Information protection applied by an intermediary device N Ben-Yochanan, J Neystadt, N Nice, M Uritsky, R Malaviarachchi US Patent 8,341,720, 2012 | 222 | 2012 |
Authentication delegation based on re-verification of cryptographic evidence G Medvinsky, N Nice, T Shiran, A Teplitsky, P Leach, J Neystadt US Patent 9,055,107, 2015 | 177 | 2015 |
Security virtual machine for advanced auditing J Neystadt, RE Fitzgerald, L Verny US Patent 8,955,108, 2015 | 169 | 2015 |
Social network based contextual ranking EJ Neystadt, R Karidi, YT Weisfeild, R Varshavsky, A Oron, K Radinsky US Patent 9,870,424, 2018 | 164 | 2018 |
Flexible end-point compliance and strong authentication for distributed hybrid enterprises A Kariv, O Ananiev, E Tovbeyn, D Kershaw, EJ Neystadt US Patent 8,997,196, 2015 | 144 | 2015 |
Detecting compromised computers by correlating reputation data with web access logs J Neystadt, E Hudis, Y Helman, A Faynburd US Patent 7,882,542, 2011 | 112 | 2011 |
Social influencers discovery EJ Neystadt, R Karidi, YT Weisfeild, M Tennenholtz, K Radinsky, ... US Patent App. 13/042,463, 2012 | 102 | 2012 |
Access control using identifiers in links J Neystadt, N Nice US Patent 8,719,582, 2014 | 74 | 2014 |
Authentication in a network using client health enforcement framework N Nice, A Eyal, C Nukala, S Addagatla, E Neystadt US Patent 9,443,084, 2016 | 72 | 2016 |
Model based systems management in virtualized and non-virtualized environments J Neystadt, Y Edery, Y Belinky, AB Vinberg, DS Batchelder, S Yannay US Patent 8,726,334, 2014 | 72 | 2014 |
Efficient transmission of multi-media contents as electronic mail A Erev, E Neystadt US Patent App. 09/984,857, 2003 | 72 | 2003 |
Social Marketing Manager J Neystadt, R Karidi, YT Weisfeld, R Varshavsky, A Oron, K Radinsky, ... US Patent App. 13/025,049, 2012 | 59 | 2012 |
Incentive optimization for social media marketing campaigns M Tennenholtz, EJ Neystadt, R Karidi, R Varshavsky US Patent App. 13/252,210, 2013 | 58 | 2013 |
Reduction of false positive reputations through collection of overrides from customer deployments J Neystadt, E Hudis US Patent 7,953,969, 2011 | 58 | 2011 |
Antimalware Protection of Virtual Machines MS Jarrett, JJ Johnson, V Kapoor, AF Thomas, EJ Neystadt, ... US Patent App. 12/961,854, 2012 | 57 | 2012 |
Method and system for combined peer-to-peer (P2P) and central relay server-based telecommunication conferencing using a telephony and conferencing protocol A Massover, G Garcia, J Neystadt US Patent 9,049,262, 2015 | 45 | 2015 |
Online aggregation A Arev, Y Shain, E Neystadt US Patent 6,801,603, 2004 | 44 | 2004 |
Social ranking for online commerce sellers EJ Neystadt, R Karidi, A Oron, M Vainstein US Patent App. 13/252,213, 2013 | 42 | 2013 |
Protecting a virtual guest machine from attacks by an infected host J Neystadt, N Ben-Yochanan, N Nice US Patent 8,954,897, 2015 | 40 | 2015 |
Delivering malformed data for fuzz testing to software applications E Neystadt, N Natanov, M Shmouely, Y Singer US Patent 8,336,102, 2012 | 40 | 2012 |