loadpatents
name:-0.018218040466309
name:-0.37356996536255
name:-0.022603988647461
Ashkenazy; Adi Patent Filings

Ashkenazy; Adi

Patent Applications and Registrations

Patent applications and USPTO patent grants for Ashkenazy; Adi.The latest application filed is for "selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign".

Company Profile
20.15.18
  • Ashkenazy; Adi - Tel Aviv IL
  • Ashkenazy; Adi - Nes Ziona IL
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
Grant 11,206,282 - Gorodissky , et al. December 21, 2
2021-12-21
Selectively Choosing Between Actual-Attack and Simulation/Evaluation for Validating a Vulnerability of a Network Node During Execution of a Penetration Testing Campaign
App 20210226984 - GORODISSKY; Boaz ;   et al.
2021-07-22
Setting-up penetration testing campaigns
Grant 10,999,308 - Gorodissky , et al. May 4, 2
2021-05-04
Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
Grant 10,911,476 - Gorodissky , et al. February 2, 2
2021-02-02
Selectively Choosing Between Actual-Attack and Simulation/Evaluation for Validating a Vulnerability of a Network Node During Exe
App 20200236130 - GORODISSKY; Boaz ;   et al.
2020-07-23
Systems and methods for detecting computer vulnerabilities that are triggered by events
Grant 10,686,823 - Gorodissky , et al.
2020-06-16
Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
Grant 10,645,113 - Gorodissky , et al.
2020-05-05
Penetration testing of a networked system
Grant 10,637,882 - Gorodissky , et al.
2020-04-28
Selectively Choosing Between Actual-Attack and Simulation/Evaluation for Validating a Vulnerability of a Network Node During Exe
App 20200106800 - GORODISSKY; Boaz ;   et al.
2020-04-02
Time-tagged pre-defined scenarios for penetration testing
Grant 10,581,895 - Ashkenazy , et al.
2020-03-03
Time-Tagged Pre-Defined Scenarios for Penetration Testing
App 20190387015 - ASHKENAZY; Adi ;   et al.
2019-12-19
Setting-up penetration testing campaigns
Grant 10,505,969 - Gorodissky , et al. Dec
2019-12-10
Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
Grant 10,454,966 - Gorodissky , et al. Oc
2019-10-22
Time-tagged pre-defined scenarios for penetration testing
Grant 10,412,112 - Ashkenazy , et al. Sept
2019-09-10
Selectively Choosing Between Actual-Attack and Simulation/Evaluation for Validating a Vulnerability of a Network Node During Exe
App 20190268369 - GORODISSKY; Boaz ;   et al.
2019-08-29
Systems and methods for determining optimal remediation recommendations in penetration testing
Grant 10,382,473 - Ashkenazy , et al. A
2019-08-13
Penetration Testing Of A Networked System
App 20190245883 - GORODISSKY; Boaz ;   et al.
2019-08-08
Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
Grant 10,367,846 - Gorodissky , et al. July 30, 2
2019-07-30
Selectively Choosing Between Actual-Attack and Simulation/Evaluation for Validating a Vulnerability of a Network Node During Exe
App 20190149572 - GORODISSKY; Boaz ;   et al.
2019-05-16
Verifying success of compromising a network node during penetration testing of a networked system
Grant 10,257,220 - Gorodissky , et al.
2019-04-09
Time-Tagged Pre-Defined Scenarios for Penetration Testing
App 20190068631 - ASHKENAZY; Adi ;   et al.
2019-02-28
Setting-up Penetration Testing Campaigns
App 20190036961 - GORODISSKY; Boaz ;   et al.
2019-01-31
Setting-up penetration testing campaigns
Grant 10,122,750 - Gorodissky , et al. November 6, 2
2018-11-06
Verifying Success Of Compromising A Network Node During Penetration Testing Of A Networked System
App 20180270268 - GORODISSKY; Boaz ;   et al.
2018-09-20
Systems And Methods For Detecting Computer Vulnerabilities That Are Triggered By Events
App 20180219909 - GORODISSKY; Boaz ;   et al.
2018-08-02
Setting-up Penetration Testing Campaigns
App 20180219901 - GORODISSKY; Boaz ;   et al.
2018-08-02
Penetration Testing of a Networked System
App 20180219904 - GORODISSKY; Boaz ;   et al.
2018-08-02
Penetration Testing of a Networked System
App 20180219905 - GORODISSKY; Boaz ;   et al.
2018-08-02
Setting-up Penetration Testing Campaigns
App 20180219900 - GORODISSKY; Boaz ;   et al.
2018-08-02
Penetration testing of a networked system
Grant 10,038,711 - Gorodissky , et al. July 31, 2
2018-07-31
Technological Platform For Gaming
App 20110151971 - Altshuler; Yaniv ;   et al.
2011-06-23
Reliable, Efficient And Low Cost Method For Games Audio Rendering
App 20100197401 - Altshuler; Yaniv ;   et al.
2010-08-05
System And Method For A Gaming Community
App 20100035689 - Altshuler; Yaniv ;   et al.
2010-02-11

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed