Cyber-Ark Software Ltd has a total of 21 patent applications. It decreased the IP activity by 100.0%. Its first patent ever was published in 2008. It filed its patents most often in United States, EPO (European Patent Office) and Canada. Its main competitors in its focus markets digital networks, computer technology and it methods for management are AUTHENTIC8 INC, SWILDENS ERIC SVEN-JOHAN and IRVINE DAVID.
# | Country | Total Patents | |
---|---|---|---|
#1 | United States | 15 | |
#2 | EPO (European Patent Office) | 4 | |
#3 | Canada | 1 | |
#4 | WIPO (World Intellectual Property Organization) | 1 |
# | Industry | |
---|---|---|
#1 | Digital networks | |
#2 | Computer technology | |
#3 | IT methods for management |
# | Technology | |
---|---|---|
#1 | Digital information transmission | |
#2 | Electric digital data processing | |
#3 | Data processing systems |
# | Name | Total Patents |
---|---|---|
#1 | Dulkin Andrey | 16 |
#2 | Sade Yair | 14 |
#3 | Lazarovitz Lavi | 4 |
#4 | Benedict Omer | 3 |
#5 | Hart Matan | 3 |
#6 | Adar Roy | 3 |
#7 | Breiman Erez | 3 |
#8 | Stanford Jessica | 3 |
#9 | Shmueli Aviram | 2 |
#10 | Barboy Dmitry | 2 |
Publication | Filing date | Title |
---|---|---|
US2017329985A1 | Application control | |
US2016330221A1 | Systems and Methods for Detecting and Reacting to Malicious Activity in Computer Networks | |
US2017277792A1 | Adaptive response generation on an endpoint | |
US2016006765A1 | Connection-specific communication management | |
US2016234198A1 | Super-session access to multiple target services | |
US2016142435A1 | Systems and methods for detection of anomalous network behavior | |
US2015121518A1 | Privileged analytics system | |
US2016006712A1 | User provisioning | |
US2015304349A1 | Anomaly detection in groups of network addresses | |
US2015121548A1 | System and method for protected publication of sensitive documents | |
US2015200821A1 | Monitoring sessions with a session-specific transient agent | |
US2015113600A1 | Method and system for detecting unauthorized access to and use of network resources |