All resources sponsored by:

Imperva

1 - 25 of 52 Matches
Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security
sponsored by Imperva
WEBCAST:This on-demand webinar, Gartner Research Director Adam Hils discusses how IPS and NGFWs leave dangerous gaps in enterprise security, explains why web application firewalls (WAFs) are worth the investment for enterprises, and reviews the major features of WAF technology, deployment options and selection guidelines.
Posted: 15 Jul 2014 | Premiered: Jul 15, 2014
Get This Now


An Inside Track on Insider Threats
sponsored by Imperva
WHITE PAPER:Read this informative report for details on the impact of insider threats, as well as recommended strategies for businesses to apply in preventing and remediating these critical issues.
Posted: 11 Jul 2014 | Published: 31 Dec 2012
Get This Now


Imperva Security Solutions
sponsored by Imperva
WHITE PAPER:This whitepaper describes a comprehensive security suite that protects digital assets in their repositories and detects abnormal behaviors from compromised users to protect sensitive company data from intruders.
Posted: 11 Jul 2014 | Published: 11 Jul 2014
Get This Now


How Web Application and Next Generation Firewalls Stack Up Against OWASP Threats
sponsored by Imperva
RESOURCE:This infographic depicts how two types of firewalls--web application firewalls and next generation firewalls--measure up against the threats considered to be the "top 10" by the Open Web Application Security Project (OWASP) threats.
Posted: 11 Jul 2014 | Published: 31 Dec 2013
Get This Now


The Anatomy of an Anonymous Attack
sponsored by Imperva
RESOURCE:This infographic depicts the timeline of attacks perpetrated by hacktivist group Anonymous, notorious for its DDoS attacks on controversial organisations around the world.
Posted: 11 Jul 2014 | Published: 11 Jul 2014
Get This Now


Four Ways Database Auditing Drains Your IT Budget
sponsored by Imperva
WHITE PAPER:This paper explores four key built-in database auditing inefficiencies that drain IT budgets. Read on to discover how organizations can use an automated solution to streamline database auditing.
Posted: 11 Jul 2014 | Published: 10 Jul 2014
Get This Now


2014 Gartner Magic Quadrant for Web Application Firewalls
sponsored by Imperva
ANALYST REPORT:Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.
Posted: 11 Jul 2014 | Published: 11 Jul 2014
Get This Now


Is Your Business Safe from Malware and Targeted Attacks?
sponsored by Imperva
WHITE PAPER:Is your business safe from malware and targeted attacks? Access this informative chart to learn the 7 stages of targeted attack as well as the 8 steps to safeguard your organization from attack.
Posted: 11 Jul 2014 | Published: 09 Jul 2014
Get This Now


Mitigating the OWASP Top 10 2013 with Imperva SecureSphere
sponsored by Imperva
WHITE PAPER:This informative guide outlines an effective tool designed to help mitigate the OWASP top 10 and how it can greatly enhance your enterprise security.
Posted: 08 Jul 2014 | Published: 31 Dec 2013
Get This Now


Web Attack Survival Guide Infographic
sponsored by Imperva
WHITE PAPER:This brief infographic provides 7 essential steps for Web attack survival.
Posted: 08 Jul 2014 | Published: 08 Jul 2014
Get This Now


Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER:This informative whitepaper explores survival tactics in the event of a web attack.
Posted: 07 Jul 2014 | Published: 07 Jul 2014
Get This Now


Web Application Firewalls Are Worth the Investment for Enterprises
sponsored by Imperva
ANALYST REPORT:This resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
Posted: 29 Apr 2014 | Published: 28 Feb 2014
Get This Now


What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications
sponsored by Imperva
WHITE PAPER:Read this white paper to unveil the top 6 recommended features for Web application security that next-generation firewalls and an intrusion prevention system (IPS) often miss.
Posted: 21 Feb 2014 | Published: 31 Dec 2013
Get This Now


Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER:This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013
Get This Now


Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER:This white paper presents a cost breakdown of a Web application firewall solution versus the potential costs of remediation after a successful Web attack. Click now to see why this solution is worth the investment.
Posted: 20 Feb 2014 | Published: 20 Feb 2014
Get This Now


The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER:This guide takes a look at 10 things that every web application firewall should provide.
Posted: 19 Feb 2014 | Published: 31 Dec 2012
Get This Now


Monitor and Protect Critical Web Applications with a Web Application Firewall
sponsored by Imperva
WEBCAST:While the growth of business applications has grown, corporate resources have become more exposed to security threats. This resource takes a look at the growing risk of application attacks via SQL injection.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014
Get This Now


Using Free Web Application Security Scanning Tools to Secure Web Apps
sponsored by Imperva
EGUIDE:Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.
Posted: 07 Apr 2014 | Published: 07 Apr 2014
Get This Now


Software Security for Web Developers: Providing a Helping Hand
sponsored by Imperva
EGUIDE:This expert e-guide from SearchSecurity.com sheds light on how fostering harmony between security and software development teams can ensure application protection early on.
Posted: 04 Apr 2014 | Published: 04 Apr 2014
Get This Now


Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
sponsored by Imperva
EGUIDE:In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
Posted: 17 Jun 2013 | Published: 17 Jun 2013
Get This Now


Imperva's Web Application Attack Report
sponsored by Imperva
WHITE PAPER:Imperva’s Application Defense Center (ADC), as part of its ongoing Hacker Intelligence Initiative, studied web application attacks across 40 applications over a six month period. View this report to explore key findings and gain recommendations to help you better prioritize vulnerability remediation and web application projects.
Posted: 04 Apr 2012 | Published: 02 Jan 2012
Get This Now


Imperva’s Web Application Attack Report
sponsored by Imperva
WHITE PAPER:Imperva’s Application Defense Center studied web application attacks across 30 applications, monitoring more than 10 million individual attacks targeted over a period of six months. This report offers key findings of their study and recommendations to help you better prioritize vulnerability remediation and web application projects.
Posted: 22 Sep 2011 | Published: 01 Jul 2011
Get This Now


Understanding and Selecting a File Activity Monitoring Solution
sponsored by Imperva
WHITE PAPER:Imagine having a tool to detect an administrator suddenly copying the entire directory containing the latest engineering plans, or a user with rights to a file outside their business unit accessing it for the first time in 3 years.
Posted: 20 May 2011 | Published: 16 May 2011
Get This Now


Death and Taxes...and Hackers
sponsored by Imperva
VIDEO:View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
Posted: 01 Apr 2011 | Premiered: 01 Apr 2011
Get This Now


10 Building Blocks for Securing File Data
sponsored by Imperva
WHITE PAPER:This guide describes ten phases for securing file data, including how and when to use these basic capabilities, as well as when to deploy other complementary technologies.
Posted: 11 Mar 2011 | Published: 10 Mar 2011
Get This Now


1 - 25 of 52 Matches
Page: 2 3 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement