Imperva Blog|Login|中文Deutsch日本語

White Papers

Selected Tag: Web Security | Show All

Download White Paper

Web Attack Survival Guide


The Web Attack Survival Guide is your secret weapon for surviving attacks from hacktivists and cybercriminals. This guide provides step-by-step instructions to help you prepare for and stop web attacks, from hardening your applications, to blocking advanced attacks like SQL injection and DDoS, to performing a post-mortem after the attack is over. Armed with this guide, you can confidently face impending web attacks with a well-thought out strategy.

Tags: Web Security, Web Application Security, Web Application Attacks, Hacktivists, Cybercriminals, SQL Injection, DDoS, Guide


Download White Paper

What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications


Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This paper lays out the six key requirements needed to protect Web applications and it shows how Web application firewalls alone can effectively satisfy these requirements.

Tags: Web Security, Web Application Security, Web Application Attacks, Firewalls


Download White Paper

Four Steps to Defeating a DDoS Attack


Hackers, criminals, and political "hactivists" have increasingly turned to Distributed Denial of Service (DDoS) attacks to disrupt access to or even take down legitimate Websites. This white paper describes DDoS attack methods such as powerful DDoS attacks originating from servers and new, advanced application DDoS attacks. It then lays out four simple steps that organizations can undertake to mitigate DDoS attacks.

Tags: Web Security, Web Application Security, Threats, Web Application Attacks, DDoS, Distributed Denial of Service, DDoS Protection, Cyber-Crime


Download White Paper

Botnets at the Gate


Stopping Botnets and Distributed Denial of Service Attacks
Botnets have infiltrated millions of users' computers and wrecked incalculable damage. This white paper lifts the veil on botnets and on the cyber-criminals behind them. It analyzes the history, growth, and economics behind botnets. It then investigates one of the most common attacks executed by botnets: the Distributed Denial of Service (DDoS) attack.

Tags: Web Security, Web Application Security, Cyber-Crime, Denial of Service Attacks, DOS, DDoS

Selected Tag: Web Security | Show All


Term of the Month