Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.

Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.

    SlideShare
  • Slideshare-64x64 Home
  • Explore
  • Search
    • You
  • Upload
  • Login
  • Signup
  • Home
  • Explore
×
×
×
×
×
×

Imperva

Imperva
  • Following Follow   Processing…
  • 126 SlideShares
  • 298 Followers
  • 1 Clipboard

Modal header

One fine body…

    • Redwood Shores, CA, United States
  • Industry Technology / Software / Internet
  • Website www.imperva.com
  • About Imperva® (NASDAQ: IMPV) is a leading provider of cyber security solutions that protect business-critical data and applications. The company’s SecureSphere, CounterBreach, and Incapsula product lines enable organizations to discover assets and risks, protect information wherever it lives – in the cloud and on-premises – and comply with regulations. Imperva is headquartered in Redwood Shores, California.
TwitterFacebookLinkedIn
Tags (221)

application security cross site scripting cyber attack cyber crime cyber security data breach data security data theft database security ddos hacker hackers hacking imperva insider threat malware online attack presentation remote file inclusion report sql injection sqli web application attacks web application security web security xss more…

account takeover account takeover attack advanced persistent threat alert fatigue amazon web services anatomy of an attack anonymous anti-malware anti-virus antivirus api apisecurity appeconomy application attacks application security apt artificial intelligence attack analytics attack vectors audit automated attacks automated web application attacks aws azure bitb blacklists bot botnet botnets bots boy-in-the-browser business logic attacks captcha client-side malware cloud security cms cms hacking comment spam common vulnerabilities and exposures compliance content management systems credential theft cross site scripting cross-site request forgery cross-site scripting cusrf cves cyber attack cyber crime cyber security cybercrime cybercriminals cybersecurity data audit data auditing data breach data governance data growth data loss prevention data owners data protection data risk data security data theft database security database attacks database audit database audit and protection database monitoring database security database threat database threats datasecurity dbaas dcap ddos ddos attack denial of service devsecops directory traversal dlp dos dt dynamic profiling e-commerce ebook excessive privilege abuse fam file activity monitoring file audit file inclusion file management file security file systems firewalls gartner mq gdpr general data protection regulation google hacking hack hacker hacker forum hacker forums hackers hacking hacktivist hacktivists havij healthcare heartbleed himss honey pots html html 5 http http/2 http/2 protocol imperva imperva gdpr dpo machinelearning ai incapsula incident response industrialized hacking infographic information security insider threat internet protocol internet security ips it security joomla known vulnerability attack leet botnet legitimate privilege abuse lfi libwww-perl local file inclusion lulzsec machine learning malware man in the browser man-in-the-browser metadata framework mitb native audit netsparker network security next-gen firewalls office 365 online attack owasp password worst practices passwords pci pci dss pdf attack peering architecture permissions management phishing phishing kit php presentation privilege elevation query acl ransomware remote file inclusion report reverse engineering rfi rsa2018 search engine hacking search engine poisoning securesphere securing sharepoint security alerts security trends securityshorts seo sep share point security share point vulnerabilities sharepoint sharepoint governance sharepoint security sharepoint security ebook siem skyfence social engineering social media spear phishing sql sql injection sqli sqlmap ssl stolen credentials superglobals survey targeted attacks tax scam third-party software trends trojan user access rights video vulnerabilities vulnerability attack waf weak audit web web application attacks web application firewall web application security web attacks web protocol web security white paper wikileakes world wide web xss zero day zero downtime …less

View all Documents (33)

  • 7 Tips to Protect Your Data from Contractors and Privileged Vendors 7 Tips to Protect Your Data f... 3 years ago
  • SEO Botnet Sophistication SEO Botnet Sophistication 3 years ago
  • Phishing Made Easy Phishing Made Easy 3 years ago
  • Combat Payment Card Attacks with WAF and Threat Intelligence Combat Payment Card Attacks w... 3 years ago

View all Videos (12)

  • Investigating Hacker Forums Video Investigating Hacker Forums V... 9 years ago
  • SQL Injection -- by the Numbers Video SQL Injection -- by the Numbe... 9 years ago
  • Protect Against Malicious PDFs Protect Against Malicious PDFs 9 years ago
  • Google Hacking: How Hackers Automate Google Hacking with Botnets Google Hacking: How Hackers A... 9 years ago

View all Presentations (75)

  • Survey: CyberSecurity Event Alerts Overwhelming Security Teams Survey: CyberSecurity Event A... 2 years ago
  • Cybersecurity and Healthcare - HIMSS 2018 Survey Cybersecurity and Healthcare ... 2 years ago
  • API Security Survey API Security Survey 2 years ago
  • Imperva ppt Imperva ppt 3 years ago
  • English
  • Español
  • Português
  • Français
  • Deutsch
  • About
  • Developers & API
  • Blog
  • Terms
  • Privacy
  • Copyright
  • Support
RSS Feeds