Imperva

Displaying 1-40 of 70 results

  • Research // Aug 2014

    The Hidden Cost of Compliance

    Database auditing is an integral part of every organization’s compliance protocol, but the built-in auditing tools that come with your database exact a heavy toll on hardware, software, storage, and human resource costs. Businesses have to comply with data protection statutes in more than 100 countries around the world,...

    Sponsored By Imperva

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Sponsored By Imperva

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Sponsored By Imperva

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Sponsored By Imperva

  • White Papers // Jul 2014

    Protect Your Critical Web Applications with Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • White Papers // Jul 2014

    How Malware and Targeted Attacks Infiltrate Your Data Center

    Advanced targeted attacks bypass the security perimeter and compromise individuals inside your enterprise to unleash attacks on your entire network. Read this white paper to learn more about: Attack Motivation How to Protect Your Sensitive Data and Critical Business Applications Complementing Traditional Defenses with Data Center Protection Effective Malware...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Web Attack Survival Guide

    With an increasing amount of business being conducted online, the internet has quickly become the frontline in an ongoing battle between companies and an unseen enemy. Industrial espionage, sabotage and cyber terrorism are becoming more frequent, resulting in lost revenue, stolen data, service interruptions and damaged reputations. This white paper...

    Sponsored By Imperva

  • White Papers // Apr 2014

    What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This white paper lays out the six key requirements needed to protect Web...

    Sponsored By Imperva

  • White Papers // Apr 2014

    10 Things Every Web Application Firewall Should Provide

    Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Hackers evade traditional network security defenses to take down websites and to steal data. Malicious users probe websites around-the-clock looking for vulnerabilities. Automation tools such as off-the-shelf attack toolkits and botnets make it...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Cutting the Cost of Application Security

    Web application attacks can result in devastating data breaches and application downtime, costing companies millions of dollars in fines, brand damage, and customer turnover. This white paper illustrates how the Imperva SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and website downtime....

    Sponsored By Imperva

  • White Papers // Jun 2014

    Data Privacy - the High Cost of Unprotected Sensitive Data

    The collection and use of Personally Identifiable Information (PII) is exploding. With this expansion, there is increasing pressure from individuals, industry regulators, and lawmakers for organizations to protect sensitive data from hacker attacks and insider abuse or theft. The six steps outlined in this paper illustrate the challenges around the...

    Provided By Imperva

  • White Papers // Jun 2014

    Four Steps to Deafeat a DDoS Attack

    Over the past several years, the industrialization of attacks and the rise of hacktivism have resulted in an explosion of powerful and destructive DDoS attacks. Using off-the-shelf toolkits, criminals can quickly build botnets of thousands or even millions of computers. Malicious users can rent these botnets to unleash destructive DDoS...

    Provided By Imperva

  • White Papers // Apr 2014

    Mitigate the OWASP Top 10 Web Application Security Risks

    The OWASP Top 10 is widely recognized as one of the leading standards for identifying critical Web application security risks. This technical brief analyzes the risks in the OWASP Top 10 and outlines how you can protect your organization against each threat. Risks discussed in this paper include: cross-site scripting,...

    Provided By Imperva

  • Case Studies // Apr 2014

    TicketNetwork Selects Imperva SecureSphere to Secure Transactions

    Over 7.5 million tickets are offered on TicketNetwork's online ticket exchange every day. To protect the organization’s website and address PCI compliance, TicketNetwork chose the Imperva SecureSphere Web Application Firewall because of its high performance, its ease-of-management and its reputation-based security provided by ThreatRadar. This case study highlights why TicketNetwork...

    Provided By Imperva

  • Research // Apr 2014

    Gartner Confirms: Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations.

    Provided By Imperva

  • Podcasts // Jan 2012

    Perspectives on Data Security in Asia - An interview with Terry Ray

    In this podcast, the speaker discusses how different regions approach application and database security, current events such as the recent Google attacks in China, and how the Asian community is applying countermeasures to protect their sensitive applications and databases.

    Provided By Imperva

  • Podcasts // Jan 2012

    Securing Mission-Critical Web Applications - An Interview With Catho Online CTO

    In this podcast, the speaker discusses importance of Web application security for one of the largest job-search websites in South America. Catho Online is the largest job-search website in South America, and one of the top 15 in the world. It is the market leader in its segment.

    Provided By Imperva

  • Podcasts // Jan 2012

    Adaptive Reputation-Based Defense(ThreatRadar)

    In this podcast, the speaker discusses imperva's ThreatRadar solution. The speaker outlines what it is, how it's used, and what customers can expect to gain from it. The speaker covers specific threat examples such as automated attacks and business logic attacks and how they can be addressed beyond blocking and...

    Provided By Imperva

  • Podcasts // Jan 2012

    Next Generation WAF (NG-WAF)

    In this podcast, the speaker discusses the Industrialization of Hacking and how that's creating a need for WAF solutions to evolve so they can address automated attacks, business logic attacks, and the existing and growing list of technical attacks such as SQL Injection, XSS, etc. The speaker also discusses mechanism...

    Provided By Imperva

  • Podcasts // Jan 2012

    Data Security at a Non-Profit Radio Station

    In this podcast, the speakers discusses the need for non-profits to protect sensitive information such as donor details. The key to a solid security strategy for EMF is data security, so the speaker talks about a number of controls that EMF has in place including the Imperva Database Activity Monitoring...

    Provided By Imperva

  • Podcasts // Jan 2012

    Software Security

    In this podcast, the speaker discusses about SDLC, building security in, incident prevention and incident detection, and leveraging Web Application Firewalls, or WAF. The speaker also talks about BSIMM - the Building Security In Maturity Model.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Dana Tamir on Data Discovery, Assessment and Classification

    In this podcast, the speaker discusses about the Imperva SecureSphere DAS (Discovery and Assessment Server) solution. The speaker outlines why this technology is critical to an effective data security strategy, they theory and technical details of how it works, as well as several use cases.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Lars Ewe-CTO of Cenzic-WAF

    In this podcast, the speaker discusses the Imperva Cenzic partnership, and why bringing together vulnerability scanning services with Web Application Firewalls (WAF) is critical for application security. The speaker also shares his views on what the future holds for application security overall.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With the CISO of the State of Colorado and His Security Deputy on the Consolidation of IT Security Resources and Building Security in Early

    In this podcast, the speaker discusses several issues that are unique to state-level information security as well as several solid, modern approaches to developing an effective security posture. The consolidation of IT security resources such as security, database and application developers, etc under one umbrella, and the need for executive...

    Provided By Imperva

  • Podcasts // Jan 2012

    Leveraging WAF and DAM for Protecting Data, Securing Servers, Meeting Partner Requirements, Addressing PCI, and Beyond

    In this podcast, the speaker discusses about using Imperva SecureSphere WAF and DAM solutions. The speaker discusses key drivers such as sensitive data protection, securing mission-critical servers, addressing partner concerns over data security from Microsoft, Adobe, and Intuit (which require their partners to have strong data security solutions), and addressing...

    Provided By Imperva

  • Podcasts // Jan 2012

    Direct Database SQL Injection Attacks and Mitigation Techniques

    In this podcast, the speaker discusses about Direct Database SQL Injection Attacks and how these attacks are preformed directly through the database interface or through Web applications. The speaker also talks about flaws in stored procedures that make these attacks possible.

    Provided By Imperva

  • Podcasts // Jan 2012

    PCI by the Numbers: Survey Results Explored

    In this podcast, the speaker discusses the results of his latest PCI DSS survey. The speaker talks about a number of fascinating and sometimes anomalistic statistics from the survey results, and shares his views and leanings.

    Provided By Imperva

  • Podcasts // Jan 2012

    Insider Threats, Privileged User Abuse and Mitigation Techniques

    In this podcast, the speaker discusses about insider threats. The speaker explores the differences between careless and nefarious insiders and talks about the difficulties of managing risks surrounding privileged users. The speaker also discusses several threat mitigation strategies.

    Provided By Imperva

  • Podcasts // Jan 2012

    Insider Threats

    In this podcast, the speaker discusses extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. The speaker also covers the importance of sensitive data protection - especially around mission-critical applications and databases.

    Provided By Imperva

  • Podcasts // Jan 2012

    Web Application Security Within Cloud Computing, SaaS, and Virtualized Environments

    In this podcast, the speaker discusses about cloud computing, SaaS, virtualization, and the need for Web Application Firewalls. The speaker shares some stories from the trenches, and talks about the trend in modern business to become more focused on core capabilities and less on infrastructure, thus getting back to managing...

    Provided By Imperva

  • Podcasts // Jan 2012

    Protecting Web Portals and Bringing Together Security Operations and Development With the Imperva SecureSphere WAF at Telefonica O2 Germany

    In this podcast, the speaker shares his experiences around choosing, implementing and operating the Imperva SecureSphere Web Application Firewall (WAF). The speaker shares a number of examples where WAF helped Telefonica discover and address application vulnerabilities.

    Provided By Imperva

  • Podcasts // Jan 2012

    SQL Injection Attacks and Mitigation Techniques

    In this podcast, the speaker discusses about Direct Database SQL Injection attacks. The speaker also discusses how these attacks are preformed directly through the database interface or through Web applications. The speaker also talks about flaws in stored procedures that make these attacks possible.

    Provided By Imperva

  • Podcasts // Jan 2012

    Compliance and Security Within the Financial Industry

    In this podcast, the speaker discusses about the financial industry, and how security and compliance have been changing. The speaker also touches on financial modernization, the convergence of NIST and ISO, and the risk management continuum.

    Provided By Imperva

  • Podcasts // Jan 2012

    WAF, VA, Black Box Testing, and Related Solutions Necessary for a Strong Application Security Posture

    In this podcast, the speaker discusses why Imperva and BeyondSecurity have partnered to offer a combination of WAF, Black Box Testing, and Vulnerability Assessment services together. The speaker discusses several very interesting application security "Stories from the trenches," and shares his perspectives on the evolution of application security.

    Provided By Imperva

  • Podcasts // Jan 2012

    About Bringing Together to Worlds of WAF and VA to Improve Overall Application Security and Reduce Business Risk

    In this podcast, the speaker discusses why Imperva and Whitehat have partnered to offer a blended approach to Web application security through WAF plus VA. The speaker explains that the industry now requires these once diametrically opposed solutions to unite in order to address today's threats and reduce overall business...

    Provided By Imperva

  • Webcasts // Jan 2012

    Put 1080p High-Definition Analytics Into Your IP Camera

    Advanced analytics is replacing simple motion detection in surveillance cameras. See how one can get 1080p high-definition (HD) analytics in their IP camera with a single-chip video analytics solution. In this webcast, the presneter discusses why FPGAs are ideal for high-definition video analytics systems.

    Provided By Imperva

  • Podcasts // Jan 2012

    Application Security Survey Results - An Interview With Jeremiah Grossman

    In this podcast, the speaker discusses the latest application security survey conducted by the Ponemon Institute. The speaker gives his perspectives on the survey results and details the why and how of the survey's findings.

    Provided By Imperva

  • Podcasts // Jan 2012

    Application Security Survey Results - An interview with Dr. Larry Ponemon

    In this podcast, the speaker discusses why this survey is so timely given the state of application security. He goes on to discuss some of the statistical findings as well as well as his interpretation of the results. Finally, the speaker outlines what companies that are getting application security done...

    Provided By Imperva

  • Podcasts // Jan 2012

    Microsoft IIS WebDAV Remote Authentication Bypass

    In this podcast, the speaker talks about Microsoft Security. This vulnerability is related to Microsoft IIS servers running WebDAV. Amichai goes into detail about the vulnerability, why servers are still vulnerable even though this is a well known exploit, and how attacks can be mitigated with WAF or web application...

    Provided By Imperva

  • White Papers // Apr 2014

    Web Attack Survival Guide

    With an increasing amount of business being conducted online, the internet has quickly become the frontline in an ongoing battle between companies and an unseen enemy. Industrial espionage, sabotage and cyber terrorism are becoming more frequent, resulting in lost revenue, stolen data, service interruptions and damaged reputations. This white paper...

    Sponsored By Imperva

  • White Papers // Apr 2014

    What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This white paper lays out the six key requirements needed to protect Web...

    Sponsored By Imperva

  • White Papers // Apr 2014

    10 Things Every Web Application Firewall Should Provide

    Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Hackers evade traditional network security defenses to take down websites and to steal data. Malicious users probe websites around-the-clock looking for vulnerabilities. Automation tools such as off-the-shelf attack toolkits and botnets make it...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Cutting the Cost of Application Security

    Web application attacks can result in devastating data breaches and application downtime, costing companies millions of dollars in fines, brand damage, and customer turnover. This white paper illustrates how the Imperva SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and website downtime....

    Sponsored By Imperva

  • White Papers // Jul 2014

    How Malware and Targeted Attacks Infiltrate Your Data Center

    Advanced targeted attacks bypass the security perimeter and compromise individuals inside your enterprise to unleash attacks on your entire network. Read this white paper to learn more about: Attack Motivation How to Protect Your Sensitive Data and Critical Business Applications Complementing Traditional Defenses with Data Center Protection Effective Malware...

    Sponsored By Imperva

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Sponsored By Imperva

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Sponsored By Imperva

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Sponsored By Imperva

  • White Papers // Jul 2014

    Protect Your Critical Web Applications with Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • Research // Aug 2014

    The Hidden Cost of Compliance

    Database auditing is an integral part of every organization’s compliance protocol, but the built-in auditing tools that come with your database exact a heavy toll on hardware, software, storage, and human resource costs. Businesses have to comply with data protection statutes in more than 100 countries around the world,...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Mitigate the OWASP Top 10 Web Application Security Risks

    The OWASP Top 10 is widely recognized as one of the leading standards for identifying critical Web application security risks. This technical brief analyzes the risks in the OWASP Top 10 and outlines how you can protect your organization against each threat. Risks discussed in this paper include: cross-site scripting,...

    Provided By Imperva

  • Case Studies // Apr 2014

    TicketNetwork Selects Imperva SecureSphere to Secure Transactions

    Over 7.5 million tickets are offered on TicketNetwork's online ticket exchange every day. To protect the organization’s website and address PCI compliance, TicketNetwork chose the Imperva SecureSphere Web Application Firewall because of its high performance, its ease-of-management and its reputation-based security provided by ThreatRadar. This case study highlights why TicketNetwork...

    Provided By Imperva

  • White Papers // Jun 2014

    Data Privacy - the High Cost of Unprotected Sensitive Data

    The collection and use of Personally Identifiable Information (PII) is exploding. With this expansion, there is increasing pressure from individuals, industry regulators, and lawmakers for organizations to protect sensitive data from hacker attacks and insider abuse or theft. The six steps outlined in this paper illustrate the challenges around the...

    Provided By Imperva

  • White Papers // Jun 2014

    Four Steps to Deafeat a DDoS Attack

    Over the past several years, the industrialization of attacks and the rise of hacktivism have resulted in an explosion of powerful and destructive DDoS attacks. Using off-the-shelf toolkits, criminals can quickly build botnets of thousands or even millions of computers. Malicious users can rent these botnets to unleash destructive DDoS...

    Provided By Imperva

  • Podcasts // Jan 2012

    Perspectives on Data Security in Asia - An interview with Terry Ray

    In this podcast, the speaker discusses how different regions approach application and database security, current events such as the recent Google attacks in China, and how the Asian community is applying countermeasures to protect their sensitive applications and databases.

    Provided By Imperva

  • Podcasts // Jan 2012

    Securing Mission-Critical Web Applications - An Interview With Catho Online CTO

    In this podcast, the speaker discusses importance of Web application security for one of the largest job-search websites in South America. Catho Online is the largest job-search website in South America, and one of the top 15 in the world. It is the market leader in its segment.

    Provided By Imperva

  • Podcasts // Jan 2012

    Adaptive Reputation-Based Defense(ThreatRadar)

    In this podcast, the speaker discusses imperva's ThreatRadar solution. The speaker outlines what it is, how it's used, and what customers can expect to gain from it. The speaker covers specific threat examples such as automated attacks and business logic attacks and how they can be addressed beyond blocking and...

    Provided By Imperva

  • Podcasts // Jan 2012

    Next Generation WAF (NG-WAF)

    In this podcast, the speaker discusses the Industrialization of Hacking and how that's creating a need for WAF solutions to evolve so they can address automated attacks, business logic attacks, and the existing and growing list of technical attacks such as SQL Injection, XSS, etc. The speaker also discusses mechanism...

    Provided By Imperva

  • Podcasts // Jan 2012

    Data Security at a Non-Profit Radio Station

    In this podcast, the speakers discusses the need for non-profits to protect sensitive information such as donor details. The key to a solid security strategy for EMF is data security, so the speaker talks about a number of controls that EMF has in place including the Imperva Database Activity Monitoring...

    Provided By Imperva

  • Podcasts // Jan 2012

    Software Security

    In this podcast, the speaker discusses about SDLC, building security in, incident prevention and incident detection, and leveraging Web Application Firewalls, or WAF. The speaker also talks about BSIMM - the Building Security In Maturity Model.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Dana Tamir on Data Discovery, Assessment and Classification

    In this podcast, the speaker discusses about the Imperva SecureSphere DAS (Discovery and Assessment Server) solution. The speaker outlines why this technology is critical to an effective data security strategy, they theory and technical details of how it works, as well as several use cases.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Lars Ewe-CTO of Cenzic-WAF

    In this podcast, the speaker discusses the Imperva Cenzic partnership, and why bringing together vulnerability scanning services with Web Application Firewalls (WAF) is critical for application security. The speaker also shares his views on what the future holds for application security overall.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With the CISO of the State of Colorado and His Security Deputy on the Consolidation of IT Security Resources and Building Security in Early

    In this podcast, the speaker discusses several issues that are unique to state-level information security as well as several solid, modern approaches to developing an effective security posture. The consolidation of IT security resources such as security, database and application developers, etc under one umbrella, and the need for executive...

    Provided By Imperva

  • Podcasts // Jan 2012

    Leveraging WAF and DAM for Protecting Data, Securing Servers, Meeting Partner Requirements, Addressing PCI, and Beyond

    In this podcast, the speaker discusses about using Imperva SecureSphere WAF and DAM solutions. The speaker discusses key drivers such as sensitive data protection, securing mission-critical servers, addressing partner concerns over data security from Microsoft, Adobe, and Intuit (which require their partners to have strong data security solutions), and addressing...

    Provided By Imperva

  • Podcasts // Jan 2012

    Direct Database SQL Injection Attacks and Mitigation Techniques

    In this podcast, the speaker discusses about Direct Database SQL Injection Attacks and how these attacks are preformed directly through the database interface or through Web applications. The speaker also talks about flaws in stored procedures that make these attacks possible.

    Provided By Imperva

  • Podcasts // Jan 2012

    PCI by the Numbers: Survey Results Explored

    In this podcast, the speaker discusses the results of his latest PCI DSS survey. The speaker talks about a number of fascinating and sometimes anomalistic statistics from the survey results, and shares his views and leanings.

    Provided By Imperva

  • Podcasts // Jan 2012

    Insider Threats, Privileged User Abuse and Mitigation Techniques

    In this podcast, the speaker discusses about insider threats. The speaker explores the differences between careless and nefarious insiders and talks about the difficulties of managing risks surrounding privileged users. The speaker also discusses several threat mitigation strategies.

    Provided By Imperva

  • Podcasts // Jan 2012

    Insider Threats

    In this podcast, the speaker discusses extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. The speaker also covers the importance of sensitive data protection - especially around mission-critical applications and databases.

    Provided By Imperva

  • Podcasts // Jan 2012

    Web Application Security Within Cloud Computing, SaaS, and Virtualized Environments

    In this podcast, the speaker discusses about cloud computing, SaaS, virtualization, and the need for Web Application Firewalls. The speaker shares some stories from the trenches, and talks about the trend in modern business to become more focused on core capabilities and less on infrastructure, thus getting back to managing...

    Provided By Imperva

  • Podcasts // Jan 2012

    Protecting Web Portals and Bringing Together Security Operations and Development With the Imperva SecureSphere WAF at Telefonica O2 Germany

    In this podcast, the speaker shares his experiences around choosing, implementing and operating the Imperva SecureSphere Web Application Firewall (WAF). The speaker shares a number of examples where WAF helped Telefonica discover and address application vulnerabilities.

    Provided By Imperva

  • Podcasts // Jan 2012

    SQL Injection Attacks and Mitigation Techniques

    In this podcast, the speaker discusses about Direct Database SQL Injection attacks. The speaker also discusses how these attacks are preformed directly through the database interface or through Web applications. The speaker also talks about flaws in stored procedures that make these attacks possible.

    Provided By Imperva

  • Podcasts // Jan 2012

    Compliance and Security Within the Financial Industry

    In this podcast, the speaker discusses about the financial industry, and how security and compliance have been changing. The speaker also touches on financial modernization, the convergence of NIST and ISO, and the risk management continuum.

    Provided By Imperva

  • Podcasts // Jan 2012

    WAF, VA, Black Box Testing, and Related Solutions Necessary for a Strong Application Security Posture

    In this podcast, the speaker discusses why Imperva and BeyondSecurity have partnered to offer a combination of WAF, Black Box Testing, and Vulnerability Assessment services together. The speaker discusses several very interesting application security "Stories from the trenches," and shares his perspectives on the evolution of application security.

    Provided By Imperva

  • Podcasts // Jan 2012

    About Bringing Together to Worlds of WAF and VA to Improve Overall Application Security and Reduce Business Risk

    In this podcast, the speaker discusses why Imperva and Whitehat have partnered to offer a blended approach to Web application security through WAF plus VA. The speaker explains that the industry now requires these once diametrically opposed solutions to unite in order to address today's threats and reduce overall business...

    Provided By Imperva

  • Research // Apr 2014

    Gartner Confirms: Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations.

    Provided By Imperva

  • Webcasts // Jan 2011

    Web Application Security Demo

    In this webcast, the presenters say about learn how the SecureSphere Web Application Firewall safeguards Web applications without modifying application behavior or impacting performance. This five minute webcast demonstrates common application threats and describes key product capabilities including automated application learning, up-to-date security defenses, and transparent deployment.

    Provided By Imperva

  • Webcasts // Jan 2011

    Blocking Malicious Attacks Using SQL Injection Signature Evasion

    This webcast demonstration is focused on a more advanced SQL Injection technique called "Signature evasion." As the name implies, these techniques allow SQL Injection attacks to be conducted while avoiding detection by security controls that rely on signatures.

    Provided By Imperva

  • Webcasts // Jan 2011

    Database Security Demo

    In this webcast, the presenters say about provides a high-level overview of Imperva's database security products and describes how the market-leading product addresses each step in the data security and compliance life cycle.

    Provided By Imperva

  • Webcasts // Jan 2011

    Detecting XSS Scripting (Cross-Site Scripting)

    This webcast should be viewed following the Script Injection video demonstration. Cross-site scripting ('XSS' or 'CSS') is an attack that takes advantage of a Web site vulnerability in which the site displays content that includes un-sanitized user-provided data.

    Provided By Imperva