Imperva Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
Imperva

Overview: Imperva, the Data Security leader, enables a complete security lifecycle to provide visibility and control for business databases and the applications that use them.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by Imperva.
Research offered by Imperva

10 Building Blocks for Securing File Data by Imperva. March 10, 2011 - This guide describes ten phases for securing file data, including how and when to use these basic capabilities, as well as when to deploy other complementary technologies.

  View 10 Building Blocks for Securing File Data research abstract

Anatomy of a Database Attack by Imperva. November 12, 2009 - Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.

  View Anatomy of a Database Attack research abstract

Botnets at the Gate: Stopping Botnets and Distributed Denial of Service Attacks by Imperva. March 10, 2011 - This paper attempts to lift the veil on botnets and the cyber-criminals behind them. It analyzes the history, growth, and economics behind botnets. It then investigates one of the most common attacks executed by botnets: the Distributed Denial of Service (DDoS) attack.

  View Botnets at the Gate: Stopping Botnets and Distributed Denial of Service Attacks research abstract

Cutting the Cost of Application Security by Imperva. February 20, 2014 - This white paper presents a cost breakdown of a Web application firewall solution versus the potential costs of remediation after a successful Web attack. Click now to see why this solution is worth the investment.

  View Cutting the Cost of Application Security research abstract

Database Crime Scene Prevention by Imperva. February 20, 2009 - This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods.

  View Database Crime Scene Prevention research abstract

Database Security Audit and Protect Critical Databases by Imperva. February 04, 2011 - Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.

  View Database Security Audit and Protect Critical Databases research abstract

Database Security: Audit and Protect Critical Databases by Imperva. September 07, 2010 - Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.

  View Database Security: Audit and Protect Critical Databases research abstract

Death and Taxes...and Hackers by Imperva. April 01, 2011 - View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.

  View Death and Taxes...and Hackers research abstract

File Security: Audit and Protect Critical Files by Imperva. August 30, 2010 - Read this paper to learn how Imperva SecureSphere File Security products deliver real-time file monitoring, auditing, security, and user rights management for files stored on file servers and network attached storage (NAS) devices.

  View File Security: Audit and Protect Critical Files research abstract

Five Signs Your File Data is at Risk by Imperva. February 04, 2011 - Persistent insider threats and regulatory compliance mandates make protecting sensitive file data a business requirement for virtually every organization. However, the sheer volume of file data and its rapid and continuous growth make it a challenge to secure properly.

  View Five Signs Your File Data is at Risk research abstract

Imperva's Web Application Attack Report by Imperva. January 02, 2012 - Imperva’s Application Defense Center (ADC), as part of its ongoing Hacker Intelligence Initiative, studied web application attacks across 40 applications over a six month period. View this report to explore key findings and gain recommendations to help you better prioritize vulnerability remediation and web application projects.

  View Imperva's Web Application Attack Report research abstract

Imperva’s Web Application Attack Report by Imperva. July 01, 2011 - Imperva’s Application Defense Center studied web application attacks across 30 applications, monitoring more than 10 million individual attacks targeted over a period of six months. This report offers key findings of their study and recommendations to help you better prioritize vulnerability remediation and web application projects.

  View Imperva’s Web Application Attack Report research abstract

Importance of Web Application Firewall Technology for Protecting Web-based Resources by Imperva. April 2008 - ICSA Labs presents this paper to discuss why dedicated web application firewall technology is necessary to protect web-facing resources.

  View Importance of Web Application Firewall Technology for Protecting Web-based Resources research abstract

Monitor and Protect Critical Web Applications with a Web Application Firewall by Imperva. February 19, 2014 - While the growth of business applications has grown, corporate resources have become more exposed to security threats. This resource takes a look at the growing risk of application attacks via SQL injection.

  View Monitor and Protect Critical Web Applications with a Web Application Firewall research abstract

Next Generation Web Application Firewalls (NG-WAF) by Imperva. June 02, 2010 - This paper describes Imperva's vision for the next generation of WAFs. It details Web application security problems and solutions today, and gives perspectives on the future.

  View Next Generation Web Application Firewalls (NG-WAF) research abstract

Podcast: Insider Threats - an Interview with the Former Deputy Director of the National Security Agency - NSA by Imperva. November 12, 2009 - Bill Crowell, former Deputy Director of the NSA, is interviewed in this podcast. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection –- especially around mission-critical applications and databases.

  View Podcast: Insider Threats - an Interview with the Former Deputy Director of the National Security Agency - NSA research abstract

Presentation Transcript: Insider Threats -- an Interview with Bill Crowell -- Former Deputy Director of the NSA by Imperva. November 12, 2009 - Bill Crowell, former Deputy Director of the NSA, is interviewed in this presentation transcript. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection – especially around mission-critical applications and databases.

  View Presentation Transcript: Insider Threats -- an Interview with Bill Crowell -- Former Deputy Director of the NSA research abstract

Securing Web Applications and Databases for PCI Compliance by Imperva. July 12, 2009 - This paper, designed for security and compliance professionals, illustrates how to achieve compliance on three of the most costly and complex sections: requirements 3, 6, and 10 of PCI DSS. This paper also highlights how Web application and database appliances can deliver resource effective compliance while maintaining cost efficiency.

  View Securing Web Applications and Databases for PCI Compliance research abstract

Software Security for Web Developers: Providing a Helping Hand by Imperva. April 04, 2014 - This expert e-guide from SearchSecurity.com sheds light on how fostering harmony between security and software development teams can ensure application protection early on.

  View Software Security for Web Developers: Providing a Helping Hand research abstract

Technology Audit: Imperva SecureSphere Data Security Suite by Imperva. June 02, 2010 - Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.

  View Technology Audit: Imperva SecureSphere Data Security Suite research abstract

The Anatomy of a Cross-Site Scripting Campaign by Imperva. August 23, 2010 - XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.

  View The Anatomy of a Cross-Site Scripting Campaign research abstract

The Business Case for Data Security by Imperva. November 16, 2010 - This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions.

  View The Business Case for Data Security research abstract

The Business Case for Data Security by Imperva. March 10, 2011 - This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions.

  View The Business Case for Data Security research abstract

The Future of Web Security: 10 Things Every Web Application Firewall Should Provide by Imperva. December 31, 2012 - This guide takes a look at 10 things that every web application firewall should provide.

  View The Future of Web Security: 10 Things Every Web Application Firewall Should Provide research abstract

The Industrialization of Hacking by Imperva. June 02, 2010 - The industrialization of hacking coincides with a critical shift in what's considered today's prized commodity: data. Read this paper to find out more.

  View The Industrialization of Hacking research abstract

Top Ten Database Security Threats by Imperva. February 04, 2011 - The enterprise database infrastructure is subject to an overwhelming range of threats. This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten as identified by Imperva’s Application Defense Center.

  View Top Ten Database Security Threats research abstract

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva. September 02, 2010 - For each threat, the paper describes background information, general risk mitigation strategies, and the database protection provided by Imperva SecureSphere Database Security Solutions.

  View Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities research abstract

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva. February 10, 2009 - This document addresses the most critical of database infrastructure threats by providing a top ten list as identified by Imperva's Application Defense Center. Background information, risk mitigation strategies, and an overview of Imperva's SecureSphere Database Security Gateway protections are provided for each threat.

  View Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities research abstract

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva. August 03, 2009 - This paper describes the most critical database security threats, offers risk mitigation strategies, and provides information about Imperva SecureSphere Database Security Solutions.

  View Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities research abstract

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders by Imperva. October 12, 2009 - For years, organizations have worked diligently to lock down their perimeters only to find out that the most devastating enemy is already inside. Insider threats abound -- both careless mistakes and malicious attacks. This guide will explore the top ten ways to protect sensitive data from the very people that need access to it.

  View Top-10 Guide for Protecting Sensitive Data from Malicious Insiders research abstract

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders by Imperva. February 04, 2011 - Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.

  View Top-10 Guide for Protecting Sensitive Data from Malicious Insiders research abstract

Understanding and Selecting a Database Activity Monitoring Solution by Imperva. February 10, 2009 - Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for
security and compliance, and a long-term platform for comprehensive protection of databases and applications.

  View Understanding and Selecting a Database Activity Monitoring Solution research abstract

Understanding and Selecting a File Activity Monitoring Solution by Imperva. May 16, 2011 - Imagine having a tool to detect an administrator suddenly copying the entire directory containing the latest engineering plans, or a user with rights to a file outside their business unit accessing it for the first time in 3 years.

  View Understanding and Selecting a File Activity Monitoring Solution research abstract

Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data by Imperva. June 17, 2013 - In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.

  View Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data research abstract

Using Free Web Application Security Scanning Tools to Secure Web Apps by Imperva. April 07, 2014 - Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.

  View Using Free Web Application Security Scanning Tools to Secure Web Apps research abstract

Web Application Firewalls Are Worth the Investment for Enterprises by Imperva. February 28, 2014 - This resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.

  View Web Application Firewalls Are Worth the Investment for Enterprises research abstract

Web Application Security: Protect Your Critical Web Applications by Imperva. August 30, 2010 - To combat complex and distributed attacks, organizations need to protect their Web sites from new and emerging threats without affecting application performance or uptime. Read this paper to find out so much more.

  View Web Application Security: Protect Your Critical Web Applications research abstract

Web Attack Survival Guide by Imperva. December 31, 2013 - This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.

  View Web Attack Survival Guide research abstract

What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications by Imperva. December 31, 2013 - Read this white paper to unveil the top 6 recommended features for Web application security that next-generation firewalls and an intrusion prevention system (IPS) often miss.

  View What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts