Imperva

Displaying 1-40 of 70 results

  • Research // Aug 2014

    The Hidden Cost of Compliance

    Database auditing is an integral part of every organization’s compliance protocol, but the built-in auditing tools that come with your database exact a heavy toll on hardware, software, storage, and human resource costs. Businesses have to comply with data protection statutes in more than 100 countries around the world,...

    Provided By Imperva

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Provided By Imperva

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Provided By Imperva

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Provided By Imperva

  • White Papers // Jul 2014

    Protect Your Critical Web Applications with Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Provided By Imperva

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Provided By Imperva

  • White Papers // Jul 2014

    How Malware and Targeted Attacks Infiltrate Your Data Center

    Advanced targeted attacks bypass the security perimeter and compromise individuals inside your enterprise to unleash attacks on your entire network. Read this white paper to learn more about: Attack Motivation How to Protect Your Sensitive Data and Critical Business Applications Complementing Traditional Defenses with Data Center Protection Effective Malware...

    Provided By Imperva

  • White Papers // Jun 2014

    Data Privacy - the High Cost of Unprotected Sensitive Data

    The collection and use of Personally Identifiable Information (PII) is exploding. With this expansion, there is increasing pressure from individuals, industry regulators, and lawmakers for organizations to protect sensitive data from hacker attacks and insider abuse or theft. The six steps outlined in this paper illustrate the challenges around the...

    Provided By Imperva

  • White Papers // Jun 2014

    Four Steps to Deafeat a DDoS Attack

    Over the past several years, the industrialization of attacks and the rise of hacktivism have resulted in an explosion of powerful and destructive DDoS attacks. Using off-the-shelf toolkits, criminals can quickly build botnets of thousands or even millions of computers. Malicious users can rent these botnets to unleash destructive DDoS...

    Provided By Imperva

  • Research // Apr 2014

    Gartner Confirms: Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations.

    Provided By Imperva

  • White Papers // Apr 2014

    Web Attack Survival Guide

    With an increasing amount of business being conducted online, the internet has quickly become the frontline in an ongoing battle between companies and an unseen enemy. Industrial espionage, sabotage and cyber terrorism are becoming more frequent, resulting in lost revenue, stolen data, service interruptions and damaged reputations. This white paper...

    Provided By Imperva

  • White Papers // Apr 2014

    What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This white paper lays out the six key requirements needed to protect Web...

    Provided By Imperva

  • White Papers // Apr 2014

    10 Things Every Web Application Firewall Should Provide

    Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Hackers evade traditional network security defenses to take down websites and to steal data. Malicious users probe websites around-the-clock looking for vulnerabilities. Automation tools such as off-the-shelf attack toolkits and botnets make it...

    Provided By Imperva

  • White Papers // Apr 2014

    Mitigate the OWASP Top 10 Web Application Security Risks

    The OWASP Top 10 is widely recognized as one of the leading standards for identifying critical Web application security risks. This technical brief analyzes the risks in the OWASP Top 10 and outlines how you can protect your organization against each threat. Risks discussed in this paper include: cross-site scripting,...

    Provided By Imperva

  • White Papers // Apr 2014

    Cutting the Cost of Application Security

    Web application attacks can result in devastating data breaches and application downtime, costing companies millions of dollars in fines, brand damage, and customer turnover. This white paper illustrates how the Imperva SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and website downtime....

    Provided By Imperva

  • Case Studies // Apr 2014

    TicketNetwork Selects Imperva SecureSphere to Secure Transactions

    Over 7.5 million tickets are offered on TicketNetwork's online ticket exchange every day. To protect the organization’s website and address PCI compliance, TicketNetwork chose the Imperva SecureSphere Web Application Firewall because of its high performance, its ease-of-management and its reputation-based security provided by ThreatRadar. This case study highlights why TicketNetwork...

    Provided By Imperva

  • Podcasts // Jan 2012

    WAF, VA, Black Box Testing, and Related Solutions Necessary for a Strong Application Security Posture

    In this podcast, the speaker discusses why Imperva and BeyondSecurity have partnered to offer a combination of WAF, Black Box Testing, and Vulnerability Assessment services together. The speaker discusses several very interesting application security "Stories from the trenches," and shares his perspectives on the evolution of application security.

    Provided By Imperva

  • Podcasts // Jan 2012

    About Bringing Together to Worlds of WAF and VA to Improve Overall Application Security and Reduce Business Risk

    In this podcast, the speaker discusses why Imperva and Whitehat have partnered to offer a blended approach to Web application security through WAF plus VA. The speaker explains that the industry now requires these once diametrically opposed solutions to unite in order to address today's threats and reduce overall business...

    Provided By Imperva

  • Podcasts // Jan 2012

    Microsoft IIS WebDAV Remote Authentication Bypass

    In this podcast, the speaker talks about Microsoft Security. This vulnerability is related to Microsoft IIS servers running WebDAV. Amichai goes into detail about the vulnerability, why servers are still vulnerable even though this is a well known exploit, and how attacks can be mitigated with WAF or web application...

    Provided By Imperva

  • Podcasts // Jan 2012

    Convergence of Risk and Security

    In this podcast, the speaker discusses a wide range of subjects related to risk and security converging that who owns risk management, how can solutions like WAF be evaluated by businesses in terms of organizational risk, where is the real value in risk management how important are technical solutions and...

    Provided By Imperva

  • Podcasts // Jan 2012

    Data Security With WAF and DAM: Chad Lorenc of Agilent Talks About How His Use of the Imperva SecureSphere WAF and DAM Solutions Goes Beyond Traditional Firewalling and Monitoring

    In this podcast, the speaker discusses how the Imperva SecureSphere solutions helped the speaker discover critical assets, monitor their operations, and provide an ongoing strategic resource for data security initiatives.

    Provided By Imperva

  • Podcasts // Jan 2012

    Using WAF in Complex, Global Environments

    In this podcast, the speaker discusses about the importance of application security at Vonage. The speaker details several projects that are aimed at protecting Vonage as well as Vonage partners and customers. The speaker also shares his views on application security as it relates to vulnerability scanning, the Imperva SecureSphere...

    Provided By Imperva

  • Podcasts // Jan 2012

    Getting Started in Web Application Security

    In this podcast, the speaker talks about getting started in Web Application Security. The speaker discusses several tools and resources useful for those that are new to this industry and for seasoned experts.

    Provided By Imperva

  • Podcasts // Jan 2012

    Host of the Network Security Blog and Podcast Series, and QSA

    In this podcast, the speaker talks about the recent webcast from Homeland Security titled "Do the Payment card Industry Data Standards Reduce Cyber Crime." The speaker also shares with one of his perspectives on the changing security industry.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Raffy Marty - Chief Security Strategist for Splunk and Security Author

    In this podcast, the speaker discusses about the importance of visualization when analyzing network, security, application and database information. The speaker shares several use cases and provides insights on the relevance of visualization as a critical resource for any security practitioner.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Joseph Weiss, Industry Expert on Control Systems and Electronic Security

    In this podcast, the speaker discusses about cyber security within industrial control system environments, SCADA, and NERC. The speaker shares a number of perspectives based upon his decades of experience, and some fascinating examples of how incidents related to cyber assets, have negatively impacted SCADA systems, destroyed multi-million dollar assets,...

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With John P. Pironti, President of IP Architects and Interop Chairperson

    In this podcast, the speaker discusses about the relationship between security operations and business risk management. The speaker also shares his views on regulatory compliance and the changing landscape for network and data security professionals.

    Provided By Imperva

  • Podcasts // Jan 2012

    Adaptive Reputation-Based Defense(ThreatRadar)

    In this podcast, the speaker discusses imperva's ThreatRadar solution. The speaker outlines what it is, how it's used, and what customers can expect to gain from it. The speaker covers specific threat examples such as automated attacks and business logic attacks and how they can be addressed beyond blocking and...

    Provided By Imperva

  • Podcasts // Jan 2012

    Next Generation WAF (NG-WAF)

    In this podcast, the speaker discusses the Industrialization of Hacking and how that's creating a need for WAF solutions to evolve so they can address automated attacks, business logic attacks, and the existing and growing list of technical attacks such as SQL Injection, XSS, etc. The speaker also discusses mechanism...

    Provided By Imperva

  • Podcasts // Jan 2012

    Data Security at a Non-Profit Radio Station

    In this podcast, the speakers discusses the need for non-profits to protect sensitive information such as donor details. The key to a solid security strategy for EMF is data security, so the speaker talks about a number of controls that EMF has in place including the Imperva Database Activity Monitoring...

    Provided By Imperva

  • Podcasts // Jan 2012

    Software Security

    In this podcast, the speaker discusses about SDLC, building security in, incident prevention and incident detection, and leveraging Web Application Firewalls, or WAF. The speaker also talks about BSIMM - the Building Security In Maturity Model.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Dana Tamir on Data Discovery, Assessment and Classification

    In this podcast, the speaker discusses about the Imperva SecureSphere DAS (Discovery and Assessment Server) solution. The speaker outlines why this technology is critical to an effective data security strategy, they theory and technical details of how it works, as well as several use cases.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Lars Ewe-CTO of Cenzic-WAF

    In this podcast, the speaker discusses the Imperva Cenzic partnership, and why bringing together vulnerability scanning services with Web Application Firewalls (WAF) is critical for application security. The speaker also shares his views on what the future holds for application security overall.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With the CISO of the State of Colorado and His Security Deputy on the Consolidation of IT Security Resources and Building Security in Early

    In this podcast, the speaker discusses several issues that are unique to state-level information security as well as several solid, modern approaches to developing an effective security posture. The consolidation of IT security resources such as security, database and application developers, etc under one umbrella, and the need for executive...

    Provided By Imperva

  • Podcasts // Jan 2012

    Leveraging WAF and DAM for Protecting Data, Securing Servers, Meeting Partner Requirements, Addressing PCI, and Beyond

    In this podcast, the speaker discusses about using Imperva SecureSphere WAF and DAM solutions. The speaker discusses key drivers such as sensitive data protection, securing mission-critical servers, addressing partner concerns over data security from Microsoft, Adobe, and Intuit (which require their partners to have strong data security solutions), and addressing...

    Provided By Imperva

  • Podcasts // Jan 2012

    Direct Database SQL Injection Attacks and Mitigation Techniques

    In this podcast, the speaker discusses about Direct Database SQL Injection Attacks and how these attacks are preformed directly through the database interface or through Web applications. The speaker also talks about flaws in stored procedures that make these attacks possible.

    Provided By Imperva

  • Podcasts // Jan 2012

    PCI by the Numbers: Survey Results Explored

    In this podcast, the speaker discusses the results of his latest PCI DSS survey. The speaker talks about a number of fascinating and sometimes anomalistic statistics from the survey results, and shares his views and leanings.

    Provided By Imperva

  • Podcasts // Jan 2012

    Insider Threats, Privileged User Abuse and Mitigation Techniques

    In this podcast, the speaker discusses about insider threats. The speaker explores the differences between careless and nefarious insiders and talks about the difficulties of managing risks surrounding privileged users. The speaker also discusses several threat mitigation strategies.

    Provided By Imperva

  • Podcasts // Jan 2012

    Insider Threats

    In this podcast, the speaker discusses extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. The speaker also covers the importance of sensitive data protection - especially around mission-critical applications and databases.

    Provided By Imperva

  • Podcasts // Jan 2012

    Web Application Security Within Cloud Computing, SaaS, and Virtualized Environments

    In this podcast, the speaker discusses about cloud computing, SaaS, virtualization, and the need for Web Application Firewalls. The speaker shares some stories from the trenches, and talks about the trend in modern business to become more focused on core capabilities and less on infrastructure, thus getting back to managing...

    Provided By Imperva

  • Podcasts // Jan 2012

    WAF, VA, Black Box Testing, and Related Solutions Necessary for a Strong Application Security Posture

    In this podcast, the speaker discusses why Imperva and BeyondSecurity have partnered to offer a combination of WAF, Black Box Testing, and Vulnerability Assessment services together. The speaker discusses several very interesting application security "Stories from the trenches," and shares his perspectives on the evolution of application security.

    Provided By Imperva

  • Podcasts // Jan 2012

    About Bringing Together to Worlds of WAF and VA to Improve Overall Application Security and Reduce Business Risk

    In this podcast, the speaker discusses why Imperva and Whitehat have partnered to offer a blended approach to Web application security through WAF plus VA. The speaker explains that the industry now requires these once diametrically opposed solutions to unite in order to address today's threats and reduce overall business...

    Provided By Imperva

  • Podcasts // Jan 2012

    Microsoft IIS WebDAV Remote Authentication Bypass

    In this podcast, the speaker talks about Microsoft Security. This vulnerability is related to Microsoft IIS servers running WebDAV. Amichai goes into detail about the vulnerability, why servers are still vulnerable even though this is a well known exploit, and how attacks can be mitigated with WAF or web application...

    Provided By Imperva

  • Podcasts // Jan 2012

    Convergence of Risk and Security

    In this podcast, the speaker discusses a wide range of subjects related to risk and security converging that who owns risk management, how can solutions like WAF be evaluated by businesses in terms of organizational risk, where is the real value in risk management how important are technical solutions and...

    Provided By Imperva

  • Podcasts // Jan 2012

    Data Security With WAF and DAM: Chad Lorenc of Agilent Talks About How His Use of the Imperva SecureSphere WAF and DAM Solutions Goes Beyond Traditional Firewalling and Monitoring

    In this podcast, the speaker discusses how the Imperva SecureSphere solutions helped the speaker discover critical assets, monitor their operations, and provide an ongoing strategic resource for data security initiatives.

    Provided By Imperva

  • Podcasts // Jan 2012

    Using WAF in Complex, Global Environments

    In this podcast, the speaker discusses about the importance of application security at Vonage. The speaker details several projects that are aimed at protecting Vonage as well as Vonage partners and customers. The speaker also shares his views on application security as it relates to vulnerability scanning, the Imperva SecureSphere...

    Provided By Imperva

  • Podcasts // Jan 2012

    Getting Started in Web Application Security

    In this podcast, the speaker talks about getting started in Web Application Security. The speaker discusses several tools and resources useful for those that are new to this industry and for seasoned experts.

    Provided By Imperva

  • Podcasts // Jan 2012

    Host of the Network Security Blog and Podcast Series, and QSA

    In this podcast, the speaker talks about the recent webcast from Homeland Security titled "Do the Payment card Industry Data Standards Reduce Cyber Crime." The speaker also shares with one of his perspectives on the changing security industry.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Raffy Marty - Chief Security Strategist for Splunk and Security Author

    In this podcast, the speaker discusses about the importance of visualization when analyzing network, security, application and database information. The speaker shares several use cases and provides insights on the relevance of visualization as a critical resource for any security practitioner.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Joseph Weiss, Industry Expert on Control Systems and Electronic Security

    In this podcast, the speaker discusses about cyber security within industrial control system environments, SCADA, and NERC. The speaker shares a number of perspectives based upon his decades of experience, and some fascinating examples of how incidents related to cyber assets, have negatively impacted SCADA systems, destroyed multi-million dollar assets,...

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With John P. Pironti, President of IP Architects and Interop Chairperson

    In this podcast, the speaker discusses about the relationship between security operations and business risk management. The speaker also shares his views on regulatory compliance and the changing landscape for network and data security professionals.

    Provided By Imperva

  • Research // Apr 2014

    Gartner Confirms: Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations.

    Provided By Imperva

  • White Papers // Apr 2014

    Web Attack Survival Guide

    With an increasing amount of business being conducted online, the internet has quickly become the frontline in an ongoing battle between companies and an unseen enemy. Industrial espionage, sabotage and cyber terrorism are becoming more frequent, resulting in lost revenue, stolen data, service interruptions and damaged reputations. This white paper...

    Provided By Imperva

  • White Papers // Apr 2014

    What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This white paper lays out the six key requirements needed to protect Web...

    Provided By Imperva

  • White Papers // Apr 2014

    10 Things Every Web Application Firewall Should Provide

    Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Hackers evade traditional network security defenses to take down websites and to steal data. Malicious users probe websites around-the-clock looking for vulnerabilities. Automation tools such as off-the-shelf attack toolkits and botnets make it...

    Provided By Imperva

  • White Papers // Apr 2014

    Mitigate the OWASP Top 10 Web Application Security Risks

    The OWASP Top 10 is widely recognized as one of the leading standards for identifying critical Web application security risks. This technical brief analyzes the risks in the OWASP Top 10 and outlines how you can protect your organization against each threat. Risks discussed in this paper include: cross-site scripting,...

    Provided By Imperva

  • White Papers // Apr 2014

    Cutting the Cost of Application Security

    Web application attacks can result in devastating data breaches and application downtime, costing companies millions of dollars in fines, brand damage, and customer turnover. This white paper illustrates how the Imperva SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and website downtime....

    Provided By Imperva

  • Case Studies // Apr 2014

    TicketNetwork Selects Imperva SecureSphere to Secure Transactions

    Over 7.5 million tickets are offered on TicketNetwork's online ticket exchange every day. To protect the organization’s website and address PCI compliance, TicketNetwork chose the Imperva SecureSphere Web Application Firewall because of its high performance, its ease-of-management and its reputation-based security provided by ThreatRadar. This case study highlights why TicketNetwork...

    Provided By Imperva

  • White Papers // Jun 2014

    Data Privacy - the High Cost of Unprotected Sensitive Data

    The collection and use of Personally Identifiable Information (PII) is exploding. With this expansion, there is increasing pressure from individuals, industry regulators, and lawmakers for organizations to protect sensitive data from hacker attacks and insider abuse or theft. The six steps outlined in this paper illustrate the challenges around the...

    Provided By Imperva

  • White Papers // Jun 2014

    Four Steps to Deafeat a DDoS Attack

    Over the past several years, the industrialization of attacks and the rise of hacktivism have resulted in an explosion of powerful and destructive DDoS attacks. Using off-the-shelf toolkits, criminals can quickly build botnets of thousands or even millions of computers. Malicious users can rent these botnets to unleash destructive DDoS...

    Provided By Imperva

  • White Papers // Jul 2014

    How Malware and Targeted Attacks Infiltrate Your Data Center

    Advanced targeted attacks bypass the security perimeter and compromise individuals inside your enterprise to unleash attacks on your entire network. Read this white paper to learn more about: Attack Motivation How to Protect Your Sensitive Data and Critical Business Applications Complementing Traditional Defenses with Data Center Protection Effective Malware...

    Provided By Imperva

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Provided By Imperva

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Provided By Imperva

  • Podcasts // Jan 2012

    Adaptive Reputation-Based Defense(ThreatRadar)

    In this podcast, the speaker discusses imperva's ThreatRadar solution. The speaker outlines what it is, how it's used, and what customers can expect to gain from it. The speaker covers specific threat examples such as automated attacks and business logic attacks and how they can be addressed beyond blocking and...

    Provided By Imperva

  • Podcasts // Jan 2012

    Next Generation WAF (NG-WAF)

    In this podcast, the speaker discusses the Industrialization of Hacking and how that's creating a need for WAF solutions to evolve so they can address automated attacks, business logic attacks, and the existing and growing list of technical attacks such as SQL Injection, XSS, etc. The speaker also discusses mechanism...

    Provided By Imperva

  • Podcasts // Jan 2012

    Data Security at a Non-Profit Radio Station

    In this podcast, the speakers discusses the need for non-profits to protect sensitive information such as donor details. The key to a solid security strategy for EMF is data security, so the speaker talks about a number of controls that EMF has in place including the Imperva Database Activity Monitoring...

    Provided By Imperva

  • Podcasts // Jan 2012

    Software Security

    In this podcast, the speaker discusses about SDLC, building security in, incident prevention and incident detection, and leveraging Web Application Firewalls, or WAF. The speaker also talks about BSIMM - the Building Security In Maturity Model.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Dana Tamir on Data Discovery, Assessment and Classification

    In this podcast, the speaker discusses about the Imperva SecureSphere DAS (Discovery and Assessment Server) solution. The speaker outlines why this technology is critical to an effective data security strategy, they theory and technical details of how it works, as well as several use cases.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With Lars Ewe-CTO of Cenzic-WAF

    In this podcast, the speaker discusses the Imperva Cenzic partnership, and why bringing together vulnerability scanning services with Web Application Firewalls (WAF) is critical for application security. The speaker also shares his views on what the future holds for application security overall.

    Provided By Imperva

  • Podcasts // Jan 2012

    Interview With the CISO of the State of Colorado and His Security Deputy on the Consolidation of IT Security Resources and Building Security in Early

    In this podcast, the speaker discusses several issues that are unique to state-level information security as well as several solid, modern approaches to developing an effective security posture. The consolidation of IT security resources such as security, database and application developers, etc under one umbrella, and the need for executive...

    Provided By Imperva

  • Podcasts // Jan 2012

    Leveraging WAF and DAM for Protecting Data, Securing Servers, Meeting Partner Requirements, Addressing PCI, and Beyond

    In this podcast, the speaker discusses about using Imperva SecureSphere WAF and DAM solutions. The speaker discusses key drivers such as sensitive data protection, securing mission-critical servers, addressing partner concerns over data security from Microsoft, Adobe, and Intuit (which require their partners to have strong data security solutions), and addressing...

    Provided By Imperva

  • Podcasts // Jan 2012

    Direct Database SQL Injection Attacks and Mitigation Techniques

    In this podcast, the speaker discusses about Direct Database SQL Injection Attacks and how these attacks are preformed directly through the database interface or through Web applications. The speaker also talks about flaws in stored procedures that make these attacks possible.

    Provided By Imperva

  • Podcasts // Jan 2012

    PCI by the Numbers: Survey Results Explored

    In this podcast, the speaker discusses the results of his latest PCI DSS survey. The speaker talks about a number of fascinating and sometimes anomalistic statistics from the survey results, and shares his views and leanings.

    Provided By Imperva

  • Podcasts // Jan 2012

    Insider Threats, Privileged User Abuse and Mitigation Techniques

    In this podcast, the speaker discusses about insider threats. The speaker explores the differences between careless and nefarious insiders and talks about the difficulties of managing risks surrounding privileged users. The speaker also discusses several threat mitigation strategies.

    Provided By Imperva

  • Podcasts // Jan 2012

    Insider Threats

    In this podcast, the speaker discusses extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. The speaker also covers the importance of sensitive data protection - especially around mission-critical applications and databases.

    Provided By Imperva

  • Podcasts // Jan 2012

    Web Application Security Within Cloud Computing, SaaS, and Virtualized Environments

    In this podcast, the speaker discusses about cloud computing, SaaS, virtualization, and the need for Web Application Firewalls. The speaker shares some stories from the trenches, and talks about the trend in modern business to become more focused on core capabilities and less on infrastructure, thus getting back to managing...

    Provided By Imperva

  • Podcasts // Jan 2012

    Protecting Web Portals and Bringing Together Security Operations and Development With the Imperva SecureSphere WAF at Telefonica O2 Germany

    In this podcast, the speaker shares his experiences around choosing, implementing and operating the Imperva SecureSphere Web Application Firewall (WAF). The speaker shares a number of examples where WAF helped Telefonica discover and address application vulnerabilities.

    Provided By Imperva

  • Podcasts // Jan 2012

    SQL Injection Attacks and Mitigation Techniques

    In this podcast, the speaker discusses about Direct Database SQL Injection attacks. The speaker also discusses how these attacks are preformed directly through the database interface or through Web applications. The speaker also talks about flaws in stored procedures that make these attacks possible.

    Provided By Imperva

  • Podcasts // Jan 2012

    Compliance and Security Within the Financial Industry

    In this podcast, the speaker discusses about the financial industry, and how security and compliance have been changing. The speaker also touches on financial modernization, the convergence of NIST and ISO, and the risk management continuum.

    Provided By Imperva

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Provided By Imperva