Company Filing History:
Years Active: 2022-2024
Title: Dany Cohen: Innovator in Endpoint Behavior Detection
Introduction
Dany Cohen is a notable inventor based in Tel Aviv, Israel. He has made significant contributions to the field of cybersecurity, particularly in the detection of abnormal endpoint behavior. With a total of 2 patents, Cohen's work is instrumental in enhancing the security measures employed by organizations.
Latest Patents
Cohen's latest patents focus on context-informed abnormal endpoint behavior detection. This innovative approach involves generating adaptive normal profiles at a hierarchical scope that corresponds to a set of endpoints and processes. The detection of abnormal endpoint activity is achieved by verifying whether event data tracking activity aligns with these adaptive normal profiles. To minimize false positives, alarms are verified against normal endpoint activity. Abnormal event data is then forwarded to a causality chain identifier, which identifies abnormal chains of processes related to the detected abnormal endpoint activity. A trained threat detection model receives these abnormal causality chains and assesses the likelihood of them corresponding to a malicious attack, thereby indicating abnormal endpoint behavior.
Career Highlights
Cohen is currently employed at Palo Alto Networks, Inc., a leading company in cybersecurity solutions. His work at this organization has allowed him to apply his innovative ideas in a practical setting, contributing to the development of advanced security technologies.
Collaborations
Throughout his career, Cohen has collaborated with talented individuals such as Shai Meir and Arkady Miasnikov. These collaborations have fostered a creative environment that encourages the development of groundbreaking technologies in the cybersecurity domain.
Conclusion
Dany Cohen's contributions to the field of cybersecurity through his innovative patents and collaborations highlight his role as a key inventor in the industry. His work continues to influence the way organizations detect and respond to abnormal endpoint behavior, enhancing overall security measures.