• 888.662.2724
  • sales@carahsoft.com
  • Request A Quote
  • Join Our Team
  • Accessibility
  • Chat With Us
Advanced Search
Search Form
About Carahsoft Awards News
Carahsoft Carahsoft
Menu
  • Solve
    • Technology Vendors
    • VMware
    • Adobe
    • Symantec
    • Palo Alto Networks
    • Veritas
    • Dell EMC
    • Micro Focus
    • SAP
    • SAP NS2
    • Red Hat
    • F5 Networks
    • Salesforce
    • Splunk
    • FireEye
    • ServiceNow
    • Google Cloud
    VIEW ALL VENDORS >
    • Solution Sets
    • FedRAMP
    • Big Data
    • Cybersecurity
    • Cloud Computing
    • Citizen Engagement
    • Geospatial
    • In-Q-Tel / a16z
    • Mobility
    • Open Source
    • Virtualization
    • Law Enforcement
    • Machine Learning & AI
    • Internet of Things
    • Healthcare
    Partner Solutions Portfolio
  • Learn
    • Resources
    • Events
    • Resources
    • Community Trends
    • Innovation in Government
  • Buy
    • Contracts
    • GSA Schedule
    • SEWP
    • ESI BPA
    • Other Federal IDIQ/GWAC
    • Army CHESS ITES-SW
    • State & Local
    • Education
    • CDM
    • AWS Marketplace
  • Partners
  • Contact Us
  • About

Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Learn

Filter by Featured Vendor

Clear Filter
  • All
  • VMware
  • Adobe
  • Symantec
  • Dell EMC
  • Micro Focus
  • SAP
  • Red Hat
  • F5 Networks
  • Salesforce
  • Splunk
  • FireEye
  • ServiceNow
  • Google Cloud

Filter by Solution

Clear Filter
  • Big Data
  • Cybersecurity
  • Cloud Computing
  • Citizen Engagement
  • Geospatial
  • Intelligence
  • Mobility
  • Open Source
  • Virtualization
  • FedRamp
  • Events
  • Resources

Events

Imperva-Logo.png
Imperva Webcast

Imperva's Web Application Firewall


Event Date: October 25, 2018
Hosted By: Imperva & Carahsoft
There are two types of web applications, those that have been compromised and those that will become compromised. The fact of the matter is that websites typically have vulnerabilities. The problem is so widespread that – according to a report by Cenzic, a leading vulnerability scanner – 96% of today’s web apps have vulnerabilities. These vulnerabilities leave websites susceptible to attack. So it almost goes without saying that a good web application firewall is a must.

To further compound the web security problem, an increasing amount of website traffic is automated.These automated clients or Bots now make up over half of web traffic and of that, roughly 50% is malicious, or Bots that are up to no good.

Attendees of this webinar joined Jon Burton, Director of Sales Engineering at Imperva to discover the solution to this ever growing threat - Imperva’s All-in-on, Single Stack Application Security, DDoS, Bot Protection, CDN and Content Delivery SAAS solution. Learn about some of its key features, including:
  • Enterprise Grade Website Security and Web Application Firewall
  • Volumetric DDoS Attack and Bot Protection
  • Global Content Delivery Network and Load balancing
  • Objection Handling

Fill out the form below to view this archived event.


Resources

SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? ORDER BY FeaturedBit DESC, Type ASC

Datasheet

Imperva-Logo.png
Datasheet
Imperva Company Overview
Imperva is a leading provider of cyber security solutions that protect business critical data and applications in the cloud and on-premises.
READ MORE >

Guide

Imperva-Logo.png
Guide
Cloud Migration Guide
This guide focuses on application and data security. It shows you how to migrate your security policies from on-premises to the cloud, depending on the deployment you select. It delineates the various options available to you and helps you identify a path that makes the most sense for your site-spec...
READ MORE >

Industry Study

Imperva-Logo.png
Industry Study
The Total Economic Impact of Imperva SecureSphere
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Imperva SecureSphere on their organizations.
READ MORE >

Imperva-Logo.png
Industry Study
Modern Database Architectures Demand Modern Data Security Measures
In November 2017, Imperva commissioned Forrester Consulting to conduct a study of IT professionals to explore current security and compliance challenges faced by companies who are evolving their database ecosystems through cloud and big data initiatives. The objective was to understand how companies...
READ MORE >

Resources

Imperva-Logo.png
Resources
Protecting State and Local Government Elections from Cyber Attacks
Cyber attacks are inevitable. Data loss is not. Cyber security attacks targeting U.S. Federal and State and Local Governments continue to grow in number and sophistication. The attacks committed during the 2016 election have reaffirmed, now more than ever, how important it is to protect the data in ...
READ MORE >

Imperva-Logo.png
Resources
Protect Your Applications Against All OWASP Top 10 Risks
This eBook goes beyond the guidance from Open Web Application SEcurity Project (OWASP) to provide insight into ways that security teams can use best-of-breed solutions to protect against recently identified OWASP Top 10 threats. These solutions provide layers of defense that work together to signifi...
READ MORE >

Whitepaper

Imperva-Logo.png
Whitepaper
Five Ways Imperva Surpasses the Competition for Web Application Security
Web application firewalls have become an essential component of the modern organization’s security infrastructure, providing scalable high-fidelity protection of business-critical web applications from a broad spectrum of cyber threats. As with any must-have enterprise security solution, there ...
READ MORE >

Imperva-Logo.png
Whitepaper
Data Masking Best Practices – Five Steps to Making Data Masking a Reality
Imperva Camouflage offers an industry recognized best practice methodology that includes five core steps and a logical flow from the discovery of all sensitive information - through to the configuration of the masking engine with appropriate data masking techniques to protect that sensitive informat...
READ MORE >
Contact Details
1860 Michael Faraday Dr.
Suite 100
Reston, Virginia 20190
Email:
sales@carahsoft.com
Phone:
703-871-8500
Toll Free:
888-662-2724
Fax:
703-871-8505
CONTACT US >
Latest Tweets

Request a demo

  • Kara Sprague, SVP & GM of App Services of @F5Networks, will be the keynote speaker at #F5GovSym, where she'll discu… https://t.co/AouRfb0Xz5 about 9 hours ago
  • Agencies can evolve toward a modern infrastructure with @vmwarevsan – learn how #VMwarevSAN allows you to do more w… https://t.co/TqUAEYmA5w about 10 hours ago
  • Learn how to hunt for cyber threats that target weapon systems with @bobgourley & @FidelisCyber Engineer Bob Henry… https://t.co/OvwnfwL7Nx about 11 hours ago
eNEWS SIGN UP

Subscribe for the latest news,
events, and updates from Carahsoft.

  • file30-MINUTE QUOTE Fast, accurate quote turnaround.
  • filePARTNER WITH US Join our dynamic partner ecosystem.
  • fileJOIN OUR TEAM Start your sales or marketing career now!
  • Home
  • Solve
  • Learn
  • Buy
  • Partners
  • About
  • Contact
  • Careers
  • Privacy

© 2019 Carahsoft Technology Corp. | All rights reserved

  • facebook
  • twitter
  • linkedin
  • youtube
  • community
Carahsoft eNews Signup