Raanana, Israel

Asaf Wexler


Average Co-Inventor Count = 5.7

ph-index = 3

Forward Citations = 104(Granted Patents)


Company Filing History:


Years Active: 2011-2013

Loading Chart...
3 patents (USPTO):Explore Patents

Title: Asaf Wexler: Innovator in Network Security

Introduction

Asaf Wexler is a prominent inventor based in Raanana, Israel. He has made significant contributions to the field of network security, holding three patents that focus on enhancing the protection of web applications and detecting network attacks.

Latest Patents

One of Wexler's latest patents is a system designed to enable the detection of attacks within encrypted traffic. This innovative system includes an adaptor module that routes received encrypted packets to a decryption module. The decryption module decrypts the packets and transmits them to a sensor module, which inspects both the decrypted and encrypted packets to identify potential attacks. Another notable patent is a system and method for securing web applications across an enterprise. This approach involves monitoring network traffic to identify anomalous behavior by comparing it to a profile of acceptable user traffic. Security events identified at individual computer networks are communicated to a central security manager, which correlates these events to determine if there is an enterprise-wide security threat.

Career Highlights

Asaf Wexler is currently employed at Trustwave Holdings Inc., a company known for its expertise in cybersecurity solutions. His work focuses on developing advanced systems that protect organizations from various cyber threats.

Collaborations

Wexler collaborates with talented professionals in his field, including Doron Kolton and Yoram Zahavi. Their combined expertise contributes to the development of innovative security solutions.

Conclusion

Asaf Wexler is a key figure in the realm of network security, with a strong portfolio of patents that address critical challenges in protecting web applications and detecting cyber threats. His contributions continue to shape the future of cybersecurity.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…