What are you looking for ?
facts 2025 and predictions 2026
RAIDON

Wiz Assigned Three Patents

Technology discovery techniques in cloud computing environments utilizing disk cloning, techniques for improved virtual instance inspection utilizing disk cloning, techniques for cybersecurity identity risk detection utilizing disk cloning and unified identity mapping

Technology discovery techniques in cloud computing environments utilizing disk cloning
Wiz, Inc., New York, NY
, has been assigned a patent (12506755) developed by Lidgi; Matilda, Tel Aviv, Israel, Keren; Shai, Oporto, Portugal, Herzberg; Raaz, Lichtenstein; Avi Tal, Tel Aviv, Israel, Luttwak; Ami, Binyamina, Israel, Reznik; Roy, Tel Aviv, Israel, Shemesh; Daniel Hershko, Givat-Shmuel, Israel, Miran; Yarin, Rishon Lezion, Israel, and Costica; Yinon, Tel Aviv, Israel, for technology discovery techniques in cloud computing environments utilizing disk cloning.

The abstract of the patent published by the U.S. Patent and Trademark Office states: “A system and method for technology stack discovery by performing active inspection of a cloud computing environment utilizing disk cloning is described. The method includes: generating an inspectable disk based on an original disk of a reachable resource, wherein the reachable resource is a cloud object deployed in the cloud computing environment, and accessible from a network which is external to the cloud computing environment; detecting a cybersecurity object on the inspectable disk, the cybersecurity object indicating a cybersecurity issue; selecting a network path including a network protocol to access the reachable resource; and actively inspecting the network path to detect the cybersecurity issue.

The patent application was filed on 2023-12-29 (18/400748).

Techniques for improved virtual instance inspection utilizing disk cloning
Wiz, Inc., New York, NY
, has been assigned a patent (12505200) developed by Shemesh; Daniel Hershko, Givat-Shmuel, Israel, Miran; Yarin, Rishon Lezion, Israel, Reznik; Roy, Tel Aviv, Israel, Luttwak; Ami, Binyamina, Israel, and Costica; Yinon, Tel Aviv, Israel, for techniques for improved virtual instance inspection utilizing disk cloning.

The abstract of the patent published by the U.S. Patent and Trademark Office states: “A system and method for inspecting live virtual instance in a cloud computing environment for cybersecurity threats utilizes a disk cloning technique. The method includes selecting a live virtual instance in a cloud computing environment, wherein the live virtual instance includes a disk having a disk descriptor with an address in a cloud storage system. An instruction to clone the disk of the live virtual instance is generated, and when executed causes generation of a cloned disk descriptor, the cloned disk descriptor having a data field including the address of the disk of the live virtual instance. The cloned disk is inspected for a cybersecurity threat and the cloned disk is released in response to completing the inspection of the disk.

The patent application was filed on 2022-05-23 (17/664508).

Techniques for cybersecurity identity risk detection utilizing disk cloning and unified identity mapping
Wiz, Inc., New York, NY
, has been assigned a patent (12244634) developed by Shemesh; Daniel Hershko, Givat-Shmuel, Israel, Miran; Yarin, Rishon Lezion, Israel, Reznik; Roy, Tel Aviv, Israel, Luttwak; Ami, Binyamina, Israel, Costica; Yinon, Berkovitz; Avihai, Tel Aviv, Israel, Pisha; George, Giv’atayim, Israel, Oliver; Yaniv Joseph, Tel Aviv, Israel, Reitblat; Udi, New York, NY, Heller; Or, Herzberg; Raaz, Tel Aviv, Israel, Hazan; Osher, Mazkeret Batia, Israel, and Ben David; Niv Roit, Tel Aviv, Israel, for techniques for cybersecurity identity risk detection utilizing disk cloning and unified identity mapping.

The abstract of the patent published by the U.S. Patent and Trademark Office states: “A system and method for detecting a permission escalation event in a computing environment is disclosed. The method includes: generating a cloned disk based on an original disk of a resource deployed in a computing environment; detecting an identifier of a first principal on the cloned disk; detecting a second principal in the computing environment, the first principal authorized to assume the first principal; storing a representation of the computing environment in a security database, including: a first principal node representing the first principal, and a second principal node representing the second principal, further associated with a permission; querying the representation to determine a permission of the first principal; determining that the second principal includes a permission which the first principal does not include based on a result of querying the representation; and generating a permission escalation event.

The patent application was filed on 2024-04-26 (18/647897).

Articles_bottom
ExaGrid
SNL Awards_2026
AIC
ATTO
OPEN-E