Information protection applied by an intermediary device N Ben-Yochanan, J Neystadt, N Nice, M Uritsky, R Malaviarachchi US Patent 8,341,720, 2012 | 230 | 2012 |
Authentication delegation based on re-verification of cryptographic evidence G Medvinsky, N Nice, T Shiran, A Teplitsky, P Leach, J Neystadt US Patent 9,055,107, 2015 | 184 | 2015 |
Security virtual machine for advanced auditing J Neystadt, RE Fitzgerald, L Verny US Patent 8,955,108, 2015 | 176 | 2015 |
Social network based contextual ranking EJ Neystadt, R Karidi, YT Weisfeild, R Varshavsky, A Oron, K Radinsky US Patent 9,870,424, 2018 | 166 | 2018 |
Flexible end-point compliance and strong authentication for distributed hybrid enterprises A Kariv, O Ananiev, E Tovbeyn, D Kershaw, EJ Neystadt US Patent 8,997,196, 2015 | 144 | 2015 |
Detecting compromised computers by correlating reputation data with web access logs J Neystadt, E Hudis, Y Helman, A Faynburd US Patent 7,882,542, 2011 | 113 | 2011 |
Social influencers discovery EJ Neystadt, R Karidi, YT Weisfeild, M Tennenholtz, K Radinsky, ... US Patent App. 13/042,463, 2012 | 111 | 2012 |
Access control using identifiers in links J Neystadt, N Nice US Patent 8,719,582, 2014 | 74 | 2014 |
Model based systems management in virtualized and non-virtualized environments J Neystadt, Y Edery, Y Belinky, AB Vinberg, DS Batchelder, S Yannay US Patent 8,726,334, 2014 | 73 | 2014 |
Efficient transmission of multi-media contents as electronic mail A Erev, E Neystadt US Patent App. 09/984,857, 2003 | 73 | 2003 |
Authentication in a network using client health enforcement framework N Nice, A Eyal, C Nukala, S Addagatla, E Neystadt US Patent 9,443,084, 2016 | 72 | 2016 |
Incentive optimization for social media marketing campaigns M Tennenholtz, EJ Neystadt, R Karidi, R Varshavsky US Patent App. 13/252,210, 2013 | 60 | 2013 |
Social Marketing Manager J Neystadt, R Karidi, YT Weisfeld, R Varshavsky, A Oron, K Radinsky, ... US Patent App. 13/025,049, 2012 | 59 | 2012 |
Antimalware Protection of Virtual Machines MS Jarrett, JJ Johnson, V Kapoor, AF Thomas, EJ Neystadt, ... US Patent App. 12/961,854, 2012 | 58 | 2012 |
Reduction of false positive reputations through collection of overrides from customer deployments J Neystadt, E Hudis US Patent 7,953,969, 2011 | 58 | 2011 |
Method and system for combined peer-to-peer (P2P) and central relay server-based telecommunication conferencing using a telephony and conferencing protocol A Massover, G Garcia, J Neystadt US Patent 9,049,262, 2015 | 46 | 2015 |
Online aggregation A Arev, Y Shain, E Neystadt US Patent 6,801,603, 2004 | 44 | 2004 |
Social ranking for online commerce sellers EJ Neystadt, R Karidi, A Oron, M Vainstein US Patent App. 13/252,213, 2013 | 43 | 2013 |
Protecting a virtual guest machine from attacks by an infected host J Neystadt, N Ben-Yochanan, N Nice US Patent 8,954,897, 2015 | 41 | 2015 |
Location Based Access Control EJ Neystadt, D Alon, D Rose, E Levy US Patent App. 13/114,044, 2012 | 41 | 2012 |