Overview: Imperva, the Data Security leader, enables a complete security lifecycle to provide visibility and control for business databases and the applications that use them.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by Imperva.
Research offered by Imperva
10 Building Blocks for Securing File Data by Imperva. March 10, 2011 - This guide describes ten phases for securing file data, including how and when to use these basic capabilities, as well as when to deploy other complementary technologies.
Anatomy of a Database Attack by Imperva. November 12, 2009 - Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
Botnets at the Gate: Stopping Botnets and Distributed Denial of Service Attacks by Imperva. March 10, 2011 - This paper attempts to lift the veil on botnets and the cyber-criminals behind them. It analyzes the history, growth, and economics behind botnets. It then investigates one of the most common attacks executed by botnets: the Distributed Denial of Service (DDoS) attack.
Database Crime Scene Prevention by Imperva. February 20, 2009 - This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods.
Database Security Audit and Protect Critical Databases by Imperva. February 04, 2011 - Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Database Security: Audit and Protect Critical Databases by Imperva. September 07, 2010 - Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Death and Taxes...and Hackers by Imperva. April 01, 2011 - View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
E-Book: Strategic guide to insider threat detection and breach response by Imperva. March 17, 2011 - Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.
E-Guide: Shortcut guide to Web application firewall deployment by Imperva. September 22, 2011 - Before purchasing a Web application firewall (WAF), there are several factors all organizations must consider. This expert tip offers advice on how to pick a WAF that best fits your organization and lays out the steps for successful deployment.
File Security: Audit and Protect Critical Files by Imperva. August 30, 2010 - Read this paper to learn how Imperva SecureSphere File Security products deliver real-time file monitoring, auditing, security, and user rights management for files stored on file servers and network attached storage (NAS) devices.
Five Signs Your File Data is at Risk by Imperva. February 04, 2011 - Persistent insider threats and regulatory compliance mandates make protecting sensitive file data a business requirement for virtually every organization. However, the sheer volume of file data and its rapid and continuous growth make it a challenge to secure properly.
Imperva's Web Application Attack Report by Imperva. January 02, 2012 - Imperva’s Application Defense Center (ADC), as part of its ongoing Hacker Intelligence Initiative, studied web application attacks across 40 applications over a six month period. View this report to explore key findings and gain recommendations to help you better prioritize vulnerability remediation and web application projects.
Imperva’s Web Application Attack Report by Imperva. July 01, 2011 - Imperva’s Application Defense Center studied web application attacks across 30 applications, monitoring more than 10 million individual attacks targeted over a period of six months. This report offers key findings of their study and recommendations to help you better prioritize vulnerability remediation and web application projects.
Importance of Web Application Firewall Technology for Protecting Web-based Resources by Imperva. April 2008 - ICSA Labs presents this paper to discuss why dedicated web application firewall technology is necessary to protect web-facing resources.
Malware Attacks Demand a New Malware Defense Approach by Imperva. June 19, 2013 - Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
Next Generation Web Application Firewalls (NG-WAF) by Imperva. June 02, 2010 - This paper describes Imperva's vision for the next generation of WAFs. It details Web application security problems and solutions today, and gives perspectives on the future.
Podcast: Insider Threats - an Interview with the Former Deputy Director of the National Security Agency - NSA by Imperva. November 12, 2009 - Bill Crowell, former Deputy Director of the NSA, is interviewed in this podcast. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection –- especially around mission-critical applications and databases.
Presentation Transcript: Insider Threats -- an Interview with Bill Crowell -- Former Deputy Director of the NSA by Imperva. November 12, 2009 - Bill Crowell, former Deputy Director of the NSA, is interviewed in this presentation transcript. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection – especially around mission-critical applications and databases.
Securing Web Applications and Databases for PCI Compliance by Imperva. July 12, 2009 - This paper, designed for security and compliance professionals, illustrates how to achieve compliance on three of the most costly and complex sections: requirements 3, 6, and 10 of PCI DSS. This paper also highlights how Web application and database appliances can deliver resource effective compliance while maintaining cost efficiency.
Technology Audit: Imperva SecureSphere Data Security Suite by Imperva. June 02, 2010 - Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.
The Anatomy of a Cross-Site Scripting Campaign by Imperva. August 23, 2010 - XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.
The Business Case for Data Security by Imperva. March 10, 2011 - This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions.
The Business Case for Data Security by Imperva. November 16, 2010 - This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions.
The Industrialization of Hacking by Imperva. June 02, 2010 - The industrialization of hacking coincides with a critical shift in what's considered today's prized commodity: data. Read this paper to find out more.
Top Ten Database Security Threats by Imperva. February 04, 2011 - The enterprise database infrastructure is subject to an overwhelming range of threats. This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten as identified by Imperva’s Application Defense Center.
Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva. August 03, 2009 - This paper describes the most critical database security threats, offers risk mitigation strategies, and provides information about Imperva SecureSphere Database Security Solutions.
Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva. February 10, 2009 - This document addresses the most critical of database infrastructure threats by providing a top ten list as identified by Imperva's Application Defense Center. Background information, risk mitigation strategies, and an overview of Imperva's SecureSphere Database Security Gateway protections are provided for each threat.
Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva. September 02, 2010 - For each threat, the paper describes background information, general risk mitigation strategies, and the database protection provided by Imperva SecureSphere Database Security Solutions.
Top-10 Guide for Protecting Sensitive Data from Malicious Insiders by Imperva. October 12, 2009 - For years, organizations have worked diligently to lock down their perimeters only to find out that the most devastating enemy is already inside. Insider threats abound -- both careless mistakes and malicious attacks. This guide will explore the top ten ways to protect sensitive data from the very people that need access to it.
Top-10 Guide for Protecting Sensitive Data from Malicious Insiders by Imperva. February 04, 2011 - Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Understanding and Selecting a Database Activity Monitoring Solution by Imperva. February 10, 2009 - Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for
security and compliance, and a long-term platform for comprehensive protection of databases and applications.
Understanding and Selecting a File Activity Monitoring Solution by Imperva. May 16, 2011 - Imagine having a tool to detect an administrator suddenly copying the entire directory containing the latest engineering plans, or a user with rights to a file outside their business unit accessing it for the first time in 3 years.
Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data by Imperva. June 17, 2013 - In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
Web Application Security: Protect Your Critical Web Applications by Imperva. August 30, 2010 - To combat complex and distributed attacks, organizations need to protect their Web sites from new and emerging threats without affecting application performance or uptime. Read this paper to find out so much more.