Wiz, Inc.

États‑Unis d’Amérique


Commandez votre montre hebdomadaire Wiz, Inc.
Quantité totale PI 258
Rang # Quantité totale PI 5 125
Note d'activité PI 3,3/5.0    381
Rang # Activité PI 1 844
Classe Nice dominante Appareils et instruments scienti...

Brevets

Marques

224 3
12 3
13 3
0
 
Dernier brevet 2025 - Detection of stale data objects ...
Premier brevet 2020 - System and method for analyzing ...
Dernière marque 2025 - WIZ
Première marque 2020 - WIZ

Industrie (Classification de Nice)

Derniers inventions, produits et services

2025 Invention Techniques for mounting disks in an inspection environment. A system and method for assembling a...
Invention Detecting vulnerabilities in configuration code of a cloud environment utilizing infrastructure a...
Invention Techniques for validating a virtual workload signature from a software repository. In some imple...
Invention Techniques for analyzing external exposure in cloud environments. A system and method for perfor...
Invention System and method for private registry cybersecurity inspection. A system and method for cyberse...
Invention Techniques for fixing configuration and for fixing code using contextually enriched alerts. Syst...
Invention Cyber attribution of software containers. A system and method for software containers attributio...
Invention Techniques for code fingerprinting. A system and method for code fingerprinting. A method include...
Invention System and method for improving efficiency in natural language query processing utilizing languag...
Invention System and method for detecting lateral movement using cloud access keys. A system and method fo...
Invention Lateral movement analysis using certificate private keys. A system and method for detecting pote...
Invention System and method for detecting lateral movement using ssh private keys. A system and method for...
Invention Techniques for detecting artificial intelligence model cybersecurity risk in a computing environm...
Invention Technique and method for detection and display of the cybersecurity risk context of a cloud envir...
Invention Techniques for detecting sensitive data in cloud computing environments utilizing cloning. A sys...
Invention Detecting vulnerabilities in virtual instances in a cloud environment utilizing infrastructure as...
Invention System and method for applying a policy on a network path. A system and method for applying a po...
Invention Detection of stale data objects and associated cybersecurity risk. A system and method for detect...
Invention Unified inspection techniques based on abstracted compute type. A system and method for inspecti...
Invention Techniques for detecting cloud identity misuse leveraging runtime context. A system and method f...
Invention System and method for detecting cybersecurity risks in managed artificial intelligence models. A...
Invention System and method for cybersecurity threat detection utilizing static and runtime data. A system...
Invention Cybersecurity threat detection utilizing unified identity mapping and permission detection. A sy...
Invention Static analysis techniques for determining reachability properties of network and computing objec...
Invention Techniques for detecting resources without authentication using exposure analysis. A system and ...
Invention Techniques for semantic analysis of cybersecurity event data and remediation of cybersecurity eve...
Invention System and method for agentless application inventory detection. A system and method for agentle...
Invention Efficient representation of multiple cloud computing environments through unified identity mappin...
Invention Detecting malware infection path in a cloud computing environment utilizing a security graph. A ...
Invention System and method for disk inspection utilizing disk cloning techniques. A system and method for...
Invention System and method for agentless host configuration detection in a computing environment. A syste...
P/S Downloadable software and downloadable software applications for use in the field of cloud-securi...
P/S Business advisory and business consultancy services in the field of cloud-security and cybersecur...
P/S Downloadable software and downloadable software applications for use in the field of cloud-secur...
2024 Invention Techniques for cybersecurity investigation of cloud entity misuse leveraging runtime context. A ...
Invention Techniques for risk and constraint-based inspection. A system and method for risk and constraint-...
Invention Cybersecurity root cause analysis using computing resource name correlation. A system and method ...
Invention System and method for scanning private code and ci/cd registries. A system and method for inspect...
Invention Techniques for cross-source alert prioritization and remediation. A system and method for alert ...
Invention System and method for tracing cloud computing environment deployments to code objects utilizing u...
Invention Application endpoint cybersecurity techniques. A system and method for application endpoint vali...
Invention Techniques for detecting ai pipelines in cloud computing environments. A system and method detec...
Invention System and method for near-real time cloud security posture management. A system and method for ...
Invention System and method for generating cybersecurity remediation in computing environments. A system a...
Invention Cybersecurity vulnerability validation techniques utilizing runtime data, static analysis and dyn...
Invention Techniques for code fingerprinting. A system and method for code fingerprinting. A method includ...
Invention System and method for private registry cybersecurity inspection. A system and method for cybersec...
2023 Invention Techniques for signatureless virtual instance image verification in cloud computing environments....
Invention System and method for providing security posture management for ai applications. A system and me...
2022 P/S Downloadable software for development and deployment of cloud software applications for cyber sec...
2021 Invention System and method for generating a partitioned view of a security graph in a cloud computing envi...
P/S Downloadable software for development and deployment of cloud software applications for cyber se...
2020 P/S Downloadable software for deployment of cloud software applications for cyber security; Downloada...