Hi [[ session.user.profile.firstName ]]

Imperva Incapsula

  • Date
  • Rating
  • Views
  • Imperva Incapsula Secures and Protects Google Cloud Customers Imperva Incapsula Secures and Protects Google Cloud Customers Andy Chang, Sr. Product Manager, Cloud Security & Risk, Google; Vineet Bhan, Dir. of Business Development, Imperva Incapsula Recorded: Oct 12 2016 52 mins
    Almost 50% of DDoS attacks last 6-24 hours. The cost of an average attack is around $500,000, with many costing even more. Some can last for weeks, leaving websites and apps unavailable to customers. With statistics like these, you can’t afford to take chances with your security.
    More companies are migrating to the cloud for its benefits. While cloud security is better, protecting your website is still your responsibility. If you use the cloud, a new collaboration between Google Cloud Platform (GCP) and Incapsula offers improved visibility and security for your websites.
    Find out how you can benefit from this collaboration when you register for a free webinar that explains how GCP and Incapsula will keep your websites safe.

    GCP takes on the burden of managing infrastructure, provisioning servers, and configuring networks, so you can focus on your business. A future-proof infrastructure, powerful data and analytics and a no-ops platform allow you to grow your business.

    Incapsula provides managed and consistent security policies across multiple locations for cloud environments. Its resilient global cloud network offers protection for web, DNS, network devices, and application servers.

    The webinar covers:
    • GCP capabilities
    • How Incapsula complements GCP with website security, DDoS mitigation and global Load balancing
    • Three commonly used Incapsula deployment models for GCP customers

    Vineet Bhan, Director of Business Development, Incapsula
    Andy Chang, Sr. Product Manager, Cloud Security & Risk, Google

    And for attending this webinar, new GCP and Incapsula customers will get a $500 credit each toward the services.
    Register today and find out how to protect your website assets against a DDoS attack.
  • Protecting Your Website in a Public Cloud from DDoS Attacks Protecting Your Website in a Public Cloud from DDoS Attacks Habib Bilfaqi, Network Manager, IPC and Robert Hamilton, Product Marketing Director, Imperva Incapsula Recorded: Sep 14 2016 35 mins
    There are many benefits of hosting your websites and apps in the public cloud—reliability, scalability, and cost savings resulting from shared resources are just a few. But did you know that your organization is ultimately responsible for the security of whatever you host in the public cloud?

    Your public cloud service may not be able to withstand an aggressive DDoS attack. And while it’s almost impossible to prevent a DDoS attack, there are things you can do to significantly reduce the damage it can cause. Just ask Habib Bilfaqi.

    Habib is the Network Manager at IPC. He found out the hard way what it took to secure his organization’s assets in the public cloud. Find out what he did, why he did it, the challenges he faced, and the lessons he learned when you register to attend the latest webinar from Imperva Incapsula.

    Here’s just some of the information you’ll get from this timely new webinar:

    •How a public cloud works
    •The security that a public cloud provides—and why it’s not enough
    •How to build a fast global site for better performance
    •What you need from a DDoS mitigation vendor
  • DDoS LIVE: Watch as a Security Expert Performs a Live DDoS Attack DDoS LIVE: Watch as a Security Expert Performs a Live DDoS Attack Andy Shoemaker Founder and DDoS Expert, NimbusDDoS and Nabeel Hasan Saeed Product Marketing Manager, Imperva Incapsula Recorded: Aug 26 2016 56 mins
    In this webinar Andrew Shoemaker, a DDoS simulation expert from NimbusDDOS, gives you a rare glimpse into how hackers find the weak points in your defenses and exploit them to level devastating DDoS attacks. You'll see real world examples of the tactics and methods used to create tailored DDoS attacks that can bring down a targeted network or application, and learn how best to defend against them.

Embed in website or blog