-
公开(公告)号:US10454958B2
公开(公告)日:2019-10-22
申请号:US15291331
申请日:2016-10-12
Inventor: Asaf Shabtai , Rami Puzis , Lior Rokach , Liran Orevi , Genady Malinsky , Ziv Katzir , Ron Bitton
Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.
-
公开(公告)号:US20200053114A1
公开(公告)日:2020-02-13
申请号:US16658797
申请日:2019-10-21
Applicant: Verint Systems Ltd.
Inventor: Asaf Shabtai , Rami Puzis , Lior Rokach , Liran Orevi , Genady Malinsky , Ziv Katzir , Ron Bitton
Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.
-
公开(公告)号:US11601452B2
公开(公告)日:2023-03-07
申请号:US16658797
申请日:2019-10-21
Applicant: Verint Systems Ltd.
Inventor: Asaf Shabtai , Rami Puzis , Lior Rokach , Liran Orevi , Genady Malinsky , Ziv Katzir , Ron Bitton
Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.
-
公开(公告)号:US20170104778A1
公开(公告)日:2017-04-13
申请号:US15291331
申请日:2016-10-12
Inventor: Asaf Shabtai , Rami Puzis , Lior Rokach , Liran Orevi , Genady Malinsky , Ziv Katzir , Ron Bitton
CPC classification number: H04L63/1425 , G06F21/552 , G06F2221/034 , G06N20/00 , H04L63/1408 , H04L63/1441
Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.
-
-
-