loadpatents
name:-0.01253604888916
name:-0.016172170639038
name:-0.020669937133789
Gorodissky; Boaz Patent Filings

Gorodissky; Boaz

Patent Applications and Registrations

Patent applications and USPTO patent grants for Gorodissky; Boaz.The latest application filed is for "determining multiple ways for compromising a network node in a penetration testing campaign".

Company Profile
15.12.14
  • Gorodissky; Boaz - Hod-Hasharon IL
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
Grant 11,206,282 - Gorodissky , et al. December 21, 2
2021-12-21
Determining Multiple Ways for Compromising a Network Node in a Penetration Testing Campaign
App 20210314341 - Moskovich; Yarden ;   et al.
2021-10-07
Selectively Choosing Between Actual-Attack and Simulation/Evaluation for Validating a Vulnerability of a Network Node During Execution of a Penetration Testing Campaign
App 20210226984 - GORODISSKY; Boaz ;   et al.
2021-07-22
Setting-up penetration testing campaigns
Grant 10,999,308 - Gorodissky , et al. May 4, 2
2021-05-04
Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
Grant 10,911,476 - Gorodissky , et al. February 2, 2
2021-02-02
Selectively Choosing Between Actual-Attack and Simulation/Evaluation for Validating a Vulnerability of a Network Node During Exe
App 20200236130 - GORODISSKY; Boaz ;   et al.
2020-07-23
Systems and methods for detecting computer vulnerabilities that are triggered by events
Grant 10,686,823 - Gorodissky , et al.
2020-06-16
Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
Grant 10,645,113 - Gorodissky , et al.
2020-05-05
Penetration testing of a networked system
Grant 10,637,882 - Gorodissky , et al.
2020-04-28
Selectively Choosing Between Actual-Attack and Simulation/Evaluation for Validating a Vulnerability of a Network Node During Exe
App 20200106800 - GORODISSKY; Boaz ;   et al.
2020-04-02
Setting-up penetration testing campaigns
Grant 10,505,969 - Gorodissky , et al. Dec
2019-12-10
Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
Grant 10,454,966 - Gorodissky , et al. Oc
2019-10-22
Selectively Choosing Between Actual-Attack and Simulation/Evaluation for Validating a Vulnerability of a Network Node During Exe
App 20190268369 - GORODISSKY; Boaz ;   et al.
2019-08-29
Penetration Testing Of A Networked System
App 20190245883 - GORODISSKY; Boaz ;   et al.
2019-08-08
Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
Grant 10,367,846 - Gorodissky , et al. July 30, 2
2019-07-30
Selectively Choosing Between Actual-Attack and Simulation/Evaluation for Validating a Vulnerability of a Network Node During Exe
App 20190149572 - GORODISSKY; Boaz ;   et al.
2019-05-16
Verifying success of compromising a network node during penetration testing of a networked system
Grant 10,257,220 - Gorodissky , et al.
2019-04-09
Setting-up Penetration Testing Campaigns
App 20190036961 - GORODISSKY; Boaz ;   et al.
2019-01-31
Setting-up penetration testing campaigns
Grant 10,122,750 - Gorodissky , et al. November 6, 2
2018-11-06
Verifying Success Of Compromising A Network Node During Penetration Testing Of A Networked System
App 20180270268 - GORODISSKY; Boaz ;   et al.
2018-09-20
Setting-up Penetration Testing Campaigns
App 20180219901 - GORODISSKY; Boaz ;   et al.
2018-08-02
Penetration Testing of a Networked System
App 20180219905 - GORODISSKY; Boaz ;   et al.
2018-08-02
Systems And Methods For Detecting Computer Vulnerabilities That Are Triggered By Events
App 20180219909 - GORODISSKY; Boaz ;   et al.
2018-08-02
Penetration Testing of a Networked System
App 20180219904 - GORODISSKY; Boaz ;   et al.
2018-08-02
Setting-up Penetration Testing Campaigns
App 20180219900 - GORODISSKY; Boaz ;   et al.
2018-08-02
Penetration testing of a networked system
Grant 10,038,711 - Gorodissky , et al. July 31, 2
2018-07-31

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed