58 patents
Utility
Robust learning of web traffic
17 Oct 23
A method includes monitoring web traffic until a threshold of network traffic is collected.
Itsik Mantin
Filed: 31 Dec 20
Utility
System and method for policy control in databases
19 Sep 23
Embodiments of the present disclosure relate to generating a high level security policy for a data repository without knowledge of the access control, entitlement, and other models of the data repository.
Ron Ben-Natan, Gabriel Beyo, Rosa Miroshnikov, Ury Segal
Filed: 22 Feb 21
Utility
Procedural code generation for challenge code
5 Sep 23
Emil Hernvall, Daniel Spång
Filed: 30 Oct 20
Utility
Insider threat detection utilizing user group to data object and/or resource group access analysis
5 Sep 23
Techniques for detecting suspicious data object access requests indicative of potential insider threats are described.
Guy Shtar, Shiri Margel
Filed: 8 Sep 21
Utility
Accelerating dynamic content delivery in a content delivery network
5 Sep 23
A technique for accelerating dynamic content delivery in a content delivery network.
David Levy Nahum
Filed: 20 Jan 22
Utility
Streaming-friendly technology for detection of data
15 Aug 23
A method by a network device for detecting data in a data stream.
Itsik Mantin
Filed: 20 Jan 22
Utility
Monitoring and preventing outbound network connections in runtime applications
15 Aug 23
A runtime application self protection (RASP) plug-in logic monitors for, and prevents, outbound network connections that are initiated by server application logic and that are not intended by the application logic.
Kunal Anand, Richard Meester, Joseph Rozner, Martin Ryan
Filed: 17 Oct 19
Utility
Forced identification with automated post resubmission
1 Aug 23
A method by a web application layer proxy communicatively coupled between a client and an origin server for performing automated POST resubmission.
Daniel Spång
Filed: 8 Mar 22
Utility
Method for generating a human likeness score
27 Jun 23
A method for determining whether a user is a human is disclosed.
Tyler James Paxton, Reid Michael Tatoris, Benjamin Trenda, Elvis Jakupovic, Steven P. Burkett, Adam Michael Janower
Filed: 23 Jun 22
Utility
Continuous database security and compliance
9 May 23
A method by one or more electronic devices to notify an administrator when it is safe to mitigate a non-compliant database configuration of a database.
Avidan Reich, Amichai Shulman, Michael Cherny
Filed: 31 Mar 21
Utility
Enrichment of database logs
9 May 23
A method by a network device to enrich database logs.
Gabriel Beyo, Assaf Cohen, Eytan Naim
Filed: 10 Dec 20
Utility
Aggregating alerts of malicious events for computer security
7 Mar 23
A method by a computing device implementing an attack analyzer for processing malicious events.
Gilad Yehudai, Itsik Mantin, Lior Fisch, Shelly Hershkovitz, Amichai Shulman, Moran Rachel Ambar
Filed: 23 Nov 21
Utility
Dynamic emotion detection based on user inputs
28 Feb 23
A method by a network device for dynamically detecting emotional states of a user operating a client end station to interact with an application.
Aiah Lerner, Jonathan R. Azaria, Matan Lion
Filed: 29 Dec 20
Utility
Detecting behavioral anomalies in user-data access logs
28 Feb 23
A method by one or more computing devices for detecting application user anomalies in audit logs of database operations performed on one or more databases.
Itsik Mantin, Craig Burlingame, Brian Anderson, Kunal Anand, Ran Rosin, Peter Klimek, Joseph Moore
Filed: 26 Apr 21
Utility
Dynamic invocation of partner product exit routine in an active information management system
14 Feb 23
A method in a mainframe computing system to invoke a partner product exit routine in an information management system while the information management system is in operation.
Scott Heronimus
Filed: 29 Dec 20
Utility
Detecting attacks on databases based on transaction characteristics determined from analyzing database logs
27 Dec 22
A method by a security system implemented by one or more electronic for detecting attacks on one or more databases.
Shiri Margel, Itsik Mantin, Guy Shtar, Yury Geiler
Filed: 10 Sep 20
Utility
Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens
20 Dec 22
A method in a cloud network to detect compromises within an enterprise network based on tokens tunneled outside of the enterprise network to the cloud network.
Amichai Shulman, Sagie Dulce, Daniella Goihman-Shuster, Shahar Ben-Hador
Filed: 30 Dec 19
Utility
Infrastructure distributed denial of service protection
20 Dec 22
A method of providing infrastructure protection for a network that includes IP addresses as low as a single IP address.
Dvir Shapira, Ehud Cohen, Tomer Bronshtein, Eyal Leshem, Alon Ludmer
Filed: 22 Jan 20
Utility
Predictive activation of security rules to protect web application servers against web application layer attacks
25 Oct 22
A method by a web application layer proxy for predictively activating security rules to protect one or more web application servers from attacks by one or more web application clients.
Itsik Mantin, Ori Or-Meir
Filed: 30 Dec 19
Utility
Identifying and classifying community attacks
11 Oct 22
A method by one or more electronic devices for identifying and classifying community attacks.
Shiri Margel, Amit Leibovitz
Filed: 30 Dec 19