Hi [[ session.user.profile.firstName ]]

Imperva

  • Date
  • Rating
  • Views
  • Defend Against the Data Miner Defend Against the Data Miner Paul Steen, Global Security Strategist, Imperva; Cheryl O'Neill, Product Marketing Director, Data Security Recorded: Sep 29 2016 40 mins
    Data miners, the subtle thieves that tap, explore and drain an organization’s databases, perpetrate some of the hardest data breaches to detect and investigate. The data miner may be sitting in the next office next door or a thousand miles away in a hacker’s hardened den. This insidious thief may spend weeks exploring and sampling your systems for valuable data. When satisfied with the bounty, the data is exfiltrated leaving little evidence to trace. View this webinar to:

    · Learn how to accurately identify and track insider threats.
    · Understand how data activity monitoring can detect and stop suspicious behavior
    ·  Reduce security alert noise and provide actionable context for security incidents
  • More Healthcare Cyber Threats; More HIPAA Enforcement: No Place to Hide More Healthcare Cyber Threats; More HIPAA Enforcement: No Place to Hide Craig Shumard, CSO Imperva; John Shepard,Connecticut Children Hospital; Jeff Trudeau, Sutter Health Recorded: Sep 27 2016 51 mins
    Join us for this engaging webcast that will feature several healthcare security leaders and practitioners discussing the changing landscape of healthcare cyber security threats and HIPAA regulatory enforcement.

    Specifically, the distinguished panel will focus on:
    • Recent trends in healthcare cyber threats and breaches
    • HHS guidance on “ransomware and medical equipment patching”
    • Recent HIPAA enforcement activities by the HHS that are potentially game changing.

    The panel will also discuss key mitigating steps that every healthcare organizations need to take to lessen potential breaches and escalating HIPPA enforcement sanctions.
  • Gartner MQ for Web App Firewall Gartner MQ for Web App Firewall Terry Ray, Imperva Chief Product Strategist at Imperva Recorded: Sep 7 2016 66 mins
    The new 2016 Gartner Magic Quadrant for Web Application Firewalls (WAF) is based on detailed responses to questionnaires from experienced Web App Firewall customers. Attend the webinar and hear the experiences of major customers who participated in the Gartner MQ for WAF research and how they implemented web app firewall to protect their applications and critical data.

    This webinar will discuss:

    - Detailed results and considerations of the report
    - Effective deployment options to meet enterprise demands
    - Success stories and implementation options you can leverage within your own environment
    - Sign up for this webinar today to hear Terry Ray, Imperva Chief Product - - - Strategist at Imperva, discuss the Gartner MQ for WAF.
  • How to Accurately Identify Compromised Insiders How to Accurately Identify Compromised Insiders Sagi Dulce, Team Lead, Insider Threat Research, Imperva & Carrie McDaniel, Sr. Product Marketing Mgr, Imperva Recorded: Jul 20 2016 49 mins
    Insider threats have many faces. Your internal users can be careless or flat out malicious; other times, they fall victim to external attackers. Cybercriminals gain access to your network and data by exploiting people on the inside, often by means of social engineering and phishing. Without proactive detection technologies in place, sophisticated attackers exploit insiders and operate under the radar for months.

    Attend this webinar to:
    •Learn how to accurately identify insider threats and protect enterprise data
    •Discover a multi-layered approach to identify compromised users
    •Gain insight into the latest developments in deception technology
  • 3 Steps to Faster Discovery of Insider Threats 3 Steps to Faster Discovery of Insider Threats Terry Ray, Chief Product Strategist and Cheryl O'Neil, Product Marketing Director Recorded: Jun 23 2016 59 mins
    Protecting your data requires an understanding of the threat vectors and taking action to minimize those risks. According to the Verizon 2016 Data Breach Investigation Report, insider and privilege misuse represents one of the most common incident types and typically requires the longest to detect. 
     
    Attend this webinar to:
    · Learn how improving your visibility into insider activity and threats can reduce risk
    · Understand why monitoring both user behavior and data access activity can improve your detection rate and response times
    · Find out how you can expand your security monitoring capabilities without impacting system performance, adding cumbersome processes or hiring specialized personnel
  • More Databases. More Hackers. More Audits. More Databases. More Hackers. More Audits. Terry Ray, Chief Product Strategist and Cheryl O'Neil, Product Marketing Director Recorded: Mar 31 2016 60 mins
    Exploding data growth doesn’t mean you have to sacrifice data security or compliance readiness. The more clarity you have into where your sensitive data is and who is accessing it, the easier it is to secure and meet compliance regulations.

    Attend this webinar to learn how to:
    * Detect and block cyber security events in real-time
    * Protect large and diverse data environments
    * Simplify compliance enforcements and reporting
    * Take control of escalating costs.
  • Defend Against Attacks from the Inside Defend Against Attacks from the Inside Carrie McDaniel, Product Marketing Manager, Imperva Recorded: Feb 23 2016 42 mins
    Data is an organization’s most valuable asset. In order to be effective, employees need access to company data. When internal users become compromised, are careless or carry out malicious activity, enterprise data is put significantly at risk.In the past year the majority of security professionals reported a rise in insider threats attributed mostly to insufficient data protection strategies. Attend this webinar to:

    • Learn why insider threats are tough to detect, even when monitoring technologies are in place
    • Understand what differentiates good data access from bad data access
    • Find out how visibility into insider activity reduces risk, and cuts down on incident detection and remediation time
    • Learn how Imperva keeps data safe from compromised, careless and malicious internal users, with a sneak peek at our new CounterBreach solution

    Register now for the webcast “Defend Against Attacks from the Inside” and find out how to protect your organization’s valuable data from internal misuse.
  • Database Surveillance and Protection: 3 Ways to Stop Hackers Database Surveillance and Protection: 3 Ways to Stop Hackers Cheryl O’Neill, Dir. Product Marketing, Imperva and David O’Leary, Dir. Security Solutions, Forsythe Recorded: Dec 2 2015 47 mins
    Data thieves are opportunistic, looking for unprotected databases in the forgotten digital corners of your company. They are content to steal any data that lies within easy reach.

    Large companies are especially vulnerable. With hundreds or even thousands of databases spread throughout business units and across multiple geographies, it is only a matter of time until your unprotected data is accessed and stolen.

    Fortunately, it doesn’t have to be complicated, tedious or expensive to protect all of your sensitive data with a database monitoring solution. The right database monitoring solution can also provide visibility into data usage and simplify compliance audits.

    Join us for this webinar to learn:
    •Benefits of database monitoring over native audit tools
    •Factors to consider before investing in database audit and protection
    •3 specific ways to leverage database monitoring for improved security
  • The State of Application Security: Hackers On Steroids The State of Application Security: Hackers On Steroids Itsik Mantin, Director of Security Research, Imperva Recorded: Nov 18 2015 47 mins
    Organizations of all sizes face a universal security threat from today’s organized hacking industry. Why? Hackers have decreased costs and expanded their reach with tools and technologies that allow for automated attacks against Web applications.

    This webinar will detail key insights from the Imperva Application Defense Center annual Web Application Attack Report. Attend this webinar for an in-depth view of the threat landscape for the year. We will:
    - Discuss hacking trends and shifts
    - Provide breach analysis by geography, industry and attack type
    - Detail next steps for improved security controls and risk management processes
  • Securing Office 365 through Cloud Access Security Brokers Securing Office 365 through Cloud Access Security Brokers Norv Leong, Senior Director, Product Marketing, Imperva Skyfence Recorded: Aug 25 2015 38 mins
    Microsoft Office 365 is quickly establishing itself as the go-to productivity suite used in organizations today. However, even Microsoft maintains that Office 365 security is a shared responsibility between itself and the customer. Office 365 provides some capabilities natively, but at the end of the day, Microsoft does not take responsibility for managing mobile access, enforcing access policies, and meeting compliance requirements. Join us for an informative webinar where you’ll learn how to define, develop, and execute an Office 365 security plan while meeting all of your compliance obligations.

Embed in website or blog