Patent | Date |
---|
Automated Code Analysis Tool App 20220067170 - Bargury; Michael Zeev ;   et al. | 2022-03-03 |
Detecting attacks on web applications using server logs Grant 11,223,637 - Neuvirth , et al. January 11, 2 | 2022-01-11 |
Enterprise graph method of threat detection Grant 10,771,492 - Hudis , et al. Sep | 2020-09-08 |
Access control manager Grant 10,764,299 - Kliger , et al. Sep | 2020-09-01 |
Altering application security to support just-in-time access Grant 10,516,675 - Elyashar , et al. Dec | 2019-12-24 |
Detecting Attacks On Web Applications Using Server Logs App 20190215330 - NEUVIRTH; Hani Hana ;   et al. | 2019-07-11 |
Access Control Manager App 20190007415 - Kliger; Ben ;   et al. | 2019-01-03 |
Finding data in connected corpuses using examples Grant 10,140,366 - Platt , et al. Nov | 2018-11-27 |
Altering Application Security To Support Just-in-time Access App 20180205736 - ELYASHAR; Gilad Michael ;   et al. | 2018-07-19 |
Enterprise Graph Method Of Threat Detection App 20180084001 - Hudis; Efim ;   et al. | 2018-03-22 |
Malicious code infection cause-and-effect analysis Grant 9,910,981 - Hartrell , et al. March 6, 2 | 2018-03-06 |
Malicious code infection cause-and-effect analysis Grant 9,886,578 - Hartrell , et al. February 6, 2 | 2018-02-06 |
Automatic Recommendations For Deployments In A Data Center App 20170207980 - Hudis; Efim ;   et al. | 2017-07-20 |
Network intrusion detection with distributed correlation Grant 9,560,068 - Figlin , et al. January 31, 2 | 2017-01-31 |
Selecting candidate rows for deduplication Grant 9,547,664 - Zinar , et al. January 17, 2 | 2017-01-17 |
Controlling malicious activity detection using behavioral models Grant 9,536,087 - Rubin , et al. January 3, 2 | 2017-01-03 |
Domains for knowledge-based data quality solution Grant 9,519,862 - Malka , et al. December 13, 2 | 2016-12-13 |
Matrix factorization for automated malware detection Grant 9,398,034 - Ronen , et al. July 19, 2 | 2016-07-19 |
Lifestyle Recommendation System App 20160012512 - Haiby; Neta ;   et al. | 2016-01-14 |
Controlling Malicious Activity Detection Using Behavioral Models App 20150350230 - Rubin; Shai A. ;   et al. | 2015-12-03 |
Controlling malicious activity detection using behavioral models Grant 9,098,702 - Rubin , et al. August 4, 2 | 2015-08-04 |
Finding Data in Connected Corpuses Using Examples App 20150193533 - Platt; John C. ;   et al. | 2015-07-09 |
Matrix Factorization For Automated Malware Detection App 20150180890 - Ronen; Royi ;   et al. | 2015-06-25 |
Aggregating the knowledge base of computer systems to proactively protect a computer from malware Grant 9,043,869 - Thomas , et al. May 26, 2 | 2015-05-26 |
Malicious Code Infection Cause-and-effect Analysis App 20150101010 - Hartrell; Gregory D. ;   et al. | 2015-04-09 |
Comparing and selecting data cleansing service providers Grant 8,996,479 - Haiby , et al. March 31, 2 | 2015-03-31 |
Analytics engine Grant 8,990,947 - Hudis , et al. March 24, 2 | 2015-03-24 |
Finding data in connected corpuses using examples Grant 8,983,954 - Platt , et al. March 17, 2 | 2015-03-17 |
Enterprise security assessment sharing Grant 8,959,568 - Hudis , et al. February 17, 2 | 2015-02-17 |
Malicious code infection cause-and-effect analysis Grant 8,955,135 - Hartrell , et al. February 10, 2 | 2015-02-10 |
Malicious code infection cause-and-effect analysis Grant 8,955,134 - Hartrell , et al. February 10, 2 | 2015-02-10 |
Endpoint enabled for enterprise security assessment sharing Grant 8,955,105 - Hudis , et al. February 10, 2 | 2015-02-10 |
Malicious Code Infection Cause-and-effect Analysis App 20150013007 - Hartrell; Gregory D. ;   et al. | 2015-01-08 |
Domains For Knowledge-based Data Quality Solution App 20140379627 - Malka; Joseph ;   et al. | 2014-12-25 |
Enterprise security assessment sharing for consumers using globally distributed infrastructure Grant 8,910,268 - Hudis , et al. December 9, 2 | 2014-12-09 |
Enterprise security assessment sharing for off-premise users using globally distributed infrastructure Grant 8,881,223 - Hudis , et al. November 4, 2 | 2014-11-04 |
Distributive security investigation Grant 8,839,419 - Hudis , et al. September 16, 2 | 2014-09-16 |
Domains for knowledge-based data quality solution Grant 8,812,411 - Malka , et al. August 19, 2 | 2014-08-19 |
Selecting candidate rows for deduplication Grant 8,719,236 - Zinar , et al. May 6, 2 | 2014-05-06 |
Mapping between users and machines in an enterprise security assessment sharing system Grant 8,689,335 - Helman , et al. April 1, 2 | 2014-04-01 |
Detection of adversaries through collection and correlation of assessments Grant 8,677,479 - Neystadt , et al. March 18, 2 | 2014-03-18 |
Selecting Candidate Rows For Deduplication App 20140059015 - Zinar; Yaron ;   et al. | 2014-02-27 |
Aggregating The Knowledge Base Of Computer Systems To Proactively Protect A Computer From Malware App 20130332988 - Thomas; Anil Francis ;   et al. | 2013-12-12 |
Comparing And Selecting Data Cleansing Service Providers App 20130332427 - Haiby; Neta ;   et al. | 2013-12-12 |
Network Intrusion Detection With Distributed Correlation App 20130305371 - Figlin; Igal ;   et al. | 2013-11-14 |
Controlling Malicious Activity Detection Using Behavioral Models App 20130305374 - Rubin; Shai A. ;   et al. | 2013-11-14 |
Finding Data in Connected Corpuses Using Examples App 20130268531 - Platt; John C. ;   et al. | 2013-10-10 |
Brokered Exchange of Private Data App 20130268552 - Platt; John C. ;   et al. | 2013-10-10 |
Contextual gravitation of datasets and data services Grant 8,538,934 - Hudis , et al. September 17, 2 | 2013-09-17 |
Network intrusion detection with distributed correlation Grant 8,516,576 - Figlin , et al. August 20, 2 | 2013-08-20 |
Aggregating the knowledge base of computer systems to proactively protect a computer from malware Grant 8,516,583 - Thomas , et al. August 20, 2 | 2013-08-20 |
Comparing and selecting data cleansing service providers Grant 8,510,276 - Haiby , et al. August 13, 2 | 2013-08-13 |
Controlling malicious activity detection using behavioral models Grant 8,490,187 - Rubin , et al. July 16, 2 | 2013-07-16 |
Knowledge Based Parsing App 20130117012 - Orlin; Yifat ;   et al. | 2013-05-09 |
Domains For Knowledge-based Data Quality Solution App 20130117203 - Malka; Joseph ;   et al. | 2013-05-09 |
Architecture For Knowledge-based Data Quality Solution App 20130117219 - Malka; Joseph ;   et al. | 2013-05-09 |
Knowledge-based Data Quality Solution App 20130117202 - Malka; Joseph ;   et al. | 2013-05-09 |
Contextual Gravitation of Datasets and Data Services App 20130110792 - Hudis; Efim ;   et al. | 2013-05-02 |
Automated collection of forensic evidence associated with a network security incident Grant 8,424,094 - Neystadt , et al. April 16, 2 | 2013-04-16 |
Adaptive data collection for root-cause analysis and intrusion detection Grant 8,413,247 - Hudis , et al. April 2, 2 | 2013-04-02 |
Services using globally distributed infrastructure for secure content management Grant 8,296,178 - Hudis , et al. October 23, 2 | 2012-10-23 |
Malicious Code Infection Cause-and-effect Analysis App 20120144490 - Hartrell; Gregory D. ;   et al. | 2012-06-07 |
Malicious Code Infection Cause-and-effect Analysis App 20120137342 - Hartrell; Gregory D. ;   et al. | 2012-05-31 |
Personalized honeypot for detecting information leaks and security breaches Grant 8,181,250 - Rafalovich , et al. May 15, 2 | 2012-05-15 |
Comparing And Selecting Data Cleansing Service Providers App 20120078857 - Haiby; Neta ;   et al. | 2012-03-29 |
Manual operations in an enterprise security assessment sharing system Grant 8,136,164 - Helman , et al. March 13, 2 | 2012-03-13 |
Malicious code infection cause-and-effect analysis Grant 8,117,659 - Hartrell , et al. February 14, 2 | 2012-02-14 |
Analysis of event information to perform contextual audit Grant 8,095,979 - McDermott , et al. January 10, 2 | 2012-01-10 |
Network Intrusion Detection With Distributed Correlation App 20110173699 - Figlin; Igal ;   et al. | 2011-07-14 |
Reduction of false positive reputations through collection of overrides from customer deployments Grant 7,953,969 - Neystadt , et al. May 31, 2 | 2011-05-31 |
Detecting compromised computers by correlating reputation data with web access logs Grant 7,882,542 - Neystadt , et al. February 1, 2 | 2011-02-01 |
Controlling Malicious Activity Detection Using Behavioral Models App 20100241974 - Rubin; Shai A. ;   et al. | 2010-09-23 |
Providing Simplified Internet Access App 20100077450 - Hudis; Efim ;   et al. | 2010-03-25 |
Distributive Security Investigation App 20100031354 - Hudis; Efim ;   et al. | 2010-02-04 |
Mapping Between Users And Machines In An Enterprise Security Assessment Sharing System App 20090328222 - Helman; Yair ;   et al. | 2009-12-31 |
Semantic Networks For Intrusion Detection App 20090328215 - Arzi; Lior ;   et al. | 2009-12-31 |
Personalized Honeypot For Detecting Information Leaks And Security Breaches App 20090328216 - Rafalovich; Ziv ;   et al. | 2009-12-31 |
Manual Operations In An Enterprise Security Assessment Sharing System App 20090217381 - Helman; Yair ;   et al. | 2009-08-27 |
Analytics Engine App 20090199265 - Hudis; Efim ;   et al. | 2009-08-06 |
Services Using Globally Distributed Infrastructure For Secure Content Management App 20090177514 - Hudis; Efim ;   et al. | 2009-07-09 |
Enterprise Security Assessment Sharing For Consumers Using Globally Distributed Infrastructure App 20090178132 - Hudis; Efim ;   et al. | 2009-07-09 |
Enterprise Security Assessment Sharing For Off-premise Users Using Globally Distributed Infrastructure App 20090178108 - Hudis; Efim ;   et al. | 2009-07-09 |
Globally Distributed Infrastructure For Secure Content Management App 20090178131 - Hudis; Efim ;   et al. | 2009-07-09 |
Reduction of false positive reputations through collection of overrides from customer deployments App 20080256622 - Neystadt; John ;   et al. | 2008-10-16 |
Detection of adversaries through collection and correlation of assessments App 20080256619 - Neystadt; John ;   et al. | 2008-10-16 |
Detecting adversaries by correlating detected malware with web access logs App 20080244742 - Neystadt; John ;   et al. | 2008-10-02 |
Automated collection of forensic evidence associated with a network security incident App 20080244694 - Neystadt; John ;   et al. | 2008-10-02 |
Detecting compromised computers by correlating reputation data with web access logs App 20080244748 - Neystadt; John ;   et al. | 2008-10-02 |
Endpoint enabled for enterprise security assessment sharing App 20080229414 - Hudis; Efim ;   et al. | 2008-09-18 |
Enterprise security assessment sharing App 20080229422 - Hudis; Efim ;   et al. | 2008-09-18 |
Adaptive data collection for root-cause analysis and intrusion detection App 20080229421 - Hudis; Efim ;   et al. | 2008-09-18 |
Analysis Of Event Information To Perform Contextual Audit App 20080184058 - McDermott; Ellen ;   et al. | 2008-07-31 |
Malicious code infection cause-and-effect analysis App 20070150957 - Hartrell; Gregory D. ;   et al. | 2007-06-28 |
Network access protection App 20060250968 - Hudis; Efim ;   et al. | 2006-11-09 |
Aggregating the knowledge base of computer systems to proactively protect a computer from malware App 20060236392 - Thomas; Anil Francis ;   et al. | 2006-10-19 |