Imperva

Displaying 1-9 of 9 results

  • White Papers // Jul 2014

    Protect Your Critical Web Applications with Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • White Papers // Jul 2014

    How Malware and Targeted Attacks Infiltrate Your Data Center

    Advanced targeted attacks bypass the security perimeter and compromise individuals inside your enterprise to unleash attacks on your entire network. Read this white paper to learn more about: Attack Motivation How to Protect Your Sensitive Data and Critical Business Applications Complementing Traditional Defenses with Data Center Protection Effective Malware...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Web Attack Survival Guide

    With an increasing amount of business being conducted online, the internet has quickly become the frontline in an ongoing battle between companies and an unseen enemy. Industrial espionage, sabotage and cyber terrorism are becoming more frequent, resulting in lost revenue, stolen data, service interruptions and damaged reputations. This white paper...

    Sponsored By Imperva

  • White Papers // Apr 2014

    What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This white paper lays out the six key requirements needed to protect Web...

    Sponsored By Imperva

  • White Papers // Apr 2014

    10 Things Every Web Application Firewall Should Provide

    Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Hackers evade traditional network security defenses to take down websites and to steal data. Malicious users probe websites around-the-clock looking for vulnerabilities. Automation tools such as off-the-shelf attack toolkits and botnets make it...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Cutting the Cost of Application Security

    Web application attacks can result in devastating data breaches and application downtime, costing companies millions of dollars in fines, brand damage, and customer turnover. This white paper illustrates how the Imperva SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and website downtime....

    Sponsored By Imperva

  • White Papers // Jun 2014

    Data Privacy - the High Cost of Unprotected Sensitive Data

    The collection and use of Personally Identifiable Information (PII) is exploding. With this expansion, there is increasing pressure from individuals, industry regulators, and lawmakers for organizations to protect sensitive data from hacker attacks and insider abuse or theft. The six steps outlined in this paper illustrate the challenges around the...

    Provided By Imperva

  • White Papers // Jun 2014

    Four Steps to Deafeat a DDoS Attack

    Over the past several years, the industrialization of attacks and the rise of hacktivism have resulted in an explosion of powerful and destructive DDoS attacks. Using off-the-shelf toolkits, criminals can quickly build botnets of thousands or even millions of computers. Malicious users can rent these botnets to unleash destructive DDoS...

    Provided By Imperva

  • White Papers // Apr 2014

    Mitigate the OWASP Top 10 Web Application Security Risks

    The OWASP Top 10 is widely recognized as one of the leading standards for identifying critical Web application security risks. This technical brief analyzes the risks in the OWASP Top 10 and outlines how you can protect your organization against each threat. Risks discussed in this paper include: cross-site scripting,...

    Provided By Imperva

  • White Papers // Apr 2014

    Web Attack Survival Guide

    With an increasing amount of business being conducted online, the internet has quickly become the frontline in an ongoing battle between companies and an unseen enemy. Industrial espionage, sabotage and cyber terrorism are becoming more frequent, resulting in lost revenue, stolen data, service interruptions and damaged reputations. This white paper...

    Sponsored By Imperva

  • White Papers // Apr 2014

    What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This white paper lays out the six key requirements needed to protect Web...

    Sponsored By Imperva

  • White Papers // Apr 2014

    10 Things Every Web Application Firewall Should Provide

    Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Hackers evade traditional network security defenses to take down websites and to steal data. Malicious users probe websites around-the-clock looking for vulnerabilities. Automation tools such as off-the-shelf attack toolkits and botnets make it...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Cutting the Cost of Application Security

    Web application attacks can result in devastating data breaches and application downtime, costing companies millions of dollars in fines, brand damage, and customer turnover. This white paper illustrates how the Imperva SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and website downtime....

    Sponsored By Imperva

  • White Papers // Jul 2014

    How Malware and Targeted Attacks Infiltrate Your Data Center

    Advanced targeted attacks bypass the security perimeter and compromise individuals inside your enterprise to unleash attacks on your entire network. Read this white paper to learn more about: Attack Motivation How to Protect Your Sensitive Data and Critical Business Applications Complementing Traditional Defenses with Data Center Protection Effective Malware...

    Sponsored By Imperva

  • White Papers // Jul 2014

    Protect Your Critical Web Applications with Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Mitigate the OWASP Top 10 Web Application Security Risks

    The OWASP Top 10 is widely recognized as one of the leading standards for identifying critical Web application security risks. This technical brief analyzes the risks in the OWASP Top 10 and outlines how you can protect your organization against each threat. Risks discussed in this paper include: cross-site scripting,...

    Provided By Imperva

  • White Papers // Jun 2014

    Data Privacy - the High Cost of Unprotected Sensitive Data

    The collection and use of Personally Identifiable Information (PII) is exploding. With this expansion, there is increasing pressure from individuals, industry regulators, and lawmakers for organizations to protect sensitive data from hacker attacks and insider abuse or theft. The six steps outlined in this paper illustrate the challenges around the...

    Provided By Imperva

  • White Papers // Jun 2014

    Four Steps to Deafeat a DDoS Attack

    Over the past several years, the industrialization of attacks and the rise of hacktivism have resulted in an explosion of powerful and destructive DDoS attacks. Using off-the-shelf toolkits, criminals can quickly build botnets of thousands or even millions of computers. Malicious users can rent these botnets to unleash destructive DDoS...

    Provided By Imperva