Drew Roy, Imperva AppSec Product Manager and Andrew Johnson, Imperva RASP Product Manager
With nefarious actors constantly evolving their tactics, leading companies should adopt a layered defense approach to mitigate their risk of exploitations. On the edge, WAFs provide the first line of defense against things like bot attacks, DDoS, ATOs and known technical attacks. RASP sits within your app protecting against known and zero day vulnerabilities in your code - with no signatures and no learning mode.
Join Drew Roy and Andrew Johnson from the RASP Product team at Imperva to learn how adding RASP to your existing WAF strengthens your security posture and lower your overall risk.
Data capture, storage, and usage continues to grow at exponential rates. As a result, and in an effort to obtain operational efficiencies, many new organizations are “born in the cloud”, while for others, the migration of data and data driven business processes to cloud environments continues to escalate rapidly. The use of third party database and related cloud service offerings to support cloud and hybrid environments is also growing and evolving. However, security teams consistently report concerns with respect to the lack visibility and oversight of their data in the cloud. Typical questions being asked by CISOs are complex and not easy to answer. Join Imperva and (ISC)2 on May, 23, 2019 at 1:00PM Eastern for an examination of these questions and how to address them effectively.
Rik Turner, Principal Analyst, Ovum and Sara Pan, Sr Product Marketing Manager, Imperva
With cyberattacks inevitable and data breaches highly likely, companies are evaluating their investment in security by their ability to reduce risk. While endpoint and network security continue to grow, and identity management technology becomes well-established, securing data itself must be front and center of enterprise strategy. As threat actors continue to find ways through the corporate edge and to hijack the accounts of legitimate users, protecting sensitive data and ensuring that authorized data activity is appropriate are the cornerstones of mitigating risk.
Watch this webinar and learn:
•What is the most effective way to mitigate data breach risks
•Why does security have to be data-centric
•What are the shortcomings of perimeter-based security and IAM tools
•How to enhance perimeter security, IAM, DLP, SIEM with modern database security
Kim Lambert, Senior Product Marketing Manager, Imperva; Tim Garon (Moderator)
In this era of rapid modern application development, organizations often deploy code into production with critical vulnerabilities that often lead to exploitation by cybercriminals. These bad actors are on the look-out, scanning for vulnerabilities that will allow them to establish a silent foothold into your environment. Join Imperva and (ISC)2 on April 25, 2019 at 1:00PM Eastern and discover a defense in depth security strategy to protect your most valuable web applications and your business from damaging cyber-attacks.
Sara Pan, Sr. Product Marketing Manager and Mark Bouchard, COO, Cyber Edge Group
With exponential growth of security data, do you know what security approaches your peers are taking? You know the threat landscape is constantly evolving, but do you know how your current cyber security defensive posture stacks up against those of your peers? In this live webinar, CyberEdge and Imperva will discuss the challenge and solution for the security data avalanche, the extent of cyber-security solutions deployed, and other key insights from the 2019 Cyberthreat Defense Report.
Attend this webinar and learn answers to your most pressing questions:
-Do we have gaps in our cyberthreat defenses?
-How are my peers thinking differently about cyberthreats and the options for defending against them?
-How does our security spend compare to other organizations?
-Which security technologies should we be investing in next?
Sara Pan, Sr. Prod Mktg Mgr, Imperva; Brandon Dunlap (Moderator)
Data breach(es) remains atop the list of any CISO’s main concern. With the exponential growth of users, apps, and data, that leads to more and more legitimate data access, the attack surface expands making it harder to determine whether a data access is appropriate. Many organizations rely on traditional perimeter-based security approach, but they’re still getting breached. Additionally, trying to constrain and control the interactions between users and data by locking down usage can not only slow down business, but also frustrate users. Due to this, they may decide to work around you, creating an even bigger risk for your company. Join Imperva and (ISC)2 on March 28, 2019 at 1:00PM Eastern to learn about some best practices to mitigate data breach risk without decelerating your business growth.
Amy DeMartine: Principal Analyst, Forrester. Terry Ray, SVP & Fellow, Imperva. Kunal Anand, CTO, Imperva.
Applications are the lifeblood of enterprise, but protecting them is a massive challenge that multiplies as the rate and volume of threats increase. Layer in the issues associated with moving applications to the cloud, using open source code, implementing rapid release cycles, and being forced to use legacy apps long after the development team that built them is gone, and it’s easy to see that application security can be an endless job. We’ve been on the front lines for years, finding what works and what doesn’t. In this webinar we’ll share best practices that will help enterprises of any size tackle the thorny problem of application security. Here’s a sneak peak:
- A combination of defenses at the edge, in the network and inside the applications themselves make all the difference.
- Full, real-time visibility with analytics help beleaguered security analysts quickly distinguish real threats from noise.
- A consumption model allows the enterprise to quickly, easily and cost-effectively move protections to where they will do the most good.
Plus more insights from industry veterans that will help you vastly improve application security, remediation, and deploy a DevSecOps model that works.
Shahrokh Shahidzadeh (Acceptto), George McGregor (Imperva), Avishai Wool (Algosec), Chris Morales (Vectra)
What is the future of cyber warfare and how does it impact enterprise security? While the world has yet to see a cyber battle between AI systems, experts predict this might be on the horizon in the next three to five years.
Join this interactive Q&A panel with security experts to learn more about:
- The current state of cybersecurity and AI
- How to deploy AI to detect malware
- What is adversarial AI (or offensive AI) and how to protect against cyber attacks
- Preparing for battle
- What's needed to build an AI system and how to build one that can be used to bypass other AI systems
- How to fight adversaries that have better resources
- Protecting against nation state attacks
- Lessons and recommendations for a more resilient enterprise
Terry Ray, CTO, Imperva and Kim Lambert, Sr. Product Marketing Manager, Imperva
Equipped with Imperva’s own research, interactions with our customers, and a wealth of crowdsourced data analyzed from installations around the world, we’ve looked ahead to the future of Internet security and have come up with three key overriding trends that we see taking center stage in 2019. Join Terry Ray, CTO of Imperva, as he provides insight into cybersecurity trends for 2019, including:
-Increasing focus on compliance due to expanding data breaches
-The business benefits of moving to the cloud
-Using AI and machine learning to bridge staffing and skills gaps
About the presenter:
Terry Ray has global responsibility for Imperva’s technology strategy. He was the first U.S.-based Imperva employee and has been with the company for 14 years. He works with organizations around the world to help them discover and protect sensitive data, minimize risk for regulatory governance, set data security strategy and implement best practices.
Andy Shoemaker, founder of DDoS testing company NimbusDDOS
Are you relying on manual DDoS mitigation methods? How can waiting minutes to mitigate a DDoS attack impact your business? Watch as Andy Shoemaker, founder of DDoS testing company NimbusDDOS, gives you a look behind the curtains of a live DDoS attack. Then see first-hand how Imperva Incapsula automatically blocks the threat without impacting the user experience.
In this webinar you will:
• Learn why automatic mitigation is crucial to keeping your business up and running
• Understand the power and importance of the Incapsula 10-second DDoS SLA
• Participate in a live Q&A with DDoS experts
Sara Pan, Product Marketing, Imperva, and Shelly Hershkovitz, Product Management, Imperva
The exponential growth of users, apps, and data has led to an increase in legitimate data access, complicating the task of determining whether data access is appropriate. Traditional security approaches tend to lock things down and limit data usage by deploying broad sets of security policies.
Companies that take this approach, however, are still suffering from data breaches. In the meantime, security teams are often overwhelmed with a significant amount of alerts that don’t provide actionable insights.
Join this webinar to learn how security analytics can help:
• Pinpoint real threats to your apps and data
• Prioritize the most critical incidents
• Interpret risk in plain language
• Provide actionable insights to contain a potential breach
Shiri Margel - Machine Learning Research Manager and Sara Pan - Sr. Product Marketing Manager
Attackers will continue to attempt to breach and steal sensitive data from organizations. Our goal is to detect those potential breaches as early as possible, before any actual harm is done. There are some early signs of data breaches. By detecting them, we can stop attackers before they find their way in. Imperva CounterBreach analyzes both user behavior and data access activity to identify suspicious user access. By adopting the concept of breach kill chain and the defense-in-depth security approach, Imperva allows you to detect threats in all stages of a data breach.
Join this webinar to learn more about:
- Early signs of a data breach
- Bad practices that are likely to be exploited by attackers
- How to improve threat detection along the data breach kill chain
- Real life examples of breach detection using Imperva CounterBreach
- How to investigate critical incidents that could lead to a breach
Aaron McKeown, Security Engineering @ Xero; Gil Feliciano, IT Infrastructure @ MMM Holdings; Terry Ray, CTO @ Imperva
As the web application landscape changes, so do the threats, as well as the tools used for application security and critical data protection. Learn about our analysis of key insights from the new 2018 Gartner Magic Quadrant for Web Application Firewalls to understand the latest WAF technologies, trends, and industry challenges. Hear the experiences of Imperva customers and how they implement web application firewalls to protect their enterprises.
Join this interactive panel with security and infrastructure experts to learn more about:
- Our analysis of the detailed results and considerations of the report
- Trends in application development and security – DevSecOps, Analytics and Hybrid Cloud
- Effective deployment options to meet enterprise demands
Shiri Margel - Machine Learning Research Manager at Imperva
With the escalating threat landscape and the exponential growth of data and users, it’s no longer about whether you’ll get breached; it’s about when. The ideal situation would be to detect a data breach at an early stage. The reason why early breach detection is more practical is that often times bad actors are already inside the organization, abusing legitimate permissions to access sensitive data. To quickly detect a potential data breach, we need to be able to identify “early signs” of a breach.
Join this webinar to learn more about:
- The challenges of detecting data breaches
- Why early breach detection is a more practical goal
- Introducing the data breach kill chain
- Protecting data in your databases – the importance of defense in depth
Data breaches are difficult to detect because security team is often drowning in alerts.
Imperva CounterBreach uses machine learning and analytics to identify suspicious data access and prioritize threats.
By distilling millions of alerts, Imperva allows you to focus on high-risk incidents.
In this video, Senior Security Engineer Jonathan Gruber demos Imperva’s enhanced infrastructure DDoS protection analytics. The new dashboard shows details such as top traffic patterns by source, destination IP, port or packet size for a protected network.
This new addition to our data analytics boosts the value of Imperva Infrastructure DDoS Protection by providing:
•Better visibility – Understand the what, where, who, and how of an attack and gain visibility into clean traffic flow
•Actionable intelligence for incident response - Indication of false positives / false negatives
This video provides an overview of Imperva solutions for database compliance and security. Imperva Data Activity Monitoring (DAM) and Database Firewall solutions help organizations meet data compliance requirements for SOX, GDPR, HIPAA, PCI and many more, and protect enterprise data from both internal and external threats.
Natasha Gupta, Product Marketing Manager and Brian Anderson, Principal Security Engineer
What is DevOps, and what does it mean for security? In this session, we’ll talk about trends driving adoption of DevOps, and what are the security challenges posed by automated, API-driven frameworks, pros and cons of RASP, and the benefits of cloud WAF. We’ll then jump into a demonstration of how Imperva SecureSphere can be leveraged in a DevOps environment with Cloudentity to provide state of the art protections against application attacks.
Tech Demo: Key Features for Web Application FirewallsShelly Hershkovitz, Product Management at Imperva; Jon Burton, Sales Engineering at Imperva[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]61 mins