Imperva

Displaying 1 - 10 of 70 results

  • The Hidden Cost of Compliance

    Research // Aug 2014 // provided by Imperva

    Database auditing is an integral part of every organization’s compliance protocol, but the built-in auditing tools that come with your database exact a heavy toll on hardware, software, storage, and human resource costs. Businesses have to comply with data protection statutes in more than 100 countries around the world, ...

    Download Now
  • Protect Your Critical Web Applications with Imperva

    White Papers // Jul 2014 // provided by Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate ...

    Download Now
  • 2014 Gartner Magic Quadrant for Web Application Firewalls

    Research // Jul 2014 // provided by Imperva

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Download Now
  • Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Webcasts // Jul 2014 // provided by Imperva

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead ...

    Watch Now
  • Monitor and Protect Critical Web Applications with a Web Application Firewall

    Videos // Jul 2014 // provided by Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate ...

    Watch Now
  • Web Application Firewalls Are Worth the Investment for Enterprises

    Research // Jul 2014 // provided by Imperva

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology ...

    Download Now
  • How Malware and Targeted Attacks Infiltrate Your Data Center

    White Papers // Jul 2014 // provided by Imperva

    Advanced targeted attacks bypass the security perimeter and compromise individuals inside your enterprise to unleash attacks on your entire network. Read this white paper to learn more about: Attack Motivation How to Protect Your Sensitive Data and Critical Business Applications Complementing Traditional Defenses with Data Center Protection Effective Malware ...

    Download Now
  • Data Privacy - the High Cost of Unprotected Sensitive Data

    White Papers // Jun 2014 // provided by Imperva

    The collection and use of Personally Identifiable Information (PII) is exploding. With this expansion, there is increasing pressure from individuals, industry regulators, and lawmakers for organizations to protect sensitive data from hacker attacks and insider abuse or theft. The six steps outlined in this paper illustrate the challenges around the ...

    Download Now
  • Four Steps to Deafeat a DDoS Attack

    White Papers // Jun 2014 // provided by Imperva

    Over the past several years, the industrialization of attacks and the rise of hacktivism have resulted in an explosion of powerful and destructive DDoS attacks. Using off-the-shelf toolkits, criminals can quickly build botnets of thousands or even millions of computers. Malicious users can rent these botnets to unleash destructive DDoS ...

    Download Now
  • Web Attack Survival Guide

    White Papers // Apr 2014 // provided by Imperva

    With an increasing amount of business being conducted online, the internet has quickly become the frontline in an ongoing battle between companies and an unseen enemy. Industrial espionage, sabotage and cyber terrorism are becoming more frequent, resulting in lost revenue, stolen data, service interruptions and damaged reputations. This white paper ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?