All resources sponsored by:

Imperva

1 - 25 of 59 Matches
The Most Dangerous Cybersecurity Threat Might Be Sitting Next to You
sponsored by Imperva
WHITE PAPER:This infographic shows you different departments throughout your organization and the high risk actions they perform every day. Whether they be malicious users, compromised users or just careless users, it's possible your own employees are the biggest threat to your data security right now.
Posted: 20 Jul 2016 | Published: 01 Jun 2016
Get This Now


Hacker Intelligence Initiative Report: The Threat is Already Within
sponsored by Imperva
WHITE PAPER:Discover how you can best protect your organization from insider threats through investigation and early detection tools. Learn about the 3 main classifications for insider threats and how to best mitigate them.
Posted: 20 Jul 2016 | Published: 01 Jun 2016
Get This Now


Best Practices for Managing 'Insider' Security Threats
sponsored by Imperva
RESOURCE:Read Gartner's "Best Practices for Managing 'Insider' Security Threats" report and get threat prevention strategies to protect your enterprise from security breaches by internal users. Learn what drives these attacks such as the prevalence of bring your own device (BYOD) and cloud.
Posted: 19 Jul 2016 | Published: 17 Jun 2014
Get This Now


Prevention Is Futile in 2020: Protect Information Via Pervasive Monitoring and Collective Intelligence
sponsored by Imperva
WHITE PAPER:Now is the time to move toward people-centric and pervasive monitoring strategies to future-proof your organization. Read this report by Gartner to discover 4 critical shifts organizations need to implement to stay vigilant.
Posted: 19 Jul 2016 | Published: 01 May 2013
Get This Now


2016 Cyberthreat Defense Report
sponsored by Imperva
WHITE PAPER:You will learn how your spend compares to that of other organizations, what defense measures your peers have in place to defend against internal and external threats, and why weaknesses in your strategy could make your organization a "low hanging fruit".
Posted: 14 Mar 2016 | Published: 24 Feb 2016
Get This Now


Plugging the Security Gaps of Cloud File Sharing Services
sponsored by Imperva
WHITE PAPER:This paper examines seven items to consider when it comes to security and compliance of cloud file sharing services and how you can mitigate the risks with a Cloud Access Security Broker (CASB) solution.
Posted: 14 Mar 2016 | Published: 17 Feb 2016
Get This Now


Office 365 Playbook: How to Ensure Security through Cloud Access Security Brokers
sponsored by Imperva
WHITE PAPER:This playbook provides you with a practical guide for defining, developing, and executing an Office 365 security plan. It includes choosing and optimizing the appropriate solution to mitigate your Office 365 risk while also meeting all of your compliance obligations, be they regulatory requirements or best practice guidelines.
Posted: 09 Mar 2016 | Published: 17 Jun 2015
Get This Now


The Anatomy of a DDoS Attack
sponsored by Imperva
RESOURCE:View this infographic to see a visual breakdown of how the DDoS criminal system works and how you can protect your organization.
Posted: 24 Feb 2016 | Published: 09 Dec 2015
Get This Now


Gartner Magic Quadrant for Web Application Firewalls
sponsored by Imperva
WHITE PAPER:New Gartner Magic Quadrant for Web Application Firewalls helps security leaders understand the WAF market, as well as what to look for in a WAF solution. Download the report and learn the importance of comprehensive protection, detection accuracy, management capabilities and deployment options.
Posted: 24 Feb 2016 | Published: 15 Jul 2015
Get This Now


Gartner Toolkit for CISOs: Prebuilt Slides to Share with the Board
sponsored by Imperva
WHITE PAPER:This Gartner Toolkit helps technology management prepare updates for their senior executives or their board, sponsored by Imperva.
Posted: 24 Feb 2016 | Published: 14 Jan 2014
Get This Now


Gartner Market Guide for Data-Centric Audit and Protection
sponsored by Imperva
WHITE PAPER:New Gartner Market Guide for Data-Centric Audit and Protection describes the 5 DCAP capabilities that CISOs need for databases, files, big data, SaaS and IaaS. Download the guide for key findings and recommendations – and find out what Gartner has to say about Imperva DCAP capabilities across data silos.
Posted: 24 Feb 2016 | Published: 15 Dec 2015
Get This Now


Top 10 Database Security Threats
sponsored by Imperva
WHITE PAPER:Read this paper to understand the top 10 database threats and how you can protect your most valuable assets.
Posted: 16 Feb 2016 | Published: 30 Dec 2015
Get This Now


Seven Keys to a Secure Data Solution: How to Choose the Right Data Centric Audit and Security Solution
sponsored by Imperva
WHITE PAPER:Read this paper to learn how real-time visibility and blocking maximize protection, why intelligent automation lowers TCO, and what key solution features enable fast time to value.
Posted: 12 Feb 2016 | Published: 16 Dec 2015
Get This Now


Top 5 Solution Requirements for Account Takeover Protection
sponsored by Imperva
WHITE PAPER:Download this playbook and learn five solution requirements for effective account takeover protection.
Posted: 12 Feb 2016 | Published: 30 Dec 2015
Get This Now


Five Keys to Big Data Audit and Protection
sponsored by Imperva
WHITE PAPER:Read this white paper to learn how multi-layer big data architectures increase vulnerabilities and what requirements are essential for big data audit and protection.
Posted: 11 Feb 2016 | Published: 29 Dec 2015
Get This Now


10 Features Every Web App Firewall Should Provide
sponsored by Imperva
WHITE PAPER:This paper explains in detail the 10 features that every Web application firewall must provide.
Posted: 11 Feb 2016 | Published: 30 Dec 2015
Get This Now


The Industrialization of Hacking: How to Stop Automated Attacks
sponsored by Imperva
WHITE PAPER:View this infographic and learn how you can better defend against such advanced Web-based attacks.
Posted: 11 Feb 2016 | Published: 30 Dec 2015
Get This Now


The Cloud App Visibility Blindspot
sponsored by Imperva
WHITE PAPER:Learn about the visibility blind spot when adopting SaaS apps and the increased risks organizations face with employee use of "Shadow IT."
Posted: 11 Feb 2016 | Published: 16 Sep 2015
Get This Now


Today's Top DDoS Services Providers
sponsored by Imperva
WHITE PAPER:Forrester Research offers unique insight into the rapidly growing DDoS attacks. This report details how well each vendor measures up against Forrester's criteria and against each other with their DDoS prevention services.
Posted: 09 Feb 2016 | Published: 22 Jul 2015
Get This Now


Today's Global DDoS Threat Landscape Report
sponsored by Imperva
WHITE PAPER:DDoS attacks against network infrastructures continue to grow in size and duration. Download this report and learn what to expect and how you can protect your website from such attacks.
Posted: 09 Feb 2016 | Published: 06 Oct 2015
Get This Now


Top 10 Database Security Threats
sponsored by Imperva
WHITE PAPER:Practical applications for Big Data have become widespread, and Big Data has now become the new "prize" for hackers. This whitepaper explains common injection points that provide an avenue for attackers to maliciously access database and Big Data components.
Posted: 05 Oct 2015 | Published: 31 Dec 2014
Get This Now


Web Application Firewalls Are Worth the Investment for Enterprises
sponsored by Imperva
ANALYST REPORT:This resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
Posted: 29 Apr 2014 | Published: 28 Feb 2014
Get This Now


How to Leverage Free Tools to Secure Web Apps
sponsored by Imperva
EGUIDE:Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.
Posted: 07 Apr 2014 | Published: 07 Apr 2014
Get This Now


Software Security for Web Developers: Providing a Helping Hand
sponsored by Imperva
EGUIDE:This expert e-guide from SearchSecurity.com sheds light on how fostering harmony between security and software development teams can ensure application protection early on.
Posted: 04 Apr 2014 | Published: 04 Apr 2014
Get This Now


Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER:This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013
Get This Now


1 - 25 of 59 Matches
Page: 2 3 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement