Imperva

Displaying 1 - 10 of 26 results

  • Top 5 Database Security Threats

    White Papers // Apr 2018 // provided by Imperva

    Data breaches are a threat to every organization. Breach damage goes beyond the loss or disclosure of sensitive or confidential data; companies incur significant financial costs associated with remediation and multi-year legal liability claims. This paper details the top 5 security threats to help organizations take steps to protect their...

    Download Now
  • How to Build a DDoS Response Plan in 7 Steps

    White Papers // Apr 2018 // provided by Imperva

    You’ve probably heard about distributed denial of service (DDoS) attacks, or maybe you’ve even been hit by one. If you’re like most organizations, you’ve already been DDoSed. Perhaps the attack was minor, a wakeup call, but then the attack subsided without causing damage and you just left DDoS protection on...

    Download Now
  • GDPR: New Data Protection Rules in the EU

    White Papers // Apr 2018 // provided by Imperva

    The European Union is changing the way it regulates data protection in the wake of large-scale cyber attacks and data loss incidents. This paper looks at the new data security requirements under the GDPR and provides practical tips on how to prevent a data breach disaster from happening to you...

    Download Now
  • Five Security Strategies for DevOps, APIs and Microservices

    White Papers // Apr 2018 // provided by Imperva

    The modern application world is an even bigger playground for cybercriminals. What’s at stake and what’s the best way to protect your data? In Five Security Strategies for DevOps, APIs and Microservices, discover the key vulnerabilities inherent to today’s environment and the best data defense strategies to keep your applications...

    Download Now
  • The Imperva Incapsula DDoS Response Playbook

    White Papers // Apr 2018 // provided by Imperva

    Distributed denial of service (DDoS) attacks have become a fact of life for any business with a web presence. Whether you’re an enterprise, e-commerce business, local organization, or government offce—it’s merely a matter of time before you’re going to have to deal with the inevitable DDoS attack. The question is...

    Download Now
  • The Hidden Cost of Compliance

    Research // Aug 2014 // provided by Imperva

    Database auditing is an integral part of every organization’s compliance protocol, but the built-in auditing tools that come with your database exact a heavy toll on hardware, software, storage, and human resource costs. Businesses have to comply with data protection statutes in more than 100 countries around the world,...

    Learn More
  • Cutting the Cost of Application Security

    White Papers // Jul 2014 // provided by Imperva

    Web application attacks can result in devastating data breaches and application downtime, costing companies millions of dollars in fines, brand damage, and customer turnover. This white paper illustrates how the Imperva SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and website downtime....

    Learn More
  • 10 Things Every Web Application Firewall Should Provide

    White Papers // Jul 2014 // provided by Imperva

    Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Hackers evade traditional network security defenses to take down websites and to steal data. Malicious users probe websites around-the-clock looking for vulnerabilities. Automation tools such as off-the-shelf attack toolkits and botnets make it...

    Find Out More
  • Web Attack Survival Guide

    White Papers // Jul 2014 // provided by Imperva

    With an increasing amount of business being conducted online, the internet has quickly become the frontline in an ongoing battle between companies and an unseen enemy. Industrial espionage, sabotage and cyber terrorism are becoming more frequent, resulting in lost revenue, stolen data, service interruptions and damaged reputations. This white paper...

    Learn More
  • What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    White Papers // Jul 2014 // provided by Imperva

    Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This white paper lays out the six key requirements needed to protect Web...

    Learn More