Patent | Date |
---|
Orchestration Of Multiple Wireless Sensors For Monitoring A Wirelss Spectrum And Protocols App 20220303803 - Shulman; Amichai ;   et al. | 2022-09-22 |
Data based web application firewall Grant 11,436,358 - Margel , et al. September 6, 2 | 2022-09-06 |
Orchestration of multiple wireless sensors for monitoring a wireless spectrum and protocols Grant 11,297,518 - Shulman , et al. April 5, 2 | 2022-04-05 |
Aggregating Alerts Of Malicious Events For Computer Security App 20220086125 - Yehudai; Gilad ;   et al. | 2022-03-17 |
Aggregating alerts of malicious events for computer security Grant 11,218,448 - Yehudai , et al. January 4, 2 | 2022-01-04 |
Continuous Database Security And Compliance App 20210248237 - REICH; Avidan ;   et al. | 2021-08-12 |
Automatic generation of attribute values for rules of a web application layer attack detector Grant 11,063,960 - Be'ery , et al. July 13, 2 | 2021-07-13 |
Privacy-preserving Learning Of Web Traffic App 20210203642 - MANTIN; Itsik ;   et al. | 2021-07-01 |
Coordinated detection and differentiation of denial of service attacks Grant 11,050,786 - Be'ery , et al. June 29, 2 | 2021-06-29 |
Continuous database security and compliance Grant 11,003,779 - Reich , et al. May 11, 2 | 2021-05-11 |
Techniques For Targeted Botnet Protection App 20210092142 - NIV; Nitzan ;   et al. | 2021-03-25 |
Techniques for targeted botnet protection Grant 10,911,472 - Niv , et al. February 2, 2 | 2021-02-02 |
Continuous Database Security And Compliance App 20210012007 - REICH; Avidan ;   et al. | 2021-01-14 |
Detection of malicious attempts to access a decoy database object based on connection type Grant 10,834,130 - Erez , et al. November 10, 2 | 2020-11-10 |
Continuous database security and compliance Grant 10,824,730 - Reich , et al. November 3, 2 | 2020-11-03 |
Techniques for detecting enterprise intrusions utilizing active tokens Grant 10,805,325 - Shulman , et al. October 13, 2 | 2020-10-13 |
Techniques For Securely Detecting Compromises Of Enterprise End Stations Utilizing Tunnel Tokens App 20200137026 - SHULMAN; Amichai ;   et al. | 2020-04-30 |
Data Based Web Application Firewall App 20200097676 - MARGEL; Shiri ;   et al. | 2020-03-26 |
Continuous Database Security And Compliance App 20200065494 - REICH; Avidan ;   et al. | 2020-02-27 |
Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens Grant 10,567,342 - Shulman , et al. Feb | 2020-02-18 |
Techniques For Securely Detecting Compromises Of Enterprise End Stations Utilizing Tunnel Tokens App 20200036683 - SHULMAN; Amichai ;   et al. | 2020-01-30 |
Aggregating Alerts Of Malicious Events For Computer Security App 20190372934 - Yehudai; Gilad ;   et al. | 2019-12-05 |
Coordinated Detection And Differentiation Of Denial Of Service Attacks App 20190349395 - BE'ERY; Tal Arieh ;   et al. | 2019-11-14 |
Techniques for detecting compromises of enterprise end stations utilizing noisy tokens Grant 10,469,523 - Shulman , et al. No | 2019-11-05 |
Detection Of Malicious Attempts To Access A Decoy Database Object Based On Connection Type App 20190289034 - EREZ; Elad ;   et al. | 2019-09-19 |
Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets Grant 10,404,712 - Margel , et al. Sep | 2019-09-03 |
Coordinated detection and differentiation of denial of service attacks Grant 10,404,742 - Be'ery , et al. Sep | 2019-09-03 |
Techniques for preventing large-scale data breaches utilizing differentiated protection layers Grant 10,382,400 - Margel , et al. A | 2019-08-13 |
Data access verification for enterprise resources Grant 10,382,464 - Shulman , et al. A | 2019-08-13 |
Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web applications Grant 10,104,095 - Shulman , et al. October 16, 2 | 2018-10-16 |
Virtual encryption patching using multiple transport layer security implementations Grant 10,020,941 - Shulman , et al. July 10, 2 | 2018-07-10 |
Techniques For Detecting Enterprise Intrusions Utilizing Active Tokens App 20180048665 - SHULMAN; Amichai ;   et al. | 2018-02-15 |
Automatic Stability Determination And Deployment Of Discrete Parts Of A Profile Representing Normal Behavior To Provide Fast Protection Of Web Applications App 20170366559 - SHULMAN; Amichai ;   et al. | 2017-12-21 |
Automatic Generation Of Attribute Values For Rules Of A Web Application Layer Attack Detector App 20170339165 - BE'ERY; Tal Arieh ;   et al. | 2017-11-23 |
Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web applications Grant 9,781,133 - Shulman , et al. October 3, 2 | 2017-10-03 |
Automatic generation of attribute values for rules of a web application layer attack detector Grant 9,762,592 - Be'ery , et al. September 12, 2 | 2017-09-12 |
Techniques For Targeted Botnet Protection Using Collective Botnet Analysis App 20170251016 - NIV; Nitzan ;   et al. | 2017-08-31 |
Techniques For Targeted Botnet Protection App 20170251015 - NIV; Nitzan ;   et al. | 2017-08-31 |
Techniques For Detecting Compromises Of Enterprise End Stations Utilizing Noisy Tokens App 20170244749 - SHULMAN; Amichai ;   et al. | 2017-08-24 |
Techniques For Securely Detecting Compromises Of Enterprise End Stations Utilizing Tunnel Tokens App 20170244672 - SHULMAN; Amichai ;   et al. | 2017-08-24 |
Unobtrusive Protection For Large-scale Data Breaches Utilizing User-specific Data Object Access Budgets App 20170237709 - MARGEL; Shiri ;   et al. | 2017-08-17 |
Techniques For Preventing Large-scale Data Breaches Utilizing Differentiated Protection Layers App 20170237711 - MARGEL; Shiri ;   et al. | 2017-08-17 |
Techniques For Preventing Large-scale Data Breaches Utilizing Differentiated Protection Layers App 20170187719 - MARGEL; Shiri ;   et al. | 2017-06-29 |
Unobtrusive Protection For Large-scale Data Breaches Utilizing User-specific Data Object Access Budgets App 20170187718 - MARGEL; Shiri ;   et al. | 2017-06-29 |
Detection of compromised unmanaged client end stations using synchronized tokens from enterprise-managed client end stations Grant 9,680,833 - Dulce , et al. June 13, 2 | 2017-06-13 |
Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets Grant 9,674,201 - Margel , et al. June 6, 2 | 2017-06-06 |
Techniques for preventing large-scale data breaches utilizing differentiated protection layers Grant 9,674,202 - Margel , et al. June 6, 2 | 2017-06-06 |
Compromised insider honey pots using reverse honey tokens Grant 9,667,651 - Shulman , et al. May 30, 2 | 2017-05-30 |
Data Access Verification For Enterprise Resources App 20170111380 - SHULMAN; Amichai ;   et al. | 2017-04-20 |
Virtual Encryption Patching Using Multiple Transport Layer Security Implementations App 20170093824 - SHULMAN; Amichai ;   et al. | 2017-03-30 |
Data access verification for enterprise resources Grant 9,591,008 - Shulman , et al. March 7, 2 | 2017-03-07 |
Coordinated Detection And Differentiation Of Denial Of Service Attacks App 20170026407 - BE'ERY; Tal Arieh ;   et al. | 2017-01-26 |
Detection Of Compromised Unmanaged Client End Stations Using Synchronized Tokens From Enterprise-managed Client End Stations App 20160381023 - DULCE; Sagie ;   et al. | 2016-12-29 |
Coordinated detection and differentiation of denial of service attacks Grant 9,485,264 - Be'Ery , et al. November 1, 2 | 2016-11-01 |
Compromised Insider Honey Pots Using Reverse Honey Tokens App 20160301712 - SHULMAN; Amichai ;   et al. | 2016-10-13 |
System and method for preventing web frauds committed using client-scripting attacks Grant 9,455,997 - Shulman , et al. September 27, 2 | 2016-09-27 |
Data Access Verification For Enterprise Resources App 20160261616 - SHULMAN; Amichai ;   et al. | 2016-09-08 |
Compromised insider honey pots using reverse honey tokens Grant 9,401,927 - Shulman , et al. July 26, 2 | 2016-07-26 |
Coordinated Detection And Differentiation Of Denial Of Service Attacks App 20150365428 - BE'ERY; Tal Arieh ;   et al. | 2015-12-17 |
Coordinated detection and differentiation of denial of service attacks Grant 9,148,440 - Be'ery , et al. September 29, 2 | 2015-09-29 |
On-demand content classification using an out-of-band communications channel for facilitating file activity monitoring and control Grant 9,128,941 - Shulman , et al. September 8, 2 | 2015-09-08 |
Automatic Generation Of Attribute Values For Rules Of A Web Application Layer Attack Detector App 20150207806 - BE'ERY; Tal Arieh ;   et al. | 2015-07-23 |
Coordinated Detection And Differentiation Of Denial Of Service Attacks App 20150150123 - Be'ery; Tal Arieh ;   et al. | 2015-05-28 |
Compromised Insider Honey Pots Using Reverse Honey Tokens App 20150135266 - Shulman; Amichai ;   et al. | 2015-05-14 |
Automatic generation of attribute values for rules of a web application layer attack detector Grant 9,027,136 - Be'ery , et al. May 5, 2 | 2015-05-05 |
Automatic generation of different attribute values for detecting a same type of web application layer attack Grant 9,027,137 - Be'ery , et al. May 5, 2 | 2015-05-05 |
Community-based defense through automatic generation of attribute values for rules of web application layer attack detectors Grant 9,009,832 - Be'ery , et al. April 14, 2 | 2015-04-14 |
Iterative automatic generation of attribute values for rules of a web application layer attack detector Grant 8,997,232 - Be'ery , et al. March 31, 2 | 2015-03-31 |
System and method for preventing web frauds committed using client-scripting attacks Grant 8,984,630 - Shulman , et al. March 17, 2 | 2015-03-17 |
Compromised insider honey pots using reverse honey tokens Grant 8,973,142 - Shulman , et al. March 3, 2 | 2015-03-03 |
Compromised Insider Honey Pots Using Reverse Honey Tokens App 20150013006 - Shulman; Amichai ;   et al. | 2015-01-08 |
Detecting web browser based attacks using browser digest compute tests using digest code provided by a remote source Grant 8,904,558 - Shulman , et al. December 2, 2 | 2014-12-02 |
Community-based Defense Through Automatic Generation Of Attribute Values For Rules Of Web Application Layer Attack Detectors App 20140317740 - Be'ery; Tal Arieh ;   et al. | 2014-10-23 |
Iterative Automatic Generation Of Attribute Values For Rules Of A Web Application Layer Attack Detector App 20140317739 - Be'ery; Tal Arieh ;   et al. | 2014-10-23 |
Automatic Generation Of Different Attribute Values For Detecting A Same Type Of Web Application Layer Attack App 20140317741 - Be'ery; Tal Arieh ;   et al. | 2014-10-23 |
Automatic Generation Of Attribute Values For Rules Of A Web Application Layer Attack Detector App 20140317738 - Be'ery; Tal Arieh ;   et al. | 2014-10-23 |
Detecting web browser based attacks using browser response comparison tests launched from a remote source Grant 8,869,279 - Shulman , et al. October 21, 2 | 2014-10-21 |
Detecting Web Browser Based Attacks Using Browser Digest Compute Tests Using Digest Code Provided By A Remote Source App 20140289855 - Shulman; Amichai ;   et al. | 2014-09-25 |
On-demand Content Classification Using An Out-of-band Communications Channel For Facilitating File Activity Monitoring And Control App 20140258294 - Shulman; Amichai ;   et al. | 2014-09-11 |
Automatic Stability Determination And Deployment Of Discrete Parts Of A Profile Representing Normal Behavior To Provide Fast Protection Of Web Applications App 20140230058 - Shulman; Amichai ;   et al. | 2014-08-14 |
Detecting web browser based attacks using browser digest compute tests launched from a remote source Grant 8,752,208 - Shulman , et al. June 10, 2 | 2014-06-10 |
Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications Grant 8,713,682 - Shulman , et al. April 29, 2 | 2014-04-29 |
Method for monitoring stored procedures Grant 8,453,255 - Shulman , et al. May 28, 2 | 2013-05-28 |
Dealing with web attacks using cryptographically signed HTTP cookies Grant 8,448,233 - Shulman , et al. May 21, 2 | 2013-05-21 |
Techniques for tracking actual users in web application security systems Grant 8,392,963 - Shulman , et al. March 5, 2 | 2013-03-05 |
Dealing With Web Attacks Using Cryptographically Signed Http Cookies App 20130055384 - SHULMAN; AMICHAI ;   et al. | 2013-02-28 |
Detecting Web Browser Based Attacks Using Browser Response Comparison Tests Launched From A Remote Source App 20120304296 - Shulman; Amichai ;   et al. | 2012-11-29 |
Detecting Web Browser Based Attacks Using Browser Digest Compute Tests Launched From A Remote Source App 20120291129 - SHULMAN; AMICHAI ;   et al. | 2012-11-15 |
System And Method For Preventing Web Frauds Committed Using Client-scripting Attacks App 20120227106 - SHULMAN; AMICHAI ;   et al. | 2012-09-06 |
System And Method For Preventing Web Frauds Committed Using Client-scripting Attacks App 20120180129 - Shulman; Amichai ;   et al. | 2012-07-12 |
System and method for preventing web frauds committed using client-scripting attacks Grant 8,181,246 - Shulman , et al. May 15, 2 | 2012-05-15 |
Method and system for transparently encrypting sensitive information Grant 8,135,948 - Shulman , et al. March 13, 2 | 2012-03-13 |
Method For Monitoring Stored Procedures App 20120023132 - SHULMAN; Amichai ;   et al. | 2012-01-26 |
Correlation Engine For Detecting Network Attacks And Detection Method App 20110289583 - SHULMAN; Amichai ;   et al. | 2011-11-24 |
Method for monitoring stored procedures Grant 8,056,141 - Shulman , et al. November 8, 2 | 2011-11-08 |
Method and security system for indentifying and blocking web attacks by enforcing read-only parameters Grant 8,051,484 - Shulman , et al. November 1, 2 | 2011-11-01 |
Correlation engine for detecting network attacks and detection method Grant 8,024,804 - Shulman , et al. September 20, 2 | 2011-09-20 |
Dynamic Learning Method And Adaptive Normal Behavior Profile (nbp) Architecture For Providing Fast Protection Of Enterprise Applications App 20100251377 - SHULMAN; Amichai ;   et al. | 2010-09-30 |
Method and apparatus for high-speed detection and blocking of zero day worm attacks Grant 7,752,662 - Shulman , et al. July 6, 2 | 2010-07-06 |
Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications Grant 7,743,420 - Shulman , et al. June 22, 2 | 2010-06-22 |
System and method for correlating between HTTP requests and SQL queries Grant 7,640,235 - Shulman , et al. December 29, 2 | 2009-12-29 |
System And Method For Preventing Web Frauds Committed Using Client-scripting Attacks App 20080320567 - SHULMAN; Amichai ;   et al. | 2008-12-25 |
Method For Monitoring Stored Procedures App 20080065640 - SHULMAN; Amichai ;   et al. | 2008-03-13 |
Method and system for transparently encrypting sensitive information App 20070294539 - Shulman; Amichai ;   et al. | 2007-12-20 |
Correlation engine for detecting network attacks and detection method App 20070214503 - Shulman; Amichai ;   et al. | 2007-09-13 |
System And Method For Correlating Between Http Requests And Sql Queries App 20070136312 - Shulman; Amichai ;   et al. | 2007-06-14 |
Techniques For Tracking Actual Users In Web Application Security Systems App 20070124806 - Shulman; Amichai ;   et al. | 2007-05-31 |
Method And Security System For Indentifying And Blocking Web Attacks By Enforcing Read-only Parameters App 20060272008 - Shulman; Amichai ;   et al. | 2006-11-30 |
Method and apparatus for high-speed detection and blocking of zero day worm attacks App 20050188215 - Shulman, Amichai ;   et al. | 2005-08-25 |
Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications App 20050120054 - Shulman, Amichai ;   et al. | 2005-06-02 |