• Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Webcasts // Jul 2014 // provided by Imperva

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead ...

    View this now
  • Put 1080p High-Definition Analytics Into Your IP Camera

    Webcasts // Jan 2012 // provided by Imperva

    Advanced analytics is replacing simple motion detection in surveillance cameras. See how one can get 1080p high-definition (HD) analytics in their IP camera with a single-chip video analytics solution. In this webcast, the presneter discusses why FPGAs are ideal for high-definition video analytics systems.

    Watch Now
  • Identifying Database Privilege Abuse by Malicious Insiders

    Webcasts // Jan 2011 // provided by Imperva

    In this webcast, the presenters say about example of database privilege abuse relates to direct database attacks without Web applications. A malicious insider can decompile a fat desktop Java client to glean credential information allowing him to directly access the database with elevated privileges.

    Watch Now
  • Imperva Cloud WAF Introduction

    Webcasts // Jan 2011 // provided by Imperva

    Imperva Cloud WAF is an easy and affordable Web Application Firewall service in the cloud that addresses PCI 6.6, and keeps hackers out while making websites faster. Imperva security experts provide continuous monitoring, policy tuning, and immediate incident response.

    Watch Now
  • Insights on WikiLeaks From the Leader in Data Security

    Webcasts // Jan 2011 // provided by Imperva

    In this webcast, the presenters say about WikiLeaks has rocked government and diplomatic circles, but it's a wake-up call for businesses as well. Join Amichai Shulman, Imperva CTO and head of the Application Defense Center, as he cuts through the WikiLeaks clutter to help organizations bolster their overall data security.

    Watch Now
  • Mitigating Client Side Database Protocol Attacks

    Webcasts // Jan 2011 // provided by Imperva

    In this webcast, the presenters explain about methods for attacking databases by leveraging a client side application as well as vulnerabilities within the database protocol. This example addresses Oracle 10i. Using a Hex or Text editor it is possible to modify the SQL login stream on the client side in ...

    Watch Now
  • Recognizing Web Application Parameter Tampering

    Webcasts // Jan 2011 // provided by Imperva

    In this webcast, the presenters say about explores ways an attacker can modify parameters within a Web application. Parameter tampering is a simple attack targeting the application business logic. This attack takes advantage of the fact that many programmers rely on hidden or fixed fields (such as a hidden tag ...

    Watch Now
  • SecureSphere Interactive Audit Analytics

    Webcasts // Jan 2011 // provided by Imperva

    In this webcast, the presenters say about SecureSphere Interactive Audit Analytics provides a fast reliable way to view audit data and understand database activities. Using various audit views it supports analysis and correlation of security events with just a few clicks of a mouse.

    Watch Now
  • SecureSphere Web Application Firewall - Vulnerability Assessment Integration

    Webcasts // Jan 2011 // provided by Imperva

    This webcast demonstrates how the Imperva SecureSphere Web Application Firewall integrates with application vulnerability scanners. Watch this video to find out how SecureSphere creates policies and detects and blocks attacks based on vulnerability assessment results.

    Watch Now
  • Session Hijacking - Bypassing Web Application Security

    Webcasts // Jan 2011 // provided by Imperva

    In this webcast, the presenters say about the session hijacking is the act of taking control of a user session after successfully obtaining or generating an authentication session ID. Session hijacking involves an attacker using captured, brute forced or reverse-engineered session IDs to seize control of a legitimate user's Web ...

    Watch Now