Imperva

Displaying 1-40 of 69 results

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Sponsored By Imperva

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Sponsored By Imperva

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Sponsored By Imperva

  • White Papers // Jul 2014

    Protect Your Critical Web Applications with Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • White Papers // Jul 2014

    How Malware and Targeted Attacks Infiltrate Your Data Center

    Advanced targeted attacks bypass the security perimeter and compromise individuals inside your enterprise to unleash attacks on your entire network. Read this white paper to learn more about: Attack Motivation How to Protect Your Sensitive Data and Critical Business Applications Complementing Traditional Defenses with Data Center Protection Effective Malware...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Web Attack Survival Guide

    With an increasing amount of business being conducted online, the internet has quickly become the frontline in an ongoing battle between companies and an unseen enemy. Industrial espionage, sabotage and cyber terrorism are becoming more frequent, resulting in lost revenue, stolen data, service interruptions and damaged reputations. This white paper...

    Sponsored By Imperva

  • White Papers // Apr 2014

    What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This white paper lays out the six key requirements needed to protect Web...

    Sponsored By Imperva

  • White Papers // Apr 2014

    10 Things Every Web Application Firewall Should Provide

    Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Hackers evade traditional network security defenses to take down websites and to steal data. Malicious users probe websites around-the-clock looking for vulnerabilities. Automation tools such as off-the-shelf attack toolkits and botnets make it...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Cutting the Cost of Application Security

    Web application attacks can result in devastating data breaches and application downtime, costing companies millions of dollars in fines, brand damage, and customer turnover. This white paper illustrates how the Imperva SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and website downtime....

    Sponsored By Imperva

  • White Papers // Jun 2014

    Data Privacy - the High Cost of Unprotected Sensitive Data

    The collection and use of Personally Identifiable Information (PII) is exploding. With this expansion, there is increasing pressure from individuals, industry regulators, and lawmakers for organizations to protect sensitive data from hacker attacks and insider abuse or theft. The six steps outlined in this paper illustrate the challenges around the...

    Provided By Imperva

  • White Papers // Jun 2014

    Four Steps to Deafeat a DDoS Attack

    Over the past several years, the industrialization of attacks and the rise of hacktivism have resulted in an explosion of powerful and destructive DDoS attacks. Using off-the-shelf toolkits, criminals can quickly build botnets of thousands or even millions of computers. Malicious users can rent these botnets to unleash destructive DDoS...

    Provided By Imperva

  • Research // Apr 2014

    Gartner Confirms: Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations.

    Provided By Imperva

  • White Papers // Apr 2014

    Mitigate the OWASP Top 10 Web Application Security Risks

    The OWASP Top 10 is widely recognized as one of the leading standards for identifying critical Web application security risks. This technical brief analyzes the risks in the OWASP Top 10 and outlines how you can protect your organization against each threat. Risks discussed in this paper include: cross-site scripting,...

    Provided By Imperva

  • Case Studies // Apr 2014

    TicketNetwork Selects Imperva SecureSphere to Secure Transactions

    Over 7.5 million tickets are offered on TicketNetwork's online ticket exchange every day. To protect the organization’s website and address PCI compliance, TicketNetwork chose the Imperva SecureSphere Web Application Firewall because of its high performance, its ease-of-management and its reputation-based security provided by ThreatRadar. This case study highlights why TicketNetwork...

    Provided By Imperva

  • Webcasts // Jan 2012

    Put 1080p High-Definition Analytics Into Your IP Camera

    Advanced analytics is replacing simple motion detection in surveillance cameras. See how one can get 1080p high-definition (HD) analytics in their IP camera with a single-chip video analytics solution. In this webcast, the presneter discusses why FPGAs are ideal for high-definition video analytics systems.

    Provided By Imperva

  • Podcasts // Jan 2012

    Application Security Survey Results - An Interview With Jeremiah Grossman

    In this podcast, the speaker discusses the latest application security survey conducted by the Ponemon Institute. The speaker gives his perspectives on the survey results and details the why and how of the survey's findings.

    Provided By Imperva

  • Podcasts // Jan 2012

    Application Security Survey Results - An interview with Dr. Larry Ponemon

    In this podcast, the speaker discusses why this survey is so timely given the state of application security. He goes on to discuss some of the statistical findings as well as well as his interpretation of the results. Finally, the speaker outlines what companies that are getting application security done...

    Provided By Imperva

  • Podcasts // Jan 2012

    Perspectives on Data Security in Asia - An interview with Terry Ray

    In this podcast, the speaker discusses how different regions approach application and database security, current events such as the recent Google attacks in China, and how the Asian community is applying countermeasures to protect their sensitive applications and databases.

    Provided By Imperva

  • Podcasts // Jan 2012

    Securing Mission-Critical Web Applications - An Interview With Catho Online CTO

    In this podcast, the speaker discusses importance of Web application security for one of the largest job-search websites in South America. Catho Online is the largest job-search website in South America, and one of the top 15 in the world. It is the market leader in its segment.

    Provided By Imperva

  • Podcasts // Jan 2012

    Adaptive Reputation-Based Defense(ThreatRadar)

    In this podcast, the speaker discusses imperva's ThreatRadar solution. The speaker outlines what it is, how it's used, and what customers can expect to gain from it. The speaker covers specific threat examples such as automated attacks and business logic attacks and how they can be addressed beyond blocking and...

    Provided By Imperva

  • Podcasts // Jan 2012

    Next Generation WAF (NG-WAF)

    In this podcast, the speaker discusses the Industrialization of Hacking and how that's creating a need for WAF solutions to evolve so they can address automated attacks, business logic attacks, and the existing and growing list of technical attacks such as SQL Injection, XSS, etc. The speaker also discusses mechanism...

    Provided By Imperva

  • Podcasts // Jan 2012

    Data Security at a Non-Profit Radio Station

    In this podcast, the speakers discusses the need for non-profits to protect sensitive information such as donor details. The key to a solid security strategy for EMF is data security, so the speaker talks about a number of controls that EMF has in place including the Imperva Database Activity Monitoring...

    Provided By Imperva

  • Podcasts // Jan 2012

    Software Security

    In this podcast, the speaker discusses about SDLC, building security in, incident prevention and incident detection, and leveraging Web Application Firewalls, or WAF. The speaker also talks about BSIMM - the Building Security In Maturity Model.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Dana Tamir on Data Discovery, Assessment and Classification

    In this podcast, the speaker discusses about the Imperva SecureSphere DAS (Discovery and Assessment Server) solution. The speaker outlines why this technology is critical to an effective data security strategy, they theory and technical details of how it works, as well as several use cases.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Lars Ewe-CTO of Cenzic-WAF

    In this podcast, the speaker discusses the Imperva Cenzic partnership, and why bringing together vulnerability scanning services with Web Application Firewalls (WAF) is critical for application security. The speaker also shares his views on what the future holds for application security overall.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With the CISO of the State of Colorado and His Security Deputy on the Consolidation of IT Security Resources and Building Security in Early

    In this podcast, the speaker discusses several issues that are unique to state-level information security as well as several solid, modern approaches to developing an effective security posture. The consolidation of IT security resources such as security, database and application developers, etc under one umbrella, and the need for executive...

    Provided By Imperva

  • Podcasts // Jan 2012

    Leveraging WAF and DAM for Protecting Data, Securing Servers, Meeting Partner Requirements, Addressing PCI, and Beyond

    In this podcast, the speaker discusses about using Imperva SecureSphere WAF and DAM solutions. The speaker discusses key drivers such as sensitive data protection, securing mission-critical servers, addressing partner concerns over data security from Microsoft, Adobe, and Intuit (which require their partners to have strong data security solutions), and addressing...

    Provided By Imperva

  • Podcasts // Jan 2012

    Direct Database SQL Injection Attacks and Mitigation Techniques

    In this podcast, the speaker discusses about Direct Database SQL Injection Attacks and how these attacks are preformed directly through the database interface or through Web applications. The speaker also talks about flaws in stored procedures that make these attacks possible.

    Provided By Imperva

  • Podcasts // Jan 2012

    PCI by the Numbers: Survey Results Explored

    In this podcast, the speaker discusses the results of his latest PCI DSS survey. The speaker talks about a number of fascinating and sometimes anomalistic statistics from the survey results, and shares his views and leanings.

    Provided By Imperva

  • Podcasts // Jan 2012

    Insider Threats, Privileged User Abuse and Mitigation Techniques

    In this podcast, the speaker discusses about insider threats. The speaker explores the differences between careless and nefarious insiders and talks about the difficulties of managing risks surrounding privileged users. The speaker also discusses several threat mitigation strategies.

    Provided By Imperva

  • Podcasts // Jan 2012

    Insider Threats

    In this podcast, the speaker discusses extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. The speaker also covers the importance of sensitive data protection - especially around mission-critical applications and databases.

    Provided By Imperva

  • Podcasts // Jan 2012

    Web Application Security Within Cloud Computing, SaaS, and Virtualized Environments

    In this podcast, the speaker discusses about cloud computing, SaaS, virtualization, and the need for Web Application Firewalls. The speaker shares some stories from the trenches, and talks about the trend in modern business to become more focused on core capabilities and less on infrastructure, thus getting back to managing...

    Provided By Imperva

  • Podcasts // Jan 2012

    Protecting Web Portals and Bringing Together Security Operations and Development With the Imperva SecureSphere WAF at Telefonica O2 Germany

    In this podcast, the speaker shares his experiences around choosing, implementing and operating the Imperva SecureSphere Web Application Firewall (WAF). The speaker shares a number of examples where WAF helped Telefonica discover and address application vulnerabilities.

    Provided By Imperva

  • Podcasts // Jan 2012

    SQL Injection Attacks and Mitigation Techniques

    In this podcast, the speaker discusses about Direct Database SQL Injection attacks. The speaker also discusses how these attacks are preformed directly through the database interface or through Web applications. The speaker also talks about flaws in stored procedures that make these attacks possible.

    Provided By Imperva

  • Podcasts // Jan 2012

    Compliance and Security Within the Financial Industry

    In this podcast, the speaker discusses about the financial industry, and how security and compliance have been changing. The speaker also touches on financial modernization, the convergence of NIST and ISO, and the risk management continuum.

    Provided By Imperva

  • Podcasts // Jan 2012

    WAF, VA, Black Box Testing, and Related Solutions Necessary for a Strong Application Security Posture

    In this podcast, the speaker discusses why Imperva and BeyondSecurity have partnered to offer a combination of WAF, Black Box Testing, and Vulnerability Assessment services together. The speaker discusses several very interesting application security "Stories from the trenches," and shares his perspectives on the evolution of application security.

    Provided By Imperva

  • Podcasts // Jan 2012

    About Bringing Together to Worlds of WAF and VA to Improve Overall Application Security and Reduce Business Risk

    In this podcast, the speaker discusses why Imperva and Whitehat have partnered to offer a blended approach to Web application security through WAF plus VA. The speaker explains that the industry now requires these once diametrically opposed solutions to unite in order to address today's threats and reduce overall business...

    Provided By Imperva

  • Podcasts // Jan 2012

    Microsoft IIS WebDAV Remote Authentication Bypass

    In this podcast, the speaker talks about Microsoft Security. This vulnerability is related to Microsoft IIS servers running WebDAV. Amichai goes into detail about the vulnerability, why servers are still vulnerable even though this is a well known exploit, and how attacks can be mitigated with WAF or web application...

    Provided By Imperva

  • Podcasts // Jan 2012

    Convergence of Risk and Security

    In this podcast, the speaker discusses a wide range of subjects related to risk and security converging that who owns risk management, how can solutions like WAF be evaluated by businesses in terms of organizational risk, where is the real value in risk management how important are technical solutions and...

    Provided By Imperva

  • White Papers // Apr 2014

    Web Attack Survival Guide

    With an increasing amount of business being conducted online, the internet has quickly become the frontline in an ongoing battle between companies and an unseen enemy. Industrial espionage, sabotage and cyber terrorism are becoming more frequent, resulting in lost revenue, stolen data, service interruptions and damaged reputations. This white paper...

    Sponsored By Imperva

  • White Papers // Apr 2014

    What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This white paper lays out the six key requirements needed to protect Web...

    Sponsored By Imperva

  • White Papers // Apr 2014

    10 Things Every Web Application Firewall Should Provide

    Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Hackers evade traditional network security defenses to take down websites and to steal data. Malicious users probe websites around-the-clock looking for vulnerabilities. Automation tools such as off-the-shelf attack toolkits and botnets make it...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Cutting the Cost of Application Security

    Web application attacks can result in devastating data breaches and application downtime, costing companies millions of dollars in fines, brand damage, and customer turnover. This white paper illustrates how the Imperva SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and website downtime....

    Sponsored By Imperva

  • White Papers // Jul 2014

    How Malware and Targeted Attacks Infiltrate Your Data Center

    Advanced targeted attacks bypass the security perimeter and compromise individuals inside your enterprise to unleash attacks on your entire network. Read this white paper to learn more about: Attack Motivation How to Protect Your Sensitive Data and Critical Business Applications Complementing Traditional Defenses with Data Center Protection Effective Malware...

    Sponsored By Imperva

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Sponsored By Imperva

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Sponsored By Imperva

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Sponsored By Imperva

  • White Papers // Jul 2014

    Protect Your Critical Web Applications with Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • Podcasts // Jan 2012

    Microsoft IIS WebDAV Remote Authentication Bypass

    In this podcast, the speaker talks about Microsoft Security. This vulnerability is related to Microsoft IIS servers running WebDAV. Amichai goes into detail about the vulnerability, why servers are still vulnerable even though this is a well known exploit, and how attacks can be mitigated with WAF or web application...

    Provided By Imperva

  • Podcasts // Jan 2012

    Convergence of Risk and Security

    In this podcast, the speaker discusses a wide range of subjects related to risk and security converging that who owns risk management, how can solutions like WAF be evaluated by businesses in terms of organizational risk, where is the real value in risk management how important are technical solutions and...

    Provided By Imperva

  • Podcasts // Jan 2012

    Data Security With WAF and DAM: Chad Lorenc of Agilent Talks About How His Use of the Imperva SecureSphere WAF and DAM Solutions Goes Beyond Traditional Firewalling and Monitoring

    In this podcast, the speaker discusses how the Imperva SecureSphere solutions helped the speaker discover critical assets, monitor their operations, and provide an ongoing strategic resource for data security initiatives.

    Provided By Imperva

  • Podcasts // Jan 2012

    Using WAF in Complex, Global Environments

    In this podcast, the speaker discusses about the importance of application security at Vonage. The speaker details several projects that are aimed at protecting Vonage as well as Vonage partners and customers. The speaker also shares his views on application security as it relates to vulnerability scanning, the Imperva SecureSphere...

    Provided By Imperva

  • Podcasts // Jan 2012

    Getting Started in Web Application Security

    In this podcast, the speaker talks about getting started in Web Application Security. The speaker discusses several tools and resources useful for those that are new to this industry and for seasoned experts.

    Provided By Imperva

  • Podcasts // Jan 2012

    Host of the Network Security Blog and Podcast Series, and QSA

    In this podcast, the speaker talks about the recent webcast from Homeland Security titled "Do the Payment card Industry Data Standards Reduce Cyber Crime." The speaker also shares with one of his perspectives on the changing security industry.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Raffy Marty - Chief Security Strategist for Splunk and Security Author

    In this podcast, the speaker discusses about the importance of visualization when analyzing network, security, application and database information. The speaker shares several use cases and provides insights on the relevance of visualization as a critical resource for any security practitioner.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Joseph Weiss, Industry Expert on Control Systems and Electronic Security

    In this podcast, the speaker discusses about cyber security within industrial control system environments, SCADA, and NERC. The speaker shares a number of perspectives based upon his decades of experience, and some fascinating examples of how incidents related to cyber assets, have negatively impacted SCADA systems, destroyed multi-million dollar assets,...

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With John P. Pironti, President of IP Architects and Interop Chairperson

    In this podcast, the speaker discusses about the relationship between security operations and business risk management. The speaker also shares his views on regulatory compliance and the changing landscape for network and data security professionals.

    Provided By Imperva

  • White Papers // Apr 2014

    Mitigate the OWASP Top 10 Web Application Security Risks

    The OWASP Top 10 is widely recognized as one of the leading standards for identifying critical Web application security risks. This technical brief analyzes the risks in the OWASP Top 10 and outlines how you can protect your organization against each threat. Risks discussed in this paper include: cross-site scripting,...

    Provided By Imperva

  • Case Studies // Apr 2014

    TicketNetwork Selects Imperva SecureSphere to Secure Transactions

    Over 7.5 million tickets are offered on TicketNetwork's online ticket exchange every day. To protect the organization’s website and address PCI compliance, TicketNetwork chose the Imperva SecureSphere Web Application Firewall because of its high performance, its ease-of-management and its reputation-based security provided by ThreatRadar. This case study highlights why TicketNetwork...

    Provided By Imperva

  • White Papers // Jun 2014

    Data Privacy - the High Cost of Unprotected Sensitive Data

    The collection and use of Personally Identifiable Information (PII) is exploding. With this expansion, there is increasing pressure from individuals, industry regulators, and lawmakers for organizations to protect sensitive data from hacker attacks and insider abuse or theft. The six steps outlined in this paper illustrate the challenges around the...

    Provided By Imperva

  • White Papers // Jun 2014

    Four Steps to Deafeat a DDoS Attack

    Over the past several years, the industrialization of attacks and the rise of hacktivism have resulted in an explosion of powerful and destructive DDoS attacks. Using off-the-shelf toolkits, criminals can quickly build botnets of thousands or even millions of computers. Malicious users can rent these botnets to unleash destructive DDoS...

    Provided By Imperva

  • Webcasts // Jan 2011

    Web Application Security Demo

    In this webcast, the presenters say about learn how the SecureSphere Web Application Firewall safeguards Web applications without modifying application behavior or impacting performance. This five minute webcast demonstrates common application threats and describes key product capabilities including automated application learning, up-to-date security defenses, and transparent deployment.

    Provided By Imperva

  • Webcasts // Jan 2011

    Blocking Malicious Attacks Using SQL Injection Signature Evasion

    This webcast demonstration is focused on a more advanced SQL Injection technique called "Signature evasion." As the name implies, these techniques allow SQL Injection attacks to be conducted while avoiding detection by security controls that rely on signatures.

    Provided By Imperva

  • Webcasts // Jan 2011

    Database Security Demo

    In this webcast, the presenters say about provides a high-level overview of Imperva's database security products and describes how the market-leading product addresses each step in the data security and compliance life cycle.

    Provided By Imperva

  • Webcasts // Jan 2011

    Detecting XSS Scripting (Cross-Site Scripting)

    This webcast should be viewed following the Script Injection video demonstration. Cross-site scripting ('XSS' or 'CSS') is an attack that takes advantage of a Web site vulnerability in which the site displays content that includes un-sanitized user-provided data.

    Provided By Imperva

  • Webcasts // Jan 2011

    Direct Database Access SQL Injection (Database Hacking)

    SQL injection is usually a technique used to take advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a backend database. Attackers take advantage of the fact that programmers often chain together SQL commands with user-provided parameters, and can therefore embed SQL commands...

    Provided By Imperva

  • Webcasts // Jan 2011

    File Security Demo

    In this webcast, the presenters say about learn how SecureSphere File Activity Monitoring addresses file auditing, security, and user rights management requirements. This five minute video explains how Imperva SecureSphere solves critical security, compliance, and IT operations challenges by monitoring file activity, finding data owners, and controlling permissions to sensitive...

    Provided By Imperva

  • Webcasts // Jan 2011

    Identifying & Blocking Blindfolded SQL Injection

    In this webcast, the presenters say about is focused on a more advanced SQL Injection technique called "Blindfolded SQL Injection." These techniques are useful when attacking a system that doesn't display robust error messages.

    Provided By Imperva

  • Webcasts // Jan 2011

    Identifying Database Privilege Abuse by Malicious Insiders

    In this webcast, the presenters say about example of database privilege abuse relates to direct database attacks without Web applications. A malicious insider can decompile a fat desktop Java client to glean credential information allowing him to directly access the database with elevated privileges.

    Provided By Imperva

  • Webcasts // Jan 2011

    Imperva Cloud WAF Introduction

    Imperva Cloud WAF is an easy and affordable Web Application Firewall service in the cloud that addresses PCI 6.6, and keeps hackers out while making websites faster. Imperva security experts provide continuous monitoring, policy tuning, and immediate incident response.

    Provided By Imperva

  • Webcasts // Jan 2011

    Insights on WikiLeaks From the Leader in Data Security

    In this webcast, the presenters say about WikiLeaks has rocked government and diplomatic circles, but it's a wake-up call for businesses as well. Join Amichai Shulman, Imperva CTO and head of the Application Defense Center, as he cuts through the WikiLeaks clutter to help organizations bolster their overall data security.

    Provided By Imperva

  • Webcasts // Jan 2011

    Mitigating Client Side Database Protocol Attacks

    In this webcast, the presenters explain about methods for attacking databases by leveraging a client side application as well as vulnerabilities within the database protocol. This example addresses Oracle 10i. Using a Hex or Text editor it is possible to modify the SQL login stream on the client side in...

    Provided By Imperva

  • Webcasts // Jan 2011

    Recognizing Web Application Parameter Tampering

    In this webcast, the presenters say about explores ways an attacker can modify parameters within a Web application. Parameter tampering is a simple attack targeting the application business logic. This attack takes advantage of the fact that many programmers rely on hidden or fixed fields (such as a hidden tag...

    Provided By Imperva

  • Webcasts // Jan 2011

    SecureSphere Interactive Audit Analytics

    In this webcast, the presenters say about SecureSphere Interactive Audit Analytics provides a fast reliable way to view audit data and understand database activities. Using various audit views it supports analysis and correlation of security events with just a few clicks of a mouse.

    Provided By Imperva

  • Webcasts // Jan 2011

    SecureSphere Web Application Firewall - Vulnerability Assessment Integration

    This webcast demonstrates how the Imperva SecureSphere Web Application Firewall integrates with application vulnerability scanners. Watch this video to find out how SecureSphere creates policies and detects and blocks attacks based on vulnerability assessment results.

    Provided By Imperva

  • Webcasts // Jan 2011

    Session Hijacking - Bypassing Web Application Security

    In this webcast, the presenters say about the session hijacking is the act of taking control of a user session after successfully obtaining or generating an authentication session ID. Session hijacking involves an attacker using captured, brute forced or reverse-engineered session IDs to seize control of a legitimate user's Web...

    Provided By Imperva

  • Research // Apr 2014

    Gartner Confirms: Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations.

    Provided By Imperva

  • Podcasts // Jan 2012

    Perspectives on Data Security in Asia - An interview with Terry Ray

    In this podcast, the speaker discusses how different regions approach application and database security, current events such as the recent Google attacks in China, and how the Asian community is applying countermeasures to protect their sensitive applications and databases.

    Provided By Imperva