Imperva

Displaying 1-40 of 70 results

  • Research // Aug 2014

    The Hidden Cost of Compliance

    Database auditing is an integral part of every organization’s compliance protocol, but the built-in auditing tools that come with your database exact a heavy toll on hardware, software, storage, and human resource costs. Businesses have to comply with data protection statutes in more than 100 countries around the world,...

    Sponsored By Imperva

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Sponsored By Imperva

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Sponsored By Imperva

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Sponsored By Imperva

  • White Papers // Jul 2014

    Protect Your Critical Web Applications with Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • White Papers // Jul 2014

    How Malware and Targeted Attacks Infiltrate Your Data Center

    Advanced targeted attacks bypass the security perimeter and compromise individuals inside your enterprise to unleash attacks on your entire network. Read this white paper to learn more about: Attack Motivation How to Protect Your Sensitive Data and Critical Business Applications Complementing Traditional Defenses with Data Center Protection Effective Malware...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Web Attack Survival Guide

    With an increasing amount of business being conducted online, the internet has quickly become the frontline in an ongoing battle between companies and an unseen enemy. Industrial espionage, sabotage and cyber terrorism are becoming more frequent, resulting in lost revenue, stolen data, service interruptions and damaged reputations. This white paper...

    Sponsored By Imperva

  • White Papers // Apr 2014

    What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This white paper lays out the six key requirements needed to protect Web...

    Sponsored By Imperva

  • White Papers // Apr 2014

    10 Things Every Web Application Firewall Should Provide

    Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Hackers evade traditional network security defenses to take down websites and to steal data. Malicious users probe websites around-the-clock looking for vulnerabilities. Automation tools such as off-the-shelf attack toolkits and botnets make it...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Cutting the Cost of Application Security

    Web application attacks can result in devastating data breaches and application downtime, costing companies millions of dollars in fines, brand damage, and customer turnover. This white paper illustrates how the Imperva SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and website downtime....

    Sponsored By Imperva

  • White Papers // Jun 2014

    Data Privacy - the High Cost of Unprotected Sensitive Data

    The collection and use of Personally Identifiable Information (PII) is exploding. With this expansion, there is increasing pressure from individuals, industry regulators, and lawmakers for organizations to protect sensitive data from hacker attacks and insider abuse or theft. The six steps outlined in this paper illustrate the challenges around the...

    Provided By Imperva

  • White Papers // Jun 2014

    Four Steps to Deafeat a DDoS Attack

    Over the past several years, the industrialization of attacks and the rise of hacktivism have resulted in an explosion of powerful and destructive DDoS attacks. Using off-the-shelf toolkits, criminals can quickly build botnets of thousands or even millions of computers. Malicious users can rent these botnets to unleash destructive DDoS...

    Provided By Imperva

  • White Papers // Apr 2014

    Mitigate the OWASP Top 10 Web Application Security Risks

    The OWASP Top 10 is widely recognized as one of the leading standards for identifying critical Web application security risks. This technical brief analyzes the risks in the OWASP Top 10 and outlines how you can protect your organization against each threat. Risks discussed in this paper include: cross-site scripting,...

    Provided By Imperva

  • Case Studies // Apr 2014

    TicketNetwork Selects Imperva SecureSphere to Secure Transactions

    Over 7.5 million tickets are offered on TicketNetwork's online ticket exchange every day. To protect the organization’s website and address PCI compliance, TicketNetwork chose the Imperva SecureSphere Web Application Firewall because of its high performance, its ease-of-management and its reputation-based security provided by ThreatRadar. This case study highlights why TicketNetwork...

    Provided By Imperva

  • Research // Apr 2014

    Gartner Confirms: Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations.

    Provided By Imperva

  • Webcasts // Jan 2012

    Put 1080p High-Definition Analytics Into Your IP Camera

    Advanced analytics is replacing simple motion detection in surveillance cameras. See how one can get 1080p high-definition (HD) analytics in their IP camera with a single-chip video analytics solution. In this webcast, the presneter discusses why FPGAs are ideal for high-definition video analytics systems.

    Provided By Imperva

  • Podcasts // Jan 2012

    Getting Started in Web Application Security

    In this podcast, the speaker talks about getting started in Web Application Security. The speaker discusses several tools and resources useful for those that are new to this industry and for seasoned experts.

    Provided By Imperva

  • Podcasts // Jan 2012

    Host of the Network Security Blog and Podcast Series, and QSA

    In this podcast, the speaker talks about the recent webcast from Homeland Security titled "Do the Payment card Industry Data Standards Reduce Cyber Crime." The speaker also shares with one of his perspectives on the changing security industry.

    Provided By Imperva

  • Podcasts // Jan 2012

    Data Security With WAF and DAM: Chad Lorenc of Agilent Talks About How His Use of the Imperva SecureSphere WAF and DAM Solutions Goes Beyond Traditional Firewalling and Monitoring

    In this podcast, the speaker discusses how the Imperva SecureSphere solutions helped the speaker discover critical assets, monitor their operations, and provide an ongoing strategic resource for data security initiatives.

    Provided By Imperva

  • Podcasts // Jan 2012

    Using WAF in Complex, Global Environments

    In this podcast, the speaker discusses about the importance of application security at Vonage. The speaker details several projects that are aimed at protecting Vonage as well as Vonage partners and customers. The speaker also shares his views on application security as it relates to vulnerability scanning, the Imperva SecureSphere...

    Provided By Imperva

  • Podcasts // Jan 2012

    Microsoft IIS WebDAV Remote Authentication Bypass

    In this podcast, the speaker talks about Microsoft Security. This vulnerability is related to Microsoft IIS servers running WebDAV. Amichai goes into detail about the vulnerability, why servers are still vulnerable even though this is a well known exploit, and how attacks can be mitigated with WAF or web application...

    Provided By Imperva

  • Podcasts // Jan 2012

    Convergence of Risk and Security

    In this podcast, the speaker discusses a wide range of subjects related to risk and security converging that who owns risk management, how can solutions like WAF be evaluated by businesses in terms of organizational risk, where is the real value in risk management how important are technical solutions and...

    Provided By Imperva

  • Podcasts // Jan 2012

    WAF, VA, Black Box Testing, and Related Solutions Necessary for a Strong Application Security Posture

    In this podcast, the speaker discusses why Imperva and BeyondSecurity have partnered to offer a combination of WAF, Black Box Testing, and Vulnerability Assessment services together. The speaker discusses several very interesting application security "Stories from the trenches," and shares his perspectives on the evolution of application security.

    Provided By Imperva

  • Podcasts // Jan 2012

    About Bringing Together to Worlds of WAF and VA to Improve Overall Application Security and Reduce Business Risk

    In this podcast, the speaker discusses why Imperva and Whitehat have partnered to offer a blended approach to Web application security through WAF plus VA. The speaker explains that the industry now requires these once diametrically opposed solutions to unite in order to address today's threats and reduce overall business...

    Provided By Imperva

  • Podcasts // Jan 2012

    SQL Injection Attacks and Mitigation Techniques

    In this podcast, the speaker discusses about Direct Database SQL Injection attacks. The speaker also discusses how these attacks are preformed directly through the database interface or through Web applications. The speaker also talks about flaws in stored procedures that make these attacks possible.

    Provided By Imperva

  • Podcasts // Jan 2012

    Compliance and Security Within the Financial Industry

    In this podcast, the speaker discusses about the financial industry, and how security and compliance have been changing. The speaker also touches on financial modernization, the convergence of NIST and ISO, and the risk management continuum.

    Provided By Imperva

  • Podcasts // Jan 2012

    Web Application Security Within Cloud Computing, SaaS, and Virtualized Environments

    In this podcast, the speaker discusses about cloud computing, SaaS, virtualization, and the need for Web Application Firewalls. The speaker shares some stories from the trenches, and talks about the trend in modern business to become more focused on core capabilities and less on infrastructure, thus getting back to managing...

    Provided By Imperva

  • Podcasts // Jan 2012

    Protecting Web Portals and Bringing Together Security Operations and Development With the Imperva SecureSphere WAF at Telefonica O2 Germany

    In this podcast, the speaker shares his experiences around choosing, implementing and operating the Imperva SecureSphere Web Application Firewall (WAF). The speaker shares a number of examples where WAF helped Telefonica discover and address application vulnerabilities.

    Provided By Imperva

  • Podcasts // Jan 2012

    Insider Threats, Privileged User Abuse and Mitigation Techniques

    In this podcast, the speaker discusses about insider threats. The speaker explores the differences between careless and nefarious insiders and talks about the difficulties of managing risks surrounding privileged users. The speaker also discusses several threat mitigation strategies.

    Provided By Imperva

  • Podcasts // Jan 2012

    Insider Threats

    In this podcast, the speaker discusses extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. The speaker also covers the importance of sensitive data protection - especially around mission-critical applications and databases.

    Provided By Imperva

  • Podcasts // Jan 2012

    Direct Database SQL Injection Attacks and Mitigation Techniques

    In this podcast, the speaker discusses about Direct Database SQL Injection Attacks and how these attacks are preformed directly through the database interface or through Web applications. The speaker also talks about flaws in stored procedures that make these attacks possible.

    Provided By Imperva

  • Podcasts // Jan 2012

    PCI by the Numbers: Survey Results Explored

    In this podcast, the speaker discusses the results of his latest PCI DSS survey. The speaker talks about a number of fascinating and sometimes anomalistic statistics from the survey results, and shares his views and leanings.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With John P. Pironti, President of IP Architects and Interop Chairperson

    In this podcast, the speaker discusses about the relationship between security operations and business risk management. The speaker also shares his views on regulatory compliance and the changing landscape for network and data security professionals.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Joseph Weiss, Industry Expert on Control Systems and Electronic Security

    In this podcast, the speaker discusses about cyber security within industrial control system environments, SCADA, and NERC. The speaker shares a number of perspectives based upon his decades of experience, and some fascinating examples of how incidents related to cyber assets, have negatively impacted SCADA systems, destroyed multi-million dollar assets,...

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Raffy Marty - Chief Security Strategist for Splunk and Security Author

    In this podcast, the speaker discusses about the importance of visualization when analyzing network, security, application and database information. The speaker shares several use cases and provides insights on the relevance of visualization as a critical resource for any security practitioner.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Lars Ewe-CTO of Cenzic-WAF

    In this podcast, the speaker discusses the Imperva Cenzic partnership, and why bringing together vulnerability scanning services with Web Application Firewalls (WAF) is critical for application security. The speaker also shares his views on what the future holds for application security overall.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Dana Tamir on Data Discovery, Assessment and Classification

    In this podcast, the speaker discusses about the Imperva SecureSphere DAS (Discovery and Assessment Server) solution. The speaker outlines why this technology is critical to an effective data security strategy, they theory and technical details of how it works, as well as several use cases.

    Provided By Imperva

  • Podcasts // Jan 2012

    Leveraging WAF and DAM for Protecting Data, Securing Servers, Meeting Partner Requirements, Addressing PCI, and Beyond

    In this podcast, the speaker discusses about using Imperva SecureSphere WAF and DAM solutions. The speaker discusses key drivers such as sensitive data protection, securing mission-critical servers, addressing partner concerns over data security from Microsoft, Adobe, and Intuit (which require their partners to have strong data security solutions), and addressing...

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With the CISO of the State of Colorado and His Security Deputy on the Consolidation of IT Security Resources and Building Security in Early

    In this podcast, the speaker discusses several issues that are unique to state-level information security as well as several solid, modern approaches to developing an effective security posture. The consolidation of IT security resources such as security, database and application developers, etc under one umbrella, and the need for executive...

    Provided By Imperva

  • White Papers // Apr 2014

    Web Attack Survival Guide

    With an increasing amount of business being conducted online, the internet has quickly become the frontline in an ongoing battle between companies and an unseen enemy. Industrial espionage, sabotage and cyber terrorism are becoming more frequent, resulting in lost revenue, stolen data, service interruptions and damaged reputations. This white paper...

    Sponsored By Imperva

  • White Papers // Apr 2014

    What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This white paper lays out the six key requirements needed to protect Web...

    Sponsored By Imperva

  • White Papers // Apr 2014

    10 Things Every Web Application Firewall Should Provide

    Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Hackers evade traditional network security defenses to take down websites and to steal data. Malicious users probe websites around-the-clock looking for vulnerabilities. Automation tools such as off-the-shelf attack toolkits and botnets make it...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Cutting the Cost of Application Security

    Web application attacks can result in devastating data breaches and application downtime, costing companies millions of dollars in fines, brand damage, and customer turnover. This white paper illustrates how the Imperva SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and website downtime....

    Sponsored By Imperva

  • White Papers // Jul 2014

    How Malware and Targeted Attacks Infiltrate Your Data Center

    Advanced targeted attacks bypass the security perimeter and compromise individuals inside your enterprise to unleash attacks on your entire network. Read this white paper to learn more about: Attack Motivation How to Protect Your Sensitive Data and Critical Business Applications Complementing Traditional Defenses with Data Center Protection Effective Malware...

    Sponsored By Imperva

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Sponsored By Imperva

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Sponsored By Imperva

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Sponsored By Imperva

  • White Papers // Jul 2014

    Protect Your Critical Web Applications with Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • Research // Aug 2014

    The Hidden Cost of Compliance

    Database auditing is an integral part of every organization’s compliance protocol, but the built-in auditing tools that come with your database exact a heavy toll on hardware, software, storage, and human resource costs. Businesses have to comply with data protection statutes in more than 100 countries around the world,...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Mitigate the OWASP Top 10 Web Application Security Risks

    The OWASP Top 10 is widely recognized as one of the leading standards for identifying critical Web application security risks. This technical brief analyzes the risks in the OWASP Top 10 and outlines how you can protect your organization against each threat. Risks discussed in this paper include: cross-site scripting,...

    Provided By Imperva

  • Case Studies // Apr 2014

    TicketNetwork Selects Imperva SecureSphere to Secure Transactions

    Over 7.5 million tickets are offered on TicketNetwork's online ticket exchange every day. To protect the organization’s website and address PCI compliance, TicketNetwork chose the Imperva SecureSphere Web Application Firewall because of its high performance, its ease-of-management and its reputation-based security provided by ThreatRadar. This case study highlights why TicketNetwork...

    Provided By Imperva

  • White Papers // Jun 2014

    Data Privacy - the High Cost of Unprotected Sensitive Data

    The collection and use of Personally Identifiable Information (PII) is exploding. With this expansion, there is increasing pressure from individuals, industry regulators, and lawmakers for organizations to protect sensitive data from hacker attacks and insider abuse or theft. The six steps outlined in this paper illustrate the challenges around the...

    Provided By Imperva

  • White Papers // Jun 2014

    Four Steps to Deafeat a DDoS Attack

    Over the past several years, the industrialization of attacks and the rise of hacktivism have resulted in an explosion of powerful and destructive DDoS attacks. Using off-the-shelf toolkits, criminals can quickly build botnets of thousands or even millions of computers. Malicious users can rent these botnets to unleash destructive DDoS...

    Provided By Imperva

  • Research // Apr 2014

    Gartner Confirms: Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations.

    Provided By Imperva

  • Webcasts // Jan 2011

    Web Application Security Demo

    In this webcast, the presenters say about learn how the SecureSphere Web Application Firewall safeguards Web applications without modifying application behavior or impacting performance. This five minute webcast demonstrates common application threats and describes key product capabilities including automated application learning, up-to-date security defenses, and transparent deployment.

    Provided By Imperva

  • Webcasts // Jan 2011

    Blocking Malicious Attacks Using SQL Injection Signature Evasion

    This webcast demonstration is focused on a more advanced SQL Injection technique called "Signature evasion." As the name implies, these techniques allow SQL Injection attacks to be conducted while avoiding detection by security controls that rely on signatures.

    Provided By Imperva

  • Webcasts // Jan 2011

    Database Security Demo

    In this webcast, the presenters say about provides a high-level overview of Imperva's database security products and describes how the market-leading product addresses each step in the data security and compliance life cycle.

    Provided By Imperva

  • Webcasts // Jan 2011

    Detecting XSS Scripting (Cross-Site Scripting)

    This webcast should be viewed following the Script Injection video demonstration. Cross-site scripting ('XSS' or 'CSS') is an attack that takes advantage of a Web site vulnerability in which the site displays content that includes un-sanitized user-provided data.

    Provided By Imperva

  • Webcasts // Jan 2011

    Direct Database Access SQL Injection (Database Hacking)

    SQL injection is usually a technique used to take advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a backend database. Attackers take advantage of the fact that programmers often chain together SQL commands with user-provided parameters, and can therefore embed SQL commands...

    Provided By Imperva

  • Webcasts // Jan 2011

    File Security Demo

    In this webcast, the presenters say about learn how SecureSphere File Activity Monitoring addresses file auditing, security, and user rights management requirements. This five minute video explains how Imperva SecureSphere solves critical security, compliance, and IT operations challenges by monitoring file activity, finding data owners, and controlling permissions to sensitive...

    Provided By Imperva

  • Webcasts // Jan 2011

    Identifying & Blocking Blindfolded SQL Injection

    In this webcast, the presenters say about is focused on a more advanced SQL Injection technique called "Blindfolded SQL Injection." These techniques are useful when attacking a system that doesn't display robust error messages.

    Provided By Imperva

  • Webcasts // Jan 2011

    Identifying Database Privilege Abuse by Malicious Insiders

    In this webcast, the presenters say about example of database privilege abuse relates to direct database attacks without Web applications. A malicious insider can decompile a fat desktop Java client to glean credential information allowing him to directly access the database with elevated privileges.

    Provided By Imperva

  • Webcasts // Jan 2011

    Imperva Cloud WAF Introduction

    Imperva Cloud WAF is an easy and affordable Web Application Firewall service in the cloud that addresses PCI 6.6, and keeps hackers out while making websites faster. Imperva security experts provide continuous monitoring, policy tuning, and immediate incident response.

    Provided By Imperva

  • Webcasts // Jan 2011

    Insights on WikiLeaks From the Leader in Data Security

    In this webcast, the presenters say about WikiLeaks has rocked government and diplomatic circles, but it's a wake-up call for businesses as well. Join Amichai Shulman, Imperva CTO and head of the Application Defense Center, as he cuts through the WikiLeaks clutter to help organizations bolster their overall data security.

    Provided By Imperva

  • Webcasts // Jan 2011

    Mitigating Client Side Database Protocol Attacks

    In this webcast, the presenters explain about methods for attacking databases by leveraging a client side application as well as vulnerabilities within the database protocol. This example addresses Oracle 10i. Using a Hex or Text editor it is possible to modify the SQL login stream on the client side in...

    Provided By Imperva

  • Webcasts // Jan 2011

    Recognizing Web Application Parameter Tampering

    In this webcast, the presenters say about explores ways an attacker can modify parameters within a Web application. Parameter tampering is a simple attack targeting the application business logic. This attack takes advantage of the fact that many programmers rely on hidden or fixed fields (such as a hidden tag...

    Provided By Imperva

  • Webcasts // Jan 2011

    SecureSphere Interactive Audit Analytics

    In this webcast, the presenters say about SecureSphere Interactive Audit Analytics provides a fast reliable way to view audit data and understand database activities. Using various audit views it supports analysis and correlation of security events with just a few clicks of a mouse.

    Provided By Imperva

  • Webcasts // Jan 2011

    SecureSphere Web Application Firewall - Vulnerability Assessment Integration

    This webcast demonstrates how the Imperva SecureSphere Web Application Firewall integrates with application vulnerability scanners. Watch this video to find out how SecureSphere creates policies and detects and blocks attacks based on vulnerability assessment results.

    Provided By Imperva

  • Webcasts // Jan 2011

    Session Hijacking - Bypassing Web Application Security

    In this webcast, the presenters say about the session hijacking is the act of taking control of a user session after successfully obtaining or generating an authentication session ID. Session hijacking involves an attacker using captured, brute forced or reverse-engineered session IDs to seize control of a legitimate user's Web...

    Provided By Imperva

  • Webcasts // Jan 2011

    Understanding & Preventing SQL Injection - Part I

    This is the first of three video demonstrations on basic SQL Injection techniques. SQL injection is a technique used to take advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a backend database.

    Provided By Imperva

  • Webcasts // Jan 2011

    Understanding & Preventing SQL Injection - Part II

    In this second of three video, the presenters say about on basic SQL Injection techniques. SQL injection is a technique used to take advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a backend database.

    Provided By Imperva

  • Webcasts // Jan 2011

    Understanding & Preventing SQL Injection - Part III

    In this webcast, the presenters say about on basic SQL Injection techniques. SQL injection is a technique used to take advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a backend database.

    Provided By Imperva

  • Webcasts // Jan 2011

    Understanding Script Injection

    This webcast should be viewed as a prerequisite to the XSS video demonstration. Script Injection is a form of Web application attack where the victim Web server is tricked into running the attackers script/code.

    Provided By Imperva

  • Webcasts // Jan 2011

    Universal User Tracking

    In this webcast, the presenters say about Universal User Tracking technology enables organizations to track individual end users, even when user connections are pooled. This informative and concise video shows how Imperva's innovative Web to Database User Tracking technique accurately identifies end users in multi-tier environments.

    Provided By Imperva

  • Webcasts // Jan 2011

    User Rights Management for Databases

    In this webcast, the presenters say about User Rights Management for Databases (URMD) enables security, database administrators and audit teams to review rights associated with sensitive data and identify excessive or dormant rights based on organizational context and actual usage. In this webcast, will see how URM is used to...

    Provided By Imperva

  • Webcasts // Jan 2011

    Using Cookie Poisoning to Bypass Security Mechanisms

    In this webcast, the presenters say about cookie poisoning attacks. Cookie poisoning attacks involve the modification of the contents of a cookie (personal information stored in a Web user's computer) in order to bypass security mechanisms. Using cookie poisoning attacks, attackers can gain unauthorized information about another user and steal...

    Provided By Imperva

  • Webcasts // Jan 2012

    Put 1080p High-Definition Analytics Into Your IP Camera

    Advanced analytics is replacing simple motion detection in surveillance cameras. See how one can get 1080p high-definition (HD) analytics in their IP camera with a single-chip video analytics solution. In this webcast, the presneter discusses why FPGAs are ideal for high-definition video analytics systems.

    Provided By Imperva

  • Podcasts // Jan 2012

    Getting Started in Web Application Security

    In this podcast, the speaker talks about getting started in Web Application Security. The speaker discusses several tools and resources useful for those that are new to this industry and for seasoned experts.

    Provided By Imperva