Imperva

Displaying 1 - 10 of 70 results

  • The Hidden Cost of Compliance

    Research // Aug 2014 // provided by Imperva

    Database auditing is an integral part of every organization’s compliance protocol, but the built-in auditing tools that come with your database exact a heavy toll on hardware, software, storage, and human resource costs. Businesses have to comply with data protection statutes in more than 100 countries around the world, ...

    Learn more
  • Web Application Firewalls Are Worth the Investment for Enterprises

    Research // Jul 2014 // provided by Imperva

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology ...

    Find out more
  • 2014 Gartner Magic Quadrant for Web Application Firewalls

    Research // Jul 2014 // provided by Imperva

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Learn more
  • Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Webcasts // Jul 2014 // provided by Imperva

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead ...

    View this now
  • Protect Your Critical Web Applications with Imperva

    White Papers // Jul 2014 // provided by Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate ...

    Learn more
  • Monitor and Protect Critical Web Applications with a Web Application Firewall

    Videos // Jul 2014 // provided by Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate ...

    View this now
  • How Malware and Targeted Attacks Infiltrate Your Data Center

    White Papers // Jul 2014 // provided by Imperva

    Advanced targeted attacks bypass the security perimeter and compromise individuals inside your enterprise to unleash attacks on your entire network. Read this white paper to learn more about: Attack Motivation How to Protect Your Sensitive Data and Critical Business Applications Complementing Traditional Defenses with Data Center Protection Effective Malware ...

    Download Now
  • Data Privacy - the High Cost of Unprotected Sensitive Data

    White Papers // Jun 2014 // provided by Imperva

    The collection and use of Personally Identifiable Information (PII) is exploding. With this expansion, there is increasing pressure from individuals, industry regulators, and lawmakers for organizations to protect sensitive data from hacker attacks and insider abuse or theft. The six steps outlined in this paper illustrate the challenges around the ...

    Download Now
  • Four Steps to Deafeat a DDoS Attack

    White Papers // Jun 2014 // provided by Imperva

    Over the past several years, the industrialization of attacks and the rise of hacktivism have resulted in an explosion of powerful and destructive DDoS attacks. Using off-the-shelf toolkits, criminals can quickly build botnets of thousands or even millions of computers. Malicious users can rent these botnets to unleash destructive DDoS ...

    Download Now
  • Gartner Confirms: Web Application Firewalls Are Worth the Investment for Enterprises

    Research // Apr 2014 // provided by Imperva

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations.

    View this now