Datasheet
Imperva is a leading provider of cyber security solutions that protect business critical data and applications in the cloud and on-premises.
Guide
This guide focuses on application and data security. It shows you how to migrate your security policies from on-premises to the cloud, depending on the deployment you select. It delineates the various options available to you and helps you identify a path that makes the most sense for your site-spec...
Industry Study
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Imperva SecureSphere on their organizations.
In November 2017, Imperva commissioned Forrester Consulting to conduct a study of IT professionals to explore current security and compliance challenges faced by companies who are evolving their database ecosystems through cloud and big data initiatives. The objective was to understand how companies...
Resources
Cyber attacks are inevitable. Data loss is not. Cyber security attacks targeting U.S. Federal and State and Local Governments continue to grow in number and sophistication. The attacks committed during the 2016 election have reaffirmed, now more than ever, how important it is to protect the data in ...
This eBook goes beyond the guidance from Open Web Application SEcurity Project (OWASP) to provide insight into ways that security teams can use best-of-breed solutions to protect against recently identified OWASP Top 10 threats. These solutions provide layers of defense that work together to signifi...
Whitepaper
Web application firewalls have become an essential component of the modern organization’s
security infrastructure, providing scalable high-fidelity protection of business-critical web
applications from a broad spectrum of cyber threats. As with any must-have enterprise security
solution, there ...
Imperva Camouflage offers an industry recognized best practice methodology that includes five core steps and a logical flow from the discovery of all sensitive information - through to the configuration of the masking engine with appropriate data masking techniques to protect that sensitive informat...