58 patents
Page 3 of 3
Utility
Query usage based organization for very large databases
8 Jun 21
A query server identifies data collections of interest in a cloud store, and categorizes the collections based on an intended usage.
Ron Ben-Natan
Filed: 7 Mar 17
Utility
Detecting behavioral anomalies in user-data access logs
1 Jun 21
A method for detecting anomalies in audit logs of database operations performed on databases.
Itsik Mantin, Craig Burlingame, Brian Anderson, Kunal Anand, Ran Rosin, Peter Klimek, Joseph Moore
Filed: 3 Apr 20
Utility
Selective database logging with smart sampling
1 Jun 21
A method by a security analysis server to generate a traffic monitoring rule.
Ehud Eshet, Ophir Bleiberg
Filed: 13 Dec 18
Utility
Continuous database security and compliance
11 May 21
A method by a security system for selectively triggering different ones of a plurality of database assessment scans for a database and detecting when non-compliant database configurations of the database are being used.
Avidan Reich, Amichai Shulman, Michael Cherny
Filed: 30 Sep 20
Utility
High volume message classification and distribution
23 Mar 21
A log message classifier employs machine learning for identifying a corresponding parser for interpreting the incoming log message and for retraining a classification logic model processing the incoming log messages.
Ron Ben-Natan, Derek Difilippo, Uri Hershenhorn, Roman Krashanitsa, Luigi Labigalini, Ury Segal
Filed: 19 Dec 18
Utility
Enrichment of database logs
9 Feb 21
A method by a network device for providing contextual information for database logs.
Gabriel Beyo, Assaf Cohen, Eytan Naim
Filed: 3 Apr 20
Utility
Data leakage prevention over application programming interface
9 Feb 21
A method by a network device for generating audit logs.
Itsik Mantin, Avidan Reich
Filed: 24 Mar 20
Utility
Techniques for targeted botnet protection
2 Feb 21
A botnet identification module identifies members of one or more botnets based upon network traffic destined to one or more servers over time, and provides sets of botnet sources to a traffic monitoring module.
Nitzan Niv, Amichai Shulman
Filed: 24 Feb 17
Utility
Detection of malicious attempts to access a decoy database object based on connection type
9 Nov 20
A method by a security system for detecting malicious attempts to access a decoy database object in a database.
Elad Erez, Amichai Shulman
Filed: 15 Mar 18
Utility
Continuous database security and compliance
2 Nov 20
A method implemented by a security system for selectively triggering different ones of a plurality of database assessment scans for a database The method includes monitoring for occurrences of a first class of database operations that have been determined to require only rerunning subsets of the plurality of database assessment scans to determine whether results of the plurality of database assessment scan shave changed, responsive to detecting an occurrence of one or more database operations of the first class, selecting one or more of the subsets to be rerun based on which of the database operations of the first class occurred, and triggering performance of only the selected one or more of the subsets to determine whether the results of the plurality of database assessment scans have changed.
Avidan Reich, Amichai Shulman, Michael Cherny
Filed: 21 Aug 18
Utility
Detecting attacks on databases based on transaction characteristics determined from analyzing database logs
12 Oct 20
A method by a security system implemented by one or more electronic for detecting attacks on one or more databases.
Shiri Margel, Itsik Mantin, Guy Shtar, Yury Geiler
Filed: 30 May 18
Utility
Techniques for detecting enterprise intrusions utilizing active tokens
12 Oct 20
A Token Transmission Server transmits active tokens within an enterprise network.
Amichai Shulman, Sagie Dulce
Filed: 7 Aug 17
Utility
Single page application content injection
21 Sep 20
A method by a web application layer proxy communicatively coupled between a web application client and a web application server for injecting content into a web page provided by the web application server.
Idan Kedar, Ron Masas, Siva Vadivel
Filed: 27 May 19
Utility
Insider threat detection utilizing user group data object access analysis
7 Sep 20
Techniques for detecting suspicious file access requests indicative of potential insider threats are described.
Guy Shtar, Shiri Margel
Filed: 9 Aug 17
Utility
Techniques for botnet detection and member identification
1 Jun 20
A botnet identification module identifies members of one or more botnets based upon network traffic destined to one or more servers over time, and provides sets of botnet sources to a traffic monitoring module.
Nitzan Niv
Filed: 23 Feb 17
Utility
Infrastructure distributed denial of service (DDoS) protection
24 Feb 20
A method of providing infrastructure protection for a network that includes IP addresses as low as a single IP address.
Dvir Shapira, Ehud Cohen, Tomer Bronshtein, Eyal Leshem, Alon Ludmer
Filed: 19 Jun 17
Utility
Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens
17 Feb 20
A token tunnel server (TTS) within an enterprise network receives packets from a source address directed to a destination address (both of the enterprise network) that were caused to be originated by an attacker.
Amichai Shulman, Sagie Dulce, Daniella Goihman-Shuster, Shahar Ben-Hador
Filed: 19 Jun 16
Utility
Techniques for detecting compromises of enterprise end stations utilizing noisy tokens
4 Nov 19
Noisy tokens can be placed in locations of client end stations such that local operations performed upon the noisy tokens generate network traffic.
Amichai Shulman, Sagie Dulce
Filed: 6 Nov 16