17 patents
Utility
Network Traffic Routing In an Sd-wan
11 Jan 24
A method and network gateway are provided for routing network traffic between internet service providers (ISPs) based on dynamic communication quality of the ISPs.
Tal Vainshtein, Ofer Raz
Filed: 11 Jul 22
Utility
Metadata Based Efficient Packet Processing
11 Jan 24
A method and device are presented for decreasing processing cycles spent forwarding packets of a communication from receive queues to at least one transmit queue of a network interface controller.
Oren Markovitz
Filed: 6 Jul 22
Utility
System and Method for Performing Hierarchical and Incremental Workload Scanning
14 Dec 23
A computer executed method is presented for identifying security issues in a workload.
Ohad Tanami, Itay Harush
Filed: 8 Jun 22
Utility
Methods and system for packet control and inspection in containers and meshed environments
12 Dec 23
An instantiated application includes both a runtime instantiation of an application image, and an administrative service operable to install in the instantiated application at least one security module during runtime of the instantiated application in a container.
Ilan Uriel
Filed: 30 Dec 21
Utility
System and method for performing automated security reviews
24 Oct 23
An automated method executed by circuitry is provided for monitoring a software platform including multiple pods that manage, deploy, and execute micro services.
Ilan Uriel
Filed: 18 Sep 20
Utility
System and Method for Protecting Against Data Storage Attacks
12 Oct 23
A system, method, and device are provided for detecting and mitigating a storage attack at the block level by generating canary blocks by marking blocks of data (referred to as memory blocks) such that other programs do not modify these canary blocks that are monitored to detect data storage attacks that attempt to modify the canary blocks and/or by monitoring statistical and behavioral features of activities over blocks, whether they can be modified by other programs or not.
Liran Orevi, Haggai David
Filed: 24 Mar 22
Utility
Methods and Systems for Identifying Malware Enabled by Automatically Generated Domain Names
23 Sep 20
Computerized methods and systems identify malware enabled by automatically generated domain names.
Aliaksandr CHAILYTKO
Filed: 8 Jun 20
Utility
Methods and systems for identifying malware enabled by automatically generated domain names
27 Jul 20
Computerized methods and systems identify malware enabled by automatically generated domain names.
Aliaksandr Chailytko
Filed: 14 Aug 17
Utility
Method and system for injecting javascript into a web page
27 Jul 20
Computerized methods and systems inspect data packets received from a web server for the presence of a value from a list of prohibited values.
Ilan Uriel, Aviad Mor
Filed: 21 Sep 16
Utility
Method for Performing TLS/SSL Inspection Based on Verified Subject Name
24 Jun 20
Methods and systems for processing cryptographically secured connections by a gateway, between a client and a server, are performed.
Pavel ISAEV, Idan SAYAG, Alexey VOLODIN, Tamir ZEGMAN
Filed: 19 Dec 18
Utility
Account take over prevention
4 May 20
A method for monitoring access of users to Internet SaaS applications includes the CISO (company Internet security office) in the configuration and operation of the method, instead of relying only on whatever security the SaaS application implements.
Alon Boxiner, Liad Mizrachi, Oded Vanunu, Roman Zaikin, Yoav Shay Daniely
Filed: 27 Mar 17
Utility
Method And System For Modeling All Operations And Executions Of An Attack And Malicious Process Entry
11 Mar 20
Computerized methods and systems determine an entry point or source of an attack on an endpoint, such as a machine, e.g., a computer, node of a network, system or the like.
Anandabrata PAL, Lior ARZI, Tamara LEIDERFARB
Filed: 14 Sep 19
Utility
Method and system for transparently manipulating downloaded files
17 Feb 20
Methods and systems provide mechanisms for inspection devices, such as firewalls and servers and computers associated therewith, to selectively manipulate files, for which a download has been requested.
Amnon Perlmutter, Lior Drihem
Filed: 27 Dec 15
Utility
Push based encryption
3 Feb 20
A method for introducing a replacement code segment over-the-air through a wireless mobile communication network to an existing code resident on a mobile terminal: identifying the mobile terminal from among terminals served through the wireless mobile communication network; sending a push notification through the network to the mobile terminal, the push notification indicative of the replacement code segment ready for downloading; activating a dynamic update module resident in the mobile terminal, in response to the push notification; sending a request for the replacement code segment; downloading the replacement code segment to the mobile terminal; and transferring the downloaded replacement code segment to the dynamic update module for dynamic replacement of a corresponding old code segment within the mobile terminal with the replacement code segment, obviating a need to recompile the existing code.
Yuval Raban, Nadia Goshmir, Shami Reshtik
Filed: 29 Jun 16
Utility
Method and system for detecting and remediating polymorphic attacks across an enterprise
16 Dec 19
Disclosed are methods and systems for detecting malware and potential malware based on using generalized attack trees (generalized attack tree graphs).
Tamara Leiderfarb, Lior Arzi, Anandabrata Pal
Filed: 5 Nov 18
Utility
Method and system for identifying uncorrelated suspicious events during an attack
28 Oct 19
Computerized methods and systems identify events associated with an attack initiated on an endpoint client.
Lior Arzi, Tamara Leiderfarb, Anandabrata Pal
Filed: 12 Oct 16
Utility
Method and system for modeling all operations and executions of an attack and malicious process entry
7 Oct 19
Computerized methods and systems determine an entry point or source of an attack on an endpoint, such as a machine, e.g., a computer, node of a network, system or the like.
Anandabrata Pal, Lior Arzi, Tamara Leiderfarb
Filed: 8 Dec 15
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first