All resources sponsored by:

Imperva

1 - 25 of 35 Matches
Cyber Security and Compliance Guide for Financial Services
sponsored by Imperva
EBOOK:Financial services is one of the highest-risk industries in the world, both in cybersecurity and compliance. With one of the highest costs-per-record-breached in industry, FS must take steps to ensure they compliantly keep systems secure. Read this e-book, Cyber Security and Compliance Guide for Financial Services, to learn how.
Posted: 25 Mar 2021 | Published: 25 Mar 2021
Get This Now


15 Ways Your Website is Under Attack
sponsored by Imperva
EBOOK:Web applications are under constant attack, but understanding these types of attacks will help you prevent fraud, data theft and online automated abuse – it can even provide a roadmap on how to protect your business. Download this e-book to learn 15 ways in which your website is attacked, many of them verified by OWASP.
Posted: 24 Mar 2021 | Published: 24 Mar 2021
Get This Now


Open Banking – Reshaping Financial Services
sponsored by Imperva
WHITE PAPER:Across the financial services industry, the concept of open banking is expected to reshape the competitive landscape and customer experience. But what exactly is open banking, how will it affect users, and how will it look across different geographic regions? Read this white paper to find out.
Posted: 23 Mar 2021 | Published: 23 Mar 2021
Get This Now

TOPICS:  Cybersecurity

The Anatomy of Account Takeover Attacks
sponsored by Imperva
EBOOK:Account takeover attacks are a growing type of identity theft plaguing today’s organizations. This e-book, The Anatomy of Account Takeover Attacks, provides a comprehensive look at account takeover attacks, including OWASP’s definition and an overview of methodology, variants, common tactics, and more.
Posted: 23 Mar 2021 | Published: 23 Mar 2021
Get This Now

TOPICS:  Cybersecurity

How Imperva DDoS Protects at Scale
sponsored by Imperva
WHITE PAPER:Today’s sophisticated DDoS attacks can serve as a serious hinderance to your customers’ ability to access your site and apps – which can have significant financial and reputational impacts. Read this white paper to learn about the key features and capabilities Imperva’s DDoS security tool.
Posted: 22 Mar 2021 | Published: 22 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Magic Quadrant for Web Application Firewalls
sponsored by Imperva
RESEARCH CONTENT:In this Gartner Magic Quadrant for Web Application Firewalls (WAF) report, unlock an expert analysis of the WAF market as a whole and discover Gartner’s comprehensive evaluation and comparison of today’s leading WAF vendors and offerings – read on to unlock the full report.
Posted: 22 Mar 2021 | Published: 13 Oct 2020
Get This Now

TOPICS:  Cybersecurity

14 Questions to Ask Your Application Security Vendor
sponsored by Imperva
EBOOK:Application environments vary wildly from one organization to the next, so organizations need to make certain that their application security posture is custom fit to their unique needs, challenges and regulatory requirements. Read this e-book to unlock the 14 key questions you should be asking your application security vendor(s).
Posted: 19 Mar 2021 | Published: 19 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Protecting Financial Institutions from DDoS Attacks
sponsored by Imperva
WHITE PAPER:In a recent survey, IT pros indicated that DDoS is the top threat to their network. And while organizations implement more effective DDoS security safeguards, cybercriminals can still outsmart the latest mitigation techniques. View this white paper to learn what DDoS threats mean for finance, and see best practices for mitigating DDoS attacks.
Posted: 19 Mar 2021 | Published: 19 Mar 2021
Get This Now


Database and Big Data Security
sponsored by Imperva
ANALYST REPORT:This report provides an overview of database and big data security market along with guidance and recommendations for finding the sensitive data protection and governance products that best meet your requirements. Read this 75-page report to enhance your understanding of the market and discover how to find a solution best-fit to your needs.
Posted: 25 Feb 2021 | Published: 25 Feb 2021
Get This Now

TOPICS:  Data Security

Five Steps To Ensuring Secure and Compliant AWS RDS
sponsored by Imperva
WHITE PAPER:While database-as-a-service (DBaaS) program, like AWS RDS, offer unmatched capabilities in terms of access and storage capacity, users often feel that compliance and security can be challenging. Read this white paper to unlock the 5 essential steps your organization should to take to ensure secure and compliant AWS RDS.
Posted: 19 Feb 2021 | Published: 19 Feb 2021
Get This Now

TOPICS:  Cybersecurity

Meeting Data Security Challenges In The Age Of Digital Transformation
sponsored by Imperva
WHITE PAPER:Digital transformations have added complications to the already-challenging task of protecting critical or sensitive data. In order to protect your most valuable commodity, you need to understand its attack surface – read this Imperva whitepaper to learn more about today’s data security challenges and best practices.
Posted: 19 Feb 2021 | Published: 19 Feb 2021
Get This Now

TOPICS:  Cybersecurity

Data Privacy Toolkit
sponsored by Imperva
EBOOK:Get a closer look at CCPA, steps for securing data to comply with GDPR, and 5 secure steps to NYDFS compliance, all inside the 2021 Data Privacy Toolkit.
Posted: 18 Feb 2021 | Published: 18 Feb 2021
Get This Now


Web Application Firewalls Are Worth the Investment for Enterprises
sponsored by Imperva
ANALYST REPORT:This resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
Posted: 29 Apr 2014 | Published: 28 Feb 2014
Get This Now


How to Leverage Free Tools to Secure Web Apps
sponsored by Imperva
EGUIDE:Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.
Posted: 07 Apr 2014 | Published: 07 Apr 2014
Get This Now


Software Security for Web Developers: Providing a Helping Hand
sponsored by Imperva
EGUIDE:This expert e-guide from SearchSecurity.com sheds light on how fostering harmony between security and software development teams can ensure application protection early on.
Posted: 04 Apr 2014 | Published: 04 Apr 2014
Get This Now


Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER:This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013
Get This Now


Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER:This white paper presents a cost breakdown of a Web application firewall solution versus the potential costs of remediation after a successful Web attack. Click now to see why this solution is worth the investment.
Posted: 20 Feb 2014 | Published: 20 Feb 2014
Get This Now


The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER:This guide takes a look at 10 things that every web application firewall should provide.
Posted: 19 Feb 2014 | Published: 31 Dec 2012
Get This Now


Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
sponsored by Imperva
EGUIDE:In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
Posted: 17 Jun 2013 | Published: 17 Jun 2013
Get This Now


Imperva's Web Application Attack Report
sponsored by Imperva
WHITE PAPER:Imperva’s Application Defense Center (ADC), as part of its ongoing Hacker Intelligence Initiative, studied web application attacks across 40 applications over a six month period. View this report to explore key findings and gain recommendations to help you better prioritize vulnerability remediation and web application projects.
Posted: 04 Apr 2012 | Published: 02 Jan 2012
Get This Now


Imperva’s Web Application Attack Report
sponsored by Imperva
WHITE PAPER:Imperva’s Application Defense Center studied web application attacks across 30 applications, monitoring more than 10 million individual attacks targeted over a period of six months. This report offers key findings of their study and recommendations to help you better prioritize vulnerability remediation and web application projects.
Posted: 22 Sep 2011 | Published: 01 Jul 2011
Get This Now


Death and Taxes...and Hackers
sponsored by Imperva
VIDEO:View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
Posted: 01 Apr 2011 | Premiered: 01 Apr 2011
Get This Now


Botnets at the Gate: Stopping Botnets and Distributed Denial of Service Attacks
sponsored by Imperva
WHITE PAPER:This paper attempts to lift the veil on botnets and the cyber-criminals behind them. It analyzes the history, growth, and economics behind botnets. It then investigates one of the most common attacks executed by botnets: the Distributed Denial of Service (DDoS) attack.
Posted: 11 Mar 2011 | Published: 10 Mar 2011
Get This Now


Database Security Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER:Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 04 Feb 2011 | Published: 04 Feb 2011
Get This Now


Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER:Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011
Get This Now


1 - 25 of 35 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences