19 patents
Utility
Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking
16 Jan 24
Various embodiments described herein disclose an endpoint modeling and grouping management system that can collect data from endpoint computer devices in a network.
Tomer Weingarten, Almog Cohen
Filed: 21 Apr 22
Utility
Deceiving Attackers Accessing Network Data
4 Jan 24
Endpoints in a network execute a sensor module that intercepts commands.
Venu Vissamsetty, ANIL GUPTA, HARINATH VISHWANATH RAMCHETTY
Filed: 30 Jun 23
Utility
Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking
5 Dec 23
Various embodiments described herein disclose an endpoint modeling and grouping management system that can collect data from endpoint computer devices in a network.
Tomer Weingarten, Almog Cohen
Filed: 21 Apr 22
Utility
Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking
5 Dec 23
Various embodiments described herein disclose an endpoint modeling and grouping management system that can collect data from endpoint computer devices in a network.
Tomer Weingarten, Almog Cohen
Filed: 21 Apr 22
Utility
Deceiving Attackers Accessing Active Directory Data
30 Nov 23
Endpoints in a network execute a sensor module that intercepts commands.
Venu Vissamsetty, Anil Gupta, Harinath Vishwanath Ramchetty
Filed: 23 Feb 23
Utility
Systems and methods for executable code detection, automatic feature extraction and position independent code detection
17 Oct 23
Disclosed herein are systems and methods for enabling the automatic detection of executable code from a stream of bytes.
Shlomi Salem, Roy Ronen, Assaf Nativ, Amit Zohar, Gal Braun, Pavel Ferencz, Eitan Shterenbaum, Tal Maimon
Filed: 27 Dec 22
Utility
Method of Malware Detection and System Thereof
7 Sep 23
There is provided a system and a computer-implemented method of detecting malware in real time in a live environment.
Tomer Weingarten, Almog Cohen, Udi Shamir, Kirill Motil
Filed: 7 Mar 23
Utility
Systems, Methods, and Devices for Executable File Classification
7 Sep 23
Methods according to the embodiments herein may include generating, by a computer system using a decompiler, assembly code from a binary file.
Tal Maimon, Roy Ben Shlomo
Filed: 1 Mar 23
Utility
Deceiving Attackers Accessing Network Data
7 Sep 23
Endpoints in a network execute a sensor module that intercepts commands.
Venu Vissamsetty, Anil Gupta, Harinath Vishwanath Ramchetty
Filed: 13 Mar 23
Utility
Systems, methods and devices for device fingerprinting and automatic deployment of software in a computing network using a peer-to-peer approach
5 Sep 23
Disclosed herein are embodiments of methods, devices and systems for device fingerprinting and automatic and dynamic software deployment to one or more endpoints on a computer network.
Nir Montag, Ido Kotler, Matan Mates, Mike Vincent Petronaci, Gustavo Ringel, Caleb Joshua Fenton
Filed: 5 Jan 23
Utility
Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking
8 Aug 23
Various embodiments described herein disclose an endpoint modeling and grouping management system that can collect data from endpoint computer devices in a network.
Tomer Weingarten, Almog Cohen
Filed: 21 Apr 22
Utility
Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking
1 Aug 23
Various embodiments described herein disclose an endpoint modeling and grouping management system that can collect data from endpoint computer devices in a network.
Tomer Weingarten, Almog Cohen
Filed: 22 Feb 22
Utility
Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking
1 Aug 23
Various embodiments described herein disclose an endpoint modeling and grouping management system that can collect data from endpoint computer devices in a network.
Tomer Weingarten, Almog Cohen
Filed: 21 Apr 22
Utility
Systems and Methods for Data Management and Query Optimization
20 Jul 23
A central node can: receive a query comprising at least one parameter comprising a time range of a dataset stored in a cloud storage system; transmit one or more of the query parameters comprising the time range to a metadata service; receive from the metadata service a list of files related to the query; and assign to each processing node of a plurality of processing nodes a subset of the files.
Steve Newman
Filed: 13 Jan 23
Utility
Deceiving attackers accessing network data
4 Jul 23
Endpoints in a network execute a sensor module that intercepts commands.
Venu Vissamsetty, Anil Gupta, Harinath Vishwanath Ramchetty
Filed: 15 Apr 20
Utility
Systems, Methods and Devices for Device Fingerprinting and Automatic Deployment of Software In a Computing Network Using a Peer-to-peer Approach
18 May 23
Disclosed herein are embodiments of methods, devices and systems for device fingerprinting and automatic and dynamic software deployment to one or more endpoints on a computer network.
Nir Montag, Ido Kotler, Matan Mates, Mike Vincent Petronaci, Gustavo Ringel, Caleb Joshua Fenton
Filed: 5 Jan 23
Utility
CorrectedMethods, Systems, and Devices for Dynamically Modeling and Grouping Endpoints for Edge Networking
11 May 23
Various embodiments described herein disclose an endpoint modeling and grouping management system that can collect data from endpoint computer devices in a network.
Tomer Weingarten, Almog Cohen
Filed: 21 Apr 22
Utility
Systems and Methods for Executable Code Detection, Automatic Feature Extraction and Position Independent Code Detection
11 May 23
Disclosed herein are systems and methods for enabling the automatic detection of executable code from a stream of bytes.
Shlomi Salem, Roy Ronen, Assaf Nativ, Amit Zohar, Gal Braun, Pavel Ferencz, Eitan Shterenbaum, Tal Maimon
Filed: 27 Dec 22
Utility
Method of malware detection and system thereof
11 Apr 23
There is provided a system and a computer-implemented method of detecting malware in real time in a live environment.
Tomer Weingarten, Almog Cohen, Udi Shamir, Kirill Motil
Filed: 15 Apr 20
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first