Hi [[ session.user.profile.firstName ]]

Bot Defender Demo

Learn how to use PerimeterX Bot Defender console to manage your automated traffic, get visibility into how bots are attacking your web and mobile application and how Bot Defender mitigates this unwanted traffic.
With Bot Defender console you can now:
Analyze traffic types and incident types with 14 months (!) of data
See attacks more clearly than ever with drill down to different use cases and 14 days of data
Get printable, exportable and shareable reports
Enjoy enriched investigation capabilities with enriched data
Edit and customize your dashboards and reports with advanced slice-and-dice options
Recorded Jan 10 2020 17 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Hadas Weinrib
Presentation preview: Bot Defender Demo

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • COVID-19 Predictions for Web App Security and the Impact on the Holiday Season Oct 20 2020 5:00 pm UTC 46 mins
    Ido Safruti (CTO) and Deepak Patel (VP Product Marketing)
    COVID has accelerated changes in the way attackers are hitting web applications. Join the discussion to hear about the predictions on how the world of web application security will be during COVID and the impact it will have during the holiday season.
  • Top 3 Cyberthreats of the Holiday Shopping Season Recorded: Sep 17 2020 35 mins
    Avishai Shafir, Director of Product Management; Reesha Dedhia, Cybersecurity Evangelist
    The COVID pandemic has expedited the mass adoption of online and mobile shopping, which incentivized cybercriminals to innovate. With the holiday shopping season around the corner, e-commerce sites are starting to prepare for unprecedented spending. In parallel with this growth, we see emerging threat trends that can disrupt your holiday sales.

    Join PerimeterX on Thursday, September 17 as Avishai Shafir, Director of Product Management, and Reesha Dedhia, Cybersecurity Evangelist discuss how to protect your customers and safeguard your business.

    We will also give you valuable tips on how to:
    - Discern between helpful and malicious bot traffic
    - Thwart bot-driven fraud and client-side attacks
    - Prevent revenue-impacting browser extensions
  • PerimeterX Podcast Ep. 7: Top Threats in 2020 Featuring Research from Forrester Recorded: Sep 3 2020 16 mins
    Deepak Patel, Cybersecurity Evangelist; Eric Pestana, Corporate Communications Manager
    PerimeterX cybersecurity evangelist Deepak Patel returns to discuss the top cyberthreats in 2020 as reported by independent research firm Forrester Research, as well as some best practices on how to protect and grow digital businesses in their midst.
  • Holiday Readiness and the Shadow Code Risk Recorded: Sep 2 2020 36 mins
    Ameet Naik, PerimeterX; Alexandra Brown, RH-ISAC
    Studies show that up to 70% of the scripts running on a typical website are third-party, which in turn call other scripts creating an extensive digital supply chain. These scripts and libraries introduce Shadow Code into the application which alters its security posture and vastly expands the attack surface. The recent succession of digital skimming and Magecart attacks on the client-side of web applications are one such consequence of Shadow Code.

    Paradigms like CI/CD, DevOps and DevSecOps enable a faster app development pipeline but make it harder to meet information security standards and data privacy requirements. However, security and innovation do not need to be at odds.

    Key Takeaways:

    1. Things to know about the Shadow Code and the negative impacts to your applications before the holiday shopping rush
    2. Findings from a 2020 Survey on scope and impacts of Shadow Code in web applications
    3. Strategies to manage Shadow Code risk using a trust but verify model
  • Shining a Light on Shadow Code Recorded: Aug 19 2020 41 mins
    Ameet Naik, Cybersecurity Evangelist, PerimeterX
    Modern web applications make extensive use of third-party scripts and open source libraries to speed up innovation and be responsive to business needs. Studies show that up to 70% of the scripts running on a typical website are third-party, which in turn call other scripts creating an extensive digital supply chain. These scripts and libraries introduce Shadow Code into the application which alters its security posture and vastly expands the attack surface. The recent succession of digital skimming and Magecart attacks on the client-side of web applications are one such consequence of Shadow Code.

    Paradigms like CI/CD, DevOps and DevSecOps enable a faster app development pipeline but make it harder to meet information security standards and data privacy requirements. However, security and innovation do not need to be at odds.

    In this session you will learn about:
    -Shadow Code and the negative impacts to your applications
    -Findings from a 2020 Survey on scope and impacts of Shadow Code in web applications
    -Strategies to manage Shadow Code risk using a trust but verify model
  • DevOps & Security in 2020 Recorded: Aug 19 2020 44 mins
    Rachel Veal, Ad Hoc | Ido Safruti, PerimeterX | Josh Kirkwood, CyberArk | Max Heinemeyer, Darktrace
    Sacrificing data security for faster innovation is one of the main causes of tension between cybersecurity and IT professionals on the one side and DevOps teams on the other. So, how should organizations bridge this divide and what do they need to implement?

    Join this exclusive keynote panel to learn more about:
    - Why securing DevOps pays off in the long run
    - Shifting left: What is it, how it works and why your organization needs it
    - How to make security an integral part of the DevOps process
    - DevOps security checklist
    - Recommendations for tools and workflows that enable better security

    Panel:
    Rachel Veal, IT & Security Program Manager, Ad Hoc (moderator)
    Ido Safruti, Chief Technology Officer, PerimeterX
    Josh Kirkwood, Solution Engineering Manager, CyberArk
    Max Heinemeyer, Director of Threat Hunting, Darktrace
  • PerimeterX Podcast Ep. 8: Shadow Code feat. Osterman Research Recorded: Aug 15 2020 18 mins
    Ameet Naik, Cybersecurity Evangelist; Michael Osterman, Principal Analyst; Eric Pestana, Corporate Communications Manager
    PerimeterX and Osterman Research conducted a survey and published a report on the preparedness of businesses against Shadow Code, and how to protect against this risk.

    PerimeterX cybersecurity evangelist Ameet Naik and principal analyst of Osterman Research Michael Osterman join us to discuss Shadow Code, what it is and why businesses ought to be wary of it.
  • Shadow Code: The Hidden Risk to Your Website Recorded: Aug 13 2020 56 mins
    Michael Osterman, Principal Analyst, Osterman Research and Ameet Naik, Director of Product Marketing, PerimeterX
    Modern websites deliver a rich customer experience using third-party vendors and open source libraries. Studies show that up to 70% of the scripts running on a typical website are third-party. These scripts and libraries introduce Shadow Code into the web application which brings with it unknown security risks. Hackers have exploited this attack surface with digital skimming and Magecart attacks that lead to client-side data breaches.

    Join Osterman Research and PerimeterX to review findings from the 2020 Shadow Code survey, its impact on web applications and the strategies a modern digital business should consider to mitigate this threat.

    Join the webinar to explore:
    -What Shadow Code is and how it impacts your online business
    -Findings from the 2020 Osterman Survey report
    -Strategies to mitigate the risks from Shadow Code
  • What You Can’t See Can Hurt Your E-commerce Conversions Recorded: Jul 23 2020 24 mins
    Reesha Dedhia, Cybersecurity Evangelist and Oz Hirshfeld, Cybersecurity Engineer
    As a digital or e-commerce leader, you might not be aware that up to 20% of shoppers that come to your site experience distractions from coupon pop-ups and ads. These pop-ups and ads can redirect shoppers to competitors, display unwanted ads and content, or fraudulently tag user traffic to collect affiliate and referral fees. The culprit: browser extensions and ad injections.

    Join this webinar to see a real-time interaction of the different types of unwanted pop ups and ads that interact with e-commerce sites, understand how these distractions impact your business, and learn how to remove these distractions to increase conversion rates and drive revenue growth.
  • PerimeterX Podcast Ep. 6: Human Challenge Recorded: Jul 17 2020 19 mins
    Gad Bornstein, Product Manager; Eric Pestana, Corporate Communications Manager
    User verifications like CAPTCHA are necessary solutions to keep one’s website free of bad bots. But in the verification process, it’s crucial to preserve a frictionless user experience. PerimeterX product manager Gad Bornstein joins us to discuss how PerimeterX is combating bad bots and making web apps’ user experience easier using Human Challenge.
  • Post COVID-19 Predictions for Web Application Security Recorded: Jul 15 2020 47 mins
    Ido Safruti (CTO) and Deepak Patel (VP Product Marketing)
    Just like everything else in the world, COVID has accelerated changes in the way attackers are hitting web applications. Based on emergent behaviors, here are our predictions on how the world of web application security will be different Post-COVID
  • PerimeterX Podcast Ep. 5: Browser Extensions and Malware Recorded: Jun 19 2020 15 mins
    Reesha Dedhia, Cybersecurity Evangelist and Eric Pestana, Corporate Communications Manager
    Browser extensions and associated malware can pose risks to both consumers and businesses. PerimeterX Cybersecurity Evangelist Reesha Dedhia joins us to discuss how e-commerce leaders can protect themselves, ultimately creating a more secure user experience and optimizing conversion rates.
  • PerimeterX Podcast Ep. 4: PerimeterX Platform and Integrations Recorded: Jun 11 2020 19 mins
    Ido Safruti, Co-founder and CTO; Deepak Patel, Cybersecurity Evangelist; Eric Pestana, Corporate Communications Manager
    The PerimeterX Spring Release has just rolled out, with enhancements and new features throughout the PerimeterX product portfolio. PerimeterX co-founder and CTO Ido Safruti and Cybersecurity Evangelist Deepak Patel sat down with us to discuss the latest updates and integrations.
  • Aberdeen Research: Quantify the Business Impact from Web Scraping Recorded: Jun 10 2020 58 mins
    Derek Brink, VP & Research Fellow at Aberdeen Group and Deepak Patel, VP of Product Marketing at PerimeterX
    Do you know the revenue impact of website scraping attacks for your business? In the e-commerce vertical alone the impact is between 3% to 14% of annual website revenue. Find out how to estimate the revenue impact for your business. Join Aberdeen Research Group and PerimeterX to understand the real impact of web scraping beyond the loss of competitive advantage.


    Get insights and takeaways including:
    -Estimates for the impact of website scraping on select verticals as a function of annual website revenue.
    -Quantitative analysis on how to measure the business impact of website scraping for your online business.
    -Understanding the risk of web scraping and what steps to take to manage bots to an acceptable level.
  • Special Talk on Insights for the 2020 Cyberthreat Defense Report Recorded: May 29 2020 39 mins
    Steve Piper, founder and CEO of CyberEdge Group, and Deepak Patel, VP of Product Marketing at PerimeterX
    81% of organizations suffered from a successful cyberattack last year. Now in its seventh year, the 2020 Cyberthreat Defense Report assesses the views of 1,200 IT security professionals and provides valuable insights into the state of IT security. Join this talk to get the details behind the findings and what organizations are doing about the increasing cyberthreats.
  • Carding Attacks and Its Impact on Websites Recorded: May 27 2020 54 mins
    Amir Shaked, VP R&D at PerimeterX and Hadas Weinrib, Product Marketing at PerimeterX
    Two new carding bots are threatening websites and putting customer PII data at risk. The increase of credit card usage has led to an unexpected growth of carding bot attacks. The result is significant revenue loss for e-commerce sites. Not only is revenue at stake, but these threats jeopardize a company’s reputation, customer trust and online user experience. Carding attackers target websites and platforms, exploring new methods and tools to automatically validate stolen credit cards. In this session, you’ll learn about the new carding bots that threaten e-commerce sites and put customer PII data at risk. We will also show how to better protect your websites, mobile applications and APIs from these new bots.
  • A Concerning Trend in Magecart Attacks: Multiple Groups Attacking Simultaneously Recorded: May 27 2020 62 mins
    Mickey Alton, Research Team Leader at PerimeterX; Ameet Naik, Director of Product Marketing
    In late 2019, British Airways was fined $229M for loss of customer data from their website that was caused by a Magecart attack. Digital skimming and Magecart attacks continue to be a major threat to online businesses, exposing payment card data and customer PII. The research team at PerimeterX has uncovered a new trend where multiple independent Magecart groups are skimming data from websites concurrently. In this part. We’ll examine two major incidents uncovered by the PerimeterX research team, where attackers infiltrated digital services through Magento-based applications.
  • Top Cybersecurity Threats Every Online Business Should Address Recorded: May 27 2020 57 mins
    Ido Safruti, CTO and Founder, PerimeterX; Deepak Patel, VP Cybersecurity Strategy, PerimeterX
    Cyberattacks continue to threaten online digital experiences. Automated bots and compromised third-party code outsmart existing defenses and compromise the integrity of your websites and mobile apps. This impacts an organization’s ability to be effective in conducting and securing online business. In this webcast, we’ll examine the top five security threats to online business, how to stay ahead of these attacks and proactively address client-side vulnerabilities and the practical strategies needed to protect customers, online revenue and company reputation.
  • PerimeterX Podcast Ep. 3: COVID-19 Recorded: May 26 2020 18 mins
    Ido Safruti, Co-founder and CTO; Liel Strauch, Director of Cybersecurity Research; Eric Pestana, Corporate Communications Mgr
    The current state of the world is forcing many businesses and industries to optimize their functions online. But with an influx of traffic comes an influx of risk. PerimeterX co-founder and CTO Ido Safruti and Director of Cybersecurity Research Liel Strauch recently sat down to discuss trends, takeaways and best practices on how to best equip your business during COVID-19.
  • Stop Account Takeover with Okta and PerimeterX Recorded: Apr 30 2020 43 mins
    Swaroop Sham, Customer Identity Product Marketing, Okta and Hadas Weinrib, Sr. Product Marketing Manager, PerimeterX
    80% of login attempts are from bad bots. Cybercriminals use malicious bots that bypass CAPTCHAs and legacy defenses to execute account takeover (ATO) attacks that result in fraudulent purchases and stolen loyalty points and personal data. IT and security professionals will want to stay ahead of these malicious attacks to protect brand reputation and competitive edge.

    Register for this live webinar brought to you by Okta and PerimeterX to learn how to:
    -Stay ahead of bot attacks with Okta’s strong identity engine
    -Beat bad bots with PerimeterX’s proprietary algorithmic modeling
    -Customize with wide range of infrastructure, including cloud-services, middleware, load balancers, and CDN solutions
Cyber Security Webinars: Discussing latest Trends & Threats
PerimeterX protects the modern web and mobile applications, and APIs from automated attacks. We protect against account abuse, carding, scraping, checkout abuse, marketing fraud, PII harvesting, skimming and watering hole attacks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Bot Defender Demo
  • Live at: Jan 10 2020 10:40 pm
  • Presented by: Hadas Weinrib
  • From:
Your email has been sent.
or close