: 13 Dec 18
Utility
Continuous database security and compliance
11 May 21
A method by a security system for selectively triggering different ones of a plurality of database assessment scans for a database and detecting when non-compliant database configurations of the database are being used.
Avidan Reich, Amichai Shulman, Michael Cherny
Filed: 30 Sep 20
Utility
Techniques for Targeted Botnet Protection
25 Mar 21
A botnet identification module identifies members of one or more botnets based upon network traffic destined to one or more servers over time, and provides sets of botnet sources to a traffic monitoring module.
Nitzan NIV, Amichai SHULMAN
Filed: 8 Dec 20
Utility
High volume message classification and distribution
23 Mar 21
A log message classifier employs machine learning for identifying a corresponding parser for interpreting the incoming log message and for retraining a classification logic model processing the incoming log messages.
Ron Ben-Natan, Derek Difilippo, Uri Hershenhorn, Roman Krashanitsa, Luigi Labigalini, Ury Segal
Filed: 19 Dec 18
Utility
Dynamic Aggregation of Information Based on Web Application Layer Requests
4 Mar 21
A method by a web application layer proxy for dynamically creating counters during runtime based on actual web application layer requests received by the web application layer proxy.
David LEVY NAHUM
Filed: 28 Aug 19
Utility
Enrichment of database logs
9 Feb 21
A method by a network device for providing contextual information for database logs.
Gabriel Beyo, Assaf Cohen, Eytan Naim
Filed: 3 Apr 20
Utility
Data leakage prevention over application programming interface
9 Feb 21
A method by a network device for generating audit logs.
Itsik Mantin, Avidan Reich
Filed: 24 Mar 20
Utility
Mechanism for Providing Obfuscated Code to Web Application Clients
4 Feb 21
A method by one or more network devices for providing obfuscated code to web application clients.
Itsik MANTIN
Filed: 1 Aug 19
Utility
Techniques for targeted botnet protection
2 Feb 21
A botnet identification module identifies members of one or more botnets based upon network traffic destined to one or more servers over time, and provides sets of botnet sources to a traffic monitoring module.
Nitzan Niv, Amichai Shulman
Filed: 24 Feb 17
Utility
Continuous Database Security and Compliance
14 Jan 21
A method by a security system for selectively triggering different ones of a plurality of database assessment scans for a database and detecting when non-compliant database configurations of the database are being used.
Avidan REICH, Amichai SHULMAN, Michael CHERNY
Filed: 30 Sep 20
Utility
Accelerating Dynamic Content Delivery In a Content Delivery Network
30 Dec 20
A technique for accelerating dynamic content delivery in a content delivery network.
David LEVY NAHUM
Filed: 26 Jun 19
Utility
Detecting Attacks on Databases Based on Transaction Characteristics Determined from Analyzing Database Logs
30 Dec 20
A method by a security system implemented by one or more electronic for detecting attacks on one or more databases.
Shiri MARGEL, Itsik MANTIN, Guy SHTAR, Yury GEILER
Filed: 9 Sep 20
Utility
Detection of malicious attempts to access a decoy database object based on connection type
9 Nov 20
A method by a security system for detecting malicious attempts to access a decoy database object in a database.
Elad Erez, Amichai Shulman
Filed: 15 Mar 18
Utility
Community-based Data Security
4 Nov 20
A method by one or more electronic devices implementing a system for providing community-based data security, where the system is communicatively coupled to a plurality of database security analyzers, where each of the plurality of database security analyzers is configured to analyze data accesses to one or more databases associated with that database security analyzer.
Doron TZUR, Shiri MARGEL, Itsik MANTIN
Filed: 29 Apr 19
Utility
Continuous database security and compliance
2 Nov 20
A method implemented by a security system for selectively triggering different ones of a plurality of database assessment scans for a database The method includes monitoring for occurrences of a first class of database operations that have been determined to require only rerunning subsets of the plurality of database assessment scans to determine whether results of the plurality of database assessment scan shave changed, responsive to detecting an occurrence of one or more database operations of the first class, selecting one or more of the subsets to be rerun based on which of the database operations of the first class occurred, and triggering performance of only the selected one or more of the subsets to determine whether the results of the plurality of database assessment scans have changed.
Avidan Reich, Amichai Shulman, Michael Cherny
Filed: 21 Aug 18
Utility
Detecting attacks on databases based on transaction characteristics determined from analyzing database logs
12 Oct 20
A method by a security system implemented by one or more electronic for detecting attacks on one or more databases.
Shiri Margel, Itsik Mantin, Guy Shtar, Yury Geiler
Filed: 30 May 18
Utility
Techniques for detecting enterprise intrusions utilizing active tokens
12 Oct 20
A Token Transmission Server transmits active tokens within an enterprise network.
Amichai Shulman, Sagie Dulce
Filed: 7 Aug 17
Utility
Single page application content injection
21 Sep 20
A method by a web application layer proxy communicatively coupled between a web application client and a web application server for injecting content into a web page provided by the web application server.
Idan Kedar, Ron Masas, Siva Vadivel
Filed: 27 May 19
Utility
Insider threat detection utilizing user group data object access analysis
7 Sep 20
Techniques for detecting suspicious file access requests indicative of potential insider threats are described.
Guy Shtar, Shiri Margel
Filed: 9 Aug 17