• Tech Demo - AWS Container Security with SecureSphere

    Containers are exponentially growing as an agile and efficient way to deploy applications on the cloud. This opens new security challenges for cloud environments. In this session, learn about how Imperva SecureSphere can protect applications leveraging Amazon’s EC2 Container Service (ECS) and walk through a brief demonstration on configuring SecureSphere alongside applications using ECS.

  • CISO’s Tough Decision: Security On-Prem, Cloud or Both?

    Managing application security on-premises and in the cloud can be tricky. Whether CISOs want it or not, cloud transition will happen. As a CISO, you need to be ready to align operations with future company requirements and to determine when security solutions should be hosted on-premises, in the cloud or by using a hybrid model.

  • Tech Demo - Flexible hybrid cloud application security

    Enterprises are adopting a hybrid infrastructure model to take advantage of rapid deployment of cloud-based services and higher computing power. This session will show the flexibility of Imperva Application Security that will allow you to secure applications as they move to the cloud while future proofing application security investments.

  • Technical Deep Dive: Imperva DDoS Protection - How to Defeat Botnets and Prevent Downtime

    Presented by Sina Siar, Solutions Manager, Imperva | Nabeel Hasan Saeed, Product Marketing Manager, Imperva

    Website downtime from DDoS attacks can cost you thousands or even millions of dollars an hour due to lost revenue and brand damage. Join us for a 30-minute live product demonstration and Q&A with a security expert for an inside look at how Incapsula protects your website from DDoS attacks. During this session we’ll explore the user interface, explain how to easily identify and block web security threats, how to use our global content delivery network (CDN) for instant performance enhancement, and how to gain valuable insights into your website's traffic using real-time monitoring. We’ll also review some of the more advanced features of the service like cloud-based load balancing.

  • Technical Deep Dive: Securing Office 365 with Imperva Cloud Access Security Broker

    Presented by Norv Leong, Sr. Director, Product Marketing, Imperva | Guillermo Rodriguez, Sr. Security Engineer, Imperva

    When moving to Office 365 the spotlight is turned on securing access and protecting sensitive and regulated information in the cloud. Understanding the native Office 365 security limitations and recommended implementations for common security use cases is critical. Join us for a 30-minute live product demonstration and Q&A with a security expert as we discuss defining and developing an Office 365 security strategy and how a CASB such as Skyfence can factor into your plans.

  • Get More from Your CASB—The CASB of Choice for Imperva Customers

    Presented by Frank Cabri, Vice President Marketing, Imperva | Norv Leong, Senior Director Product Marketing, Imperva

    A cloud access security broker (CASB) doesn’t need to be yet another point solution in your IT infrastructure. Get more value with Imperva Skyfence—the only CASB integrated with Imperva products delivering unmatched security and data protection for cloud apps like Office 365, Dropbox, Salesforce and more.

    Watch this webinar and learn:

    • Why CASBs are considered required infrastructure by Gartner
    • Top customer use cases for Skyfence CASB – from BYOD access to data leak prevention
    • New features for monitoring and controlling access from Tor networks, anonymous proxies, and malicious IPs
    • How integrations with Imperva Incapsula, CounterBreach, and ThreatRadar make Skyfence the best CASB choice for Imperva customers

  • Understanding ‘Man in the Cloud’ Attacks: The Hidden Threat in Cloud File Sharing Services

    Presented by Amichai Shulman, CTO, Imperva and Frank Cabri, Vice President of Marketing for Imperva Skyfence, Imperva

    Already widely adopted by enterprises, use of cloud file sharing services such as Office 365, OneDrive, Dropbox, Box and Google Drive is on the rise. As adoption increases, so does the motivation for attack. The Imperva Defense Center recently announced new research on a new type of attack we call “Man in the Cloud” (MITC). These attacks rely on common file synchronization services as their infrastructure for command and control, data exfiltration and remote access. Without using any exploits, a bad actor can turn them into a devastating attack tool undetected by traditional security measures. 

    Join Imperva CTO Amichai Shulman and Frank Cabri, Vice President of Marketing for Imperva Skyfence, to learn about:

    • Cloud file sharing application trends, adoption and risk
    • The anatomy of a MITC attack and how to identify it
    • How traditional endpoint and perimeter security measures are insufficient to protect against these threats
    • Recommendations for securing and protecting cloud apps and data

  • How to Balance Ecommerce Security with Performance

    Presented by Nabeel Hasan Saeed, Product Marketing Manager, Imperva Incapsula | Ryan McElrath, Chief Technology Officer, American Eagle | Armando Roggio, Senior Editor, Practical Ecommerce

    Cyber criminals’ ability to attack and penetrate ecommerce sites has never been more sophisticated. The threats merchants face today include automated bot access, malware injections, DDoS attacks, and many more. How can you protect your ecommerce site? Can all threats be prevented? And how will prevention measures affect your site’s performance and the experience of your customers?

    Attend this webinar and learn:

    • What threats ecommerce providers face
    • Why traditional protection measures affect website performance
    • How to protect your website without compromising performance

  • Proven Strategies for Streamlining Cloud App Access and Security

    Presented by Norv Leong, Senior Director, Product Marketing for Imperva Skyfence, Imperva and William Greenlee, Technical Alliance Manager, Centrify

    As apps like Salesforce, Office 365, Google for Work, and ServiceNow become the norm, securing access to and maintaining compliance of the data accessed by these cloud apps is a necessity.

    Join experts from Imperva and Centrify as they share best practices on enabling the safe and productive use of cloud apps. Attend and learn how to:

    • Provide secure single sign-on and user-friendly multi-factor authentication
    • Secure and monitor SaaS access from login to logout
    • Detect and block cyber threats such as account takeovers
    • Simplify, centralize and automate access management – across apps and devices

  • Securing Office 365 through Cloud Access Security Brokers

    Presented by Norv Leong, Senior Director, Product Marketing for Imperva Skyfence, Imperva

    Microsoft Office 365 is quickly establishing itself as the go-to productivity suite used in organizations today. However, even Microsoft maintains that Office 365 security is a shared responsibility between itself and the customer. Office 365 provides some capabilities natively, but at the end of the day, Microsoft does not take responsibility for managing mobile access, enforcing access policies, and meeting compliance requirements.

    Watch this informative webinar where you’ll learn how to define, develop, and execute an Office 365 security plan while meeting all of your compliance obligations.

  • Now You Can Defend Against the High Risks of Shadow IT

    Presented by Frank Cabri, Vice President, Imperva Skyfence Marketing, Imperva, and Jim Fulton, Senior Director, Product Marketing, Raytheon|Websense.

    The bring-your-own cloud app trend – so-called “Shadow IT” – has brought new risks to your data that traditional security controls can’t detect or defend against.

    The good news is that Raytheon|Websense and Imperva have partnered to bring organizations a robust reporting and risk intelligence tool that identifies the security risks of cloud apps like Box, Dropbox, Google Apps and hundreds of others.

    View this webinar and learn:

    • How to extend your Websense platform to obtain visibility of cloud apps
    • The different aspects of risk as it relates to cloud apps
    • How to generate a cloud discovery report in a few short steps
    • Deployment considerations, tips and tricks

    • Play Video
  • BrightTalk Incident Response and Data Protection Summit: Sophisticated Incident Response Requires Sophisticated Activity Monitoring

    Presented by Mike Sanders, Principal SE and Team Lead, Imperva | Bryan Orme, Principal, GuidePoint Security

    Are you prepared for a data breach? Are you confident you will find a breach in a timely manner? Facts are over 70% of businesses report a security breach and 75% of breaches are undetected for days or even months. Once discovered, incident response teams are under extreme pressure to close the breach, figure out what happened, what was lost, and calculate the risk. Organizations need a sophisticated incident response plan.

    Attend this webinar and learn how to:

    • Discover sensitive data, risk, and vulnerabilities
    • Detect and block cyber security events
    • Investigate incidents and automate remediation
    • Demonstrate consistent policy application across all sensitive data

  • Making DLP Work for Cloud Apps

    Presented by Norv Leong, Sr. Director Product Marketing, Imperva Skyfence

    Today, file sharing and collaboration apps are among the most used by employees, creating a blind spot and opportunity for PII, PCI, HIPAA and other sensitive data to be leaked from the organization.

    Understand the fundamental issues, mobile access considerations and proven approaches for securing your valuable data residing in cloud apps. Learn how Cloud Data Loss Prevention (DLP) from Imperva Skyfence enables you to complement your on-premises DLP solution and truly secure ALL your data.

    • Play Video
  • Database Security, Better Audits, Lower Costs

    Presented by Terry Ray, Chief Product Strategist, Imperva | Cheryl O’Neill, Director Product Marketing, Database Security, Imperva

    The complexity of implementing and maintaining IBM Guardium or a native audit solution within an enterprise environment can quickly run into trouble. Escalating costs, manularity, and gaps in coverage put your company at risk of a failed audit or data breach. This webinar will share the experiences of Imperva customers who have moved from native audit or Guardium to Imperva SecureSphere for database audit and protection (DAP).

    Attendees will leave with an understanding of:

    • Security and compliance factors that organizations should consider
    • The methods of deployment within an enterprise environment
    • The monetary and human costs associated with each DAP architecture

  • BrightTalk Hackers and Threats Summit: Extend Enterprise Application-level Security to Your AWS Environment

    Presented by Chris Grove, Director of Solution Architecture, Imperva | Matt Yanchyshyn, Senior, Manager of Solutions Architecture, AWS

    When organizations shift to a public cloud environment, security and compliance must remain top of mind. While Amazon Web Services (AWS) provides robust infrastructure-level protections, today’s attackers target the applications themselves.

    This webinar will:

    • Discuss inherent AWS security capabilities
    • Review attack types that target the applications and why traditional security approaches can’t stop them
    • Illustrate how Imperva SecureSphere for AWS stops these attacks and enables you to use the security infrastructure in the cloud and on-premise

  • Securing Access and Protecting Your Data in Office 365

    Presented by Orin Thomas, Contributing Editor, Windows IT Pro | Norv Leong, Senior Director of Product Marketing, Imperva Skyfence

    The rapid adoption of Office 365 has turned the spotlight on securing access and protecting sensitive corporate data that’s residing in the cloud. Coupled with the proliferation of mobile devices and BYOD in general, IT organizations that adopt Office 365 are now having to cope with a new breed of security challenges different from those they faced with a strictly on-premises deployment.

    In this webinar, you'll learn:

    • How to monitor access to ensure Office 365 services are limited to authorized users and approved devices
    • How to protect against threats, such as Office 365 account hijacks
    • How to protect against the leakage of sensitive data through Outlook, OneDrive for Business, and SharePoint Online

    • Play Video
  • BrightTalk Hackers and Threats Summit: An Inside Look at a Sophisticated, Multi-vector DDoS Attack

    Presented by Orion Cassetto, Director Product Marketing, Imperva Incapsula

    This webinar will explore the current DDoS attack landscape, it will cover the basics of DDoS attacks, current trends including the most recent results from the newly published 2015 Imperva Incapsula DDoS Report. We will also discuss a detailed analysis of one of today’s modern, multi-vector DDoS attacks. While dissecting this DDoS attack, the talk will explore the anatomy and timeline of the attack, as well as the steps used to mitigate each phase of the assault. This session will close with a review of the aspects of effective DDoS protection solutions used to combat these sophisticated denial of service attacks.

  • Remediate before it's too late - Stop intruders from exploiting holes in your web apps.

    Presented by Illena Armstrong, VP, Editorial, SC Magazine and Mark Kraynak, Chief Product Officer, Imperva

    With mega breaches coming one right after another, many industry players have registered both disbelief and awe at the sheer numbers of individual credentials stolen. For instance, last year Russian hackers called CyberVor were able to pilfer 4.5 billion unique records, the majority of which were credentials such as IDs and passwords. Reportedly, the thieves took advantage of pre-existing holes in website code to launch SQL injection attacks to prompt web apps to execute malicious commands. In this instance, about 400,000 sites were vulnerable to the assault. But this is just one type of offensive cybercriminals enlist by exploiting well-known and sometimes long-standing vulnerabilities in applications on which companies rely -- even though there are readily available mitigations for them. So what can organizations do to take care of the myriad holes on which online thieves seem to rely? We review some of the more common attacks used by cybercriminal rings, and identify the techniques and over-arching best practices to block them.

    • Play Video
  • How a Low Risk Cloud App Can Become a Big Threat

    Presented by Norv Leong, Sr. Director Product Marketing, Imperva Skyfence

    Can you identify which ex-employees have access to your cloud data? Would you like to benchmark your cloud app security settings against best practices or compliance standards like PCI, HIPAA and others?

    Most organizations are aware of the dangers presented by unauthorized, high-risk cloud apps. But what about your authorized apps like Office 365, Salesforce, Google Apps and Amazon Web Services? Your specific users and implementations are invaluable in assessing the true risk for your company. Listen to this on-demand webinar and learn about contextual risk factors and approaches that can:

    • Enable you to see how your cloud environment stacks up against industry best practices
    • Mitigate threats from previously authorized users
    • Identify ex-employees and unauthorized users with access to your cloud apps
    • Simplify risk remediation and policy administration

    • Play Video
  • 5 Cyber Security Predictions for 2015

    Presented by Anthony Bettencourt, President & CEO, Imperva | Mark Kraynak, Chief Product Officer, Imperva

    We’ve combined the data collected from our products with the insights gathered from our customers to come up with some meaningful commentary and helpful guidance for 2015. Check out our predictions for the year ahead and make sure you’re ready.

    • Play Video
  • Top Five Security Must-Haves for Office 365

    Presented by Shan Zhou, Senior Director, Security Engineering, Skyfence | Frank Cabri, VP Marketing, Skyfence

    Whether you’ve already deployed Office 365 or have plans to, security considerations around moving your business-critical apps to the cloud are paramount. From Exchange, Yammer, and SharePoint to OneDrive and the Administrator Portal, monitoring activity and securing access is critical to mitigating threats and protecting confidential data.

    Join Skyfence, an Imperva company, for an educational webinar on Office 365 to:

    • Understand access control issues and their impact for employees, mobile workers and contractors
    • Learn about new account-centric attacks that are targeting Office 365 and other cloud apps
    • Discuss strategies for reducing excessive permissions for administrators
    • Hear about privacy laws around cloud data
    • Learn how to discover and manage the trend toward unauthorized file sharing and Shadow IT apps

  • PCI 3.0 Revealed - What You Need to Know Today

    Presented by Barry Shteiman, Director of Security Strategy, Imperva

    On November 7th, the PCI Security Standards Council will unveil v3.0 of the Payment Card Industry Data Security Standard (PCI DSS). On the same day the new version is released, Imperva's Director of Security Strategy, Barry Shteiman, will deliver a free webinar focusing on the most significant changes to the standard.

    Imperva is a participating organization in the PCI Council and has helped hundreds of organizations improve data security and demonstrate compliance with PCI DSS. Please join Barry in this informative webinar as he discusses:

    • The historic development of the PCI DSS standard
    • Key changes introduced in PCI DSS 3.0
    • Lessons learned - compliance as risk mitigation

    • Play Video