All resources sponsored by:

Imperva

1 - 25 of 42 Matches
Uncover the Top Ten Database Threats That Could Affect Your Business
sponsored by Imperva
WHITE PAPER:This white paper highlights the top ten threats that affect traditional databases as well as Big Data technologies.
Posted: 03 Mar 2015 | Published: 31 Dec 2014
Get This Now


Shedding Light on the Cloud App Blind Spot
sponsored by Imperva
WHITE PAPER:Unfortunately, cloud applications can come with a large number of potentially hazardous blind spots. This white paper intends to shed light on these areas and will cover why traditional controls that secure your on-premise environment don't provide the required visibility into user activity and risks related to cloud app use.
Posted: 03 Mar 2015 | Published: 03 Mar 2015
Get This Now


DDoS Response Playbook
sponsored by Imperva
WHITE PAPER:This white paper will help you create a response plan for one of the most widespread threats – DDoS attacks.
Posted: 02 Mar 2015 | Published: 02 Mar 2015
Get This Now


Security predictions for 2015
sponsored by Imperva
WHITE PAPER:With the insight of security experts and the help of analytics tools, this white paper presents five security predictions for the 2015 security landscape.
Posted: 27 Feb 2015 | Published: 31 Jan 2015
Get This Now


Web Application Firewalls Are Worth the Investment for Enterprises
sponsored by Imperva
ANALYST REPORT:This resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
Posted: 29 Apr 2014 | Published: 28 Feb 2014
Get This Now


How to Leverage Free Tools to Secure Web Apps
sponsored by Imperva
EGUIDE:Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.
Posted: 07 Apr 2014 | Published: 07 Apr 2014
Get This Now


Software Security for Web Developers: Providing a Helping Hand
sponsored by Imperva
EGUIDE:This expert e-guide from SearchSecurity.com sheds light on how fostering harmony between security and software development teams can ensure application protection early on.
Posted: 04 Apr 2014 | Published: 04 Apr 2014
Get This Now


Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER:This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013
Get This Now


Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER:This white paper presents a cost breakdown of a Web application firewall solution versus the potential costs of remediation after a successful Web attack. Click now to see why this solution is worth the investment.
Posted: 20 Feb 2014 | Published: 20 Feb 2014
Get This Now


The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER:This guide takes a look at 10 things that every web application firewall should provide.
Posted: 19 Feb 2014 | Published: 31 Dec 2012
Get This Now


Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
sponsored by Imperva
EGUIDE:In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
Posted: 17 Jun 2013 | Published: 17 Jun 2013
Get This Now


Imperva's Web Application Attack Report
sponsored by Imperva
WHITE PAPER:Imperva’s Application Defense Center (ADC), as part of its ongoing Hacker Intelligence Initiative, studied web application attacks across 40 applications over a six month period. View this report to explore key findings and gain recommendations to help you better prioritize vulnerability remediation and web application projects.
Posted: 04 Apr 2012 | Published: 02 Jan 2012
Get This Now


Imperva’s Web Application Attack Report
sponsored by Imperva
WHITE PAPER:Imperva’s Application Defense Center studied web application attacks across 30 applications, monitoring more than 10 million individual attacks targeted over a period of six months. This report offers key findings of their study and recommendations to help you better prioritize vulnerability remediation and web application projects.
Posted: 22 Sep 2011 | Published: 01 Jul 2011
Get This Now


Understanding and Selecting a File Activity Monitoring Solution
sponsored by Imperva
WHITE PAPER:Imagine having a tool to detect an administrator suddenly copying the entire directory containing the latest engineering plans, or a user with rights to a file outside their business unit accessing it for the first time in 3 years.
Posted: 20 May 2011 | Published: 16 May 2011
Get This Now


Death and Taxes...and Hackers
sponsored by Imperva
VIDEO:View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
Posted: 01 Apr 2011 | Premiered: 01 Apr 2011
Get This Now


Botnets at the Gate: Stopping Botnets and Distributed Denial of Service Attacks
sponsored by Imperva
WHITE PAPER:This paper attempts to lift the veil on botnets and the cyber-criminals behind them. It analyzes the history, growth, and economics behind botnets. It then investigates one of the most common attacks executed by botnets: the Distributed Denial of Service (DDoS) attack.
Posted: 11 Mar 2011 | Published: 10 Mar 2011
Get This Now


10 Building Blocks for Securing File Data
sponsored by Imperva
WHITE PAPER:This guide describes ten phases for securing file data, including how and when to use these basic capabilities, as well as when to deploy other complementary technologies.
Posted: 11 Mar 2011 | Published: 10 Mar 2011
Get This Now


The Business Case for Data Security
sponsored by Imperva
WHITE PAPER:This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions.
Posted: 11 Mar 2011 | Published: 10 Mar 2011
Get This Now


Database Security Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER:Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 04 Feb 2011 | Published: 04 Feb 2011
Get This Now


Top Ten Database Security Threats
sponsored by Imperva
WHITE PAPER:The enterprise database infrastructure is subject to an overwhelming range of threats. This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten as identified by Imperva’s Application Defense Center.
Posted: 04 Feb 2011 | Published: 04 Feb 2011
Get This Now


Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER:Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011
Get This Now


Five Signs Your File Data is at Risk
sponsored by Imperva
WHITE PAPER:Persistent insider threats and regulatory compliance mandates make protecting sensitive file data a business requirement for virtually every organization. However, the sheer volume of file data and its rapid and continuous growth make it a challenge to secure properly.
Posted: 04 Feb 2011 | Published: 04 Feb 2011
Get This Now


The Business Case for Data Security
sponsored by Imperva
WHITE PAPER:This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions.
Posted: 16 Nov 2010 | Published: 16 Nov 2010
Get This Now


Database Security: Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER:Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 07 Sep 2010 | Published: 07 Sep 2010
Get This Now


Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva
WHITE PAPER:For each threat, the paper describes background information, general risk mitigation strategies, and the database protection provided by Imperva SecureSphere Database Security Solutions.
Posted: 02 Sep 2010 | Published: 02 Sep 2010
Get This Now


1 - 25 of 42 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement