All resources sponsored by:

Imperva

23 Matches
Web Application Firewalls Are Worth the Investment for Enterprises
sponsored by Imperva
ANALYST REPORT:This resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
Posted: 29 Apr 2014 | Published: 28 Feb 2014
Get This Now


How to Leverage Free Tools to Secure Web Apps
sponsored by Imperva
EGUIDE:Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.
Posted: 07 Apr 2014 | Published: 07 Apr 2014
Get This Now


Software Security for Web Developers: Providing a Helping Hand
sponsored by Imperva
EGUIDE:This expert e-guide from SearchSecurity.com sheds light on how fostering harmony between security and software development teams can ensure application protection early on.
Posted: 04 Apr 2014 | Published: 04 Apr 2014
Get This Now


Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER:This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013
Get This Now


Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER:This white paper presents a cost breakdown of a Web application firewall solution versus the potential costs of remediation after a successful Web attack. Click now to see why this solution is worth the investment.
Posted: 20 Feb 2014 | Published: 20 Feb 2014
Get This Now


The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER:This guide takes a look at 10 things that every web application firewall should provide.
Posted: 19 Feb 2014 | Published: 31 Dec 2012
Get This Now


Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
sponsored by Imperva
EGUIDE:In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
Posted: 17 Jun 2013 | Published: 17 Jun 2013
Get This Now


Imperva's Web Application Attack Report
sponsored by Imperva
WHITE PAPER:Imperva’s Application Defense Center (ADC), as part of its ongoing Hacker Intelligence Initiative, studied web application attacks across 40 applications over a six month period. View this report to explore key findings and gain recommendations to help you better prioritize vulnerability remediation and web application projects.
Posted: 04 Apr 2012 | Published: 02 Jan 2012
Get This Now


Imperva’s Web Application Attack Report
sponsored by Imperva
WHITE PAPER:Imperva’s Application Defense Center studied web application attacks across 30 applications, monitoring more than 10 million individual attacks targeted over a period of six months. This report offers key findings of their study and recommendations to help you better prioritize vulnerability remediation and web application projects.
Posted: 22 Sep 2011 | Published: 01 Jul 2011
Get This Now


Death and Taxes...and Hackers
sponsored by Imperva
VIDEO:View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
Posted: 01 Apr 2011 | Premiered: 01 Apr 2011
Get This Now


Botnets at the Gate: Stopping Botnets and Distributed Denial of Service Attacks
sponsored by Imperva
WHITE PAPER:This paper attempts to lift the veil on botnets and the cyber-criminals behind them. It analyzes the history, growth, and economics behind botnets. It then investigates one of the most common attacks executed by botnets: the Distributed Denial of Service (DDoS) attack.
Posted: 11 Mar 2011 | Published: 10 Mar 2011
Get This Now


Database Security Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER:Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 04 Feb 2011 | Published: 04 Feb 2011
Get This Now


Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER:Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011
Get This Now


Database Security: Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER:Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 07 Sep 2010 | Published: 07 Sep 2010
Get This Now


File Security: Audit and Protect Critical Files
sponsored by Imperva
WHITE PAPER:Read this paper to learn how Imperva SecureSphere File Security products deliver real-time file monitoring, auditing, security, and user rights management for files stored on file servers and network attached storage (NAS) devices.
Posted: 30 Aug 2010 | Published: 30 Aug 2010
Get This Now


The Anatomy of a Cross-Site Scripting Campaign
sponsored by Imperva
WHITE PAPER:XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.
Posted: 23 Aug 2010 | Published: 23 Aug 2010
Get This Now


Technology Audit: Imperva SecureSphere Data Security Suite
sponsored by Imperva
WHITE PAPER:Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.
Posted: 02 Jun 2010 | Published: 02 Jun 2010
Get This Now


Presentation Transcript: Insider Threats -- an Interview with Bill Crowell -- Former Deputy Director of the NSA
sponsored by Imperva
PRESENTATION TRANSCRIPT:Bill Crowell, former Deputy Director of the NSA, is interviewed in this presentation transcript. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection – especially around mission-critical applications and databases.
Posted: 12 Nov 2009 | Published: 12 Nov 2009
Get This Now


Anatomy of a Database Attack
sponsored by Imperva
WEBCAST:Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009
Get This Now


Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER:For years, organizations have worked diligently to lock down their perimeters only to find out that the most devastating enemy is already inside. Insider threats abound -- both careless mistakes and malicious attacks. This guide will explore the top ten ways to protect sensitive data from the very people that need access to it.
Posted: 12 Nov 2009 | Published: 12 Oct 2009
Get This Now


Database Crime Scene Prevention
sponsored by Imperva
TECHNICAL ARTICLE:This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods.
Posted: 19 Aug 2009 | Published: 20 Feb 2009
Get This Now


Importance of Web Application Firewall Technology for Protecting Web-based Resources
sponsored by Imperva
WHITE PAPER:ICSA Labs presents this paper to discuss why dedicated web application firewall technology is necessary to protect web-facing resources.
Posted: 02 Apr 2008 | Published: 10 Jan 2008
Get This Now


The Hidden Costs of "Free" Database Auditing Comparing the Total Cost of Ownership of Native Database Auditing Vs. Imperva Securesphere
sponsored by Imperva
PRODUCT LITERATURE:Read this white paper to learn more about alternate solutions that cost less and prevent unexpected hidden expenses.
Posted: 24 Jul 2007 | Published: 01 Jul 2007
Get This Now


23 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement