Hi [[ session.user.profile.firstName ]]

Imperva Demo

  • Date
  • Rating
  • Views
  • Infrastructure DDoS Protection Analytics Demo
    Infrastructure DDoS Protection Analytics Demo
    Jonathan Gruber Recorded: Aug 1 2018 5 mins
    In this video, Senior Security Engineer Jonathan Gruber demos Imperva’s enhanced infrastructure DDoS protection analytics. The new dashboard shows details such as top traffic patterns by source, destination IP, port or packet size for a protected network.

    This new addition to our data analytics boosts the value of Imperva Infrastructure DDoS Protection by providing:

    •Better visibility – Understand the what, where, who, and how of an attack and gain visibility into clean traffic flow
    •Actionable intelligence for incident response - Indication of false positives / false negatives
    •And more
  • Video: Database Compliance and Security Overview
    Video: Database Compliance and Security Overview
    Imperva Recorded: Jul 9 2018 3 mins
    This video provides an overview of Imperva solutions for database compliance and security. Imperva Data Activity Monitoring (DAM) and Database Firewall solutions help organizations meet data compliance requirements for SOX, GDPR, HIPAA, PCI and many more, and protect enterprise data from both internal and external threats.
  • DevOps Security Challenges and Solutions
    DevOps Security Challenges and Solutions
    Natasha Gupta, Product Marketing Manager and Brian Anderson, Principal Security Engineer Recorded: Jun 24 2018 42 mins
    What is DevOps, and what does it mean for security? In this session, we’ll talk about trends driving adoption of DevOps, and what are the security challenges posed by automated, API-driven frameworks, pros and cons of RASP, and the benefits of cloud WAF. We’ll then jump into a demonstration of how Imperva SecureSphere can be leveraged in a DevOps environment with Cloudentity to provide state of the art protections against application attacks.
  • Attack Analytics: How to Tackle Too Many Alerts With The Help of AI
    Attack Analytics: How to Tackle Too Many Alerts With The Help of AI
    Shelly Hershkovitz, Product Management, Imperva and Ajay Uggirala, Product Marketing, Imperva Recorded: Jun 21 2018 43 mins
    A massive overload of security events.
    Constant data breaches.
    Sophisticated threats.

    Combine these three facts, and you get cumbersome and complicated security-related investigations.

    Join this webinar to learn how to:

    • Efficiently manage thousands of daily alerts
    • Effectively analyze each and every event
    • Determine which threats are real vs. false positives

    Find out how Attack Analytics (a new solution from Imperva) addresses all of the above.
  • Video: Imperva Attack Analytics Overview
    Video: Imperva Attack Analytics Overview
    Imperva Recorded: May 14 2018 3 mins
    Imperva Attack Analytics correlates and distills thousands of security events into a few distinct readable narratives. Attack Analytics employs artificial intelligence and machine learning to make the investigation of application security events easy, enabling ITorganizations to mitigate and respond to real security threats quickly and decisively.
  • Combating insider threats and alert fatigue
    Combating insider threats and alert fatigue
    Ziv Grinberg, Product Management and Sachi Sawamura, Product Marketing Recorded: May 9 2018 44 mins
    Join us for a short discussion and demo, as we provide an overview of how our CounterBreach behavioral analytics uses machine learning and context rich algorithms to identify the proverbial needle in the alert haystack.
  • Cloud Data Security: Securing Amazon RDS
    Cloud Data Security: Securing Amazon RDS
    Kedar Dhuru – Principal Product Manager, Data Security; Marty Jost - Product Marketing; and Pathik Shah – Sales Engineering Recorded: Mar 27 2018 34 mins
    Take steps to secure your cloud-deployed databases. Join this live demonstration of how to secure RDS with SecureSphere DAM.
  • Part 4: Breach Detection and Notification for the GDPR
    Part 4: Breach Detection and Notification for the GDPR
    Cheryl Tang, Director Data Security Products, Imperva and Brian McAuliffe, Sales Engineer, Imperva Recorded: Jan 11 2018 39 mins
    The GDPR, which comes into effect on May 25, 2018, requires organizations report a data breach within 72 hours. In this webinar, we’ll provide an overview of:

    • What the General Data Protection Regulation is
    • What the GDPR breach notification requirements are
    • How Imperva CounterBreach can help detect potential data breaches
  • Part 3: Addressing Data Across Borders for the GDPR
    Part 3: Addressing Data Across Borders for the GDPR
    Cheryl Tang, Director of Product Marketing and Sumit Bahl, Sr. Technical Product Manager Recorded: Jan 4 2018 32 mins
    One of the key requirements of GDPR relates to cross-border data transfers. Our security experts demonstrate how SecureSphere can help address this regulation with monitoring and access control of personal data.
  • Part 2: Pseudonymization and Data Masking for GDPR
    Part 2: Pseudonymization and Data Masking for GDPR
    Cheryl Tang, Director of Product Marketing, Imperva and Steve Pomroy, Chief Technologist, Camouflage Recorded: Dec 21 2017 35 mins
    This is the second in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this webinar, we’ll look at how to use Imperva Camouflage Data Masking that can address pseudeomnymization requirements of the GDPR.

    We’ll provide an overview of:

    - What the General Data Protection Regulation (GDPR) is
    - What is pseudonymization and the benefits of pseudonymizing data
    - How data masking can help organizations comply with GDPR by pseudonymizing data classification capabilities

Embed in website or blog