O SlideShare utiliza cookies para otimizar a funcionalidade e o desempenho do site, assim como para apresentar publicidade mais relevante aos nossos usuários. Se você continuar a navegar o site, você aceita o uso de cookies. Leia nosso Contrato do Usuário e nossa Política de Privacidade.

O SlideShare utiliza cookies para otimizar a funcionalidade e o desempenho do site, assim como para apresentar publicidade mais relevante aos nossos usuários. Se você continuar a utilizar o site, você aceita o uso de cookies. Leia nossa Política de Privacidade e nosso Contrato do Usuário para obter mais detalhes.

    SlideShare
  • Slideshare-64x64 Página inicial
  • Explorar
  • Pesquisar
    • Você
  • Carregar
  • Entrar
  • Cadastre-se
  • Início
  • Conheça mais

A Scribd passará a dirigir o SlideShare em 24 de setembro de 2020. A partir desta data, a Scribd passará a gerenciar sua conta do SlideShare e qualquer conteúdo que você possa ter na plataforma. Além disso, serão aplicados os Termos gerais de uso e a Política de Privacidade da Scribd. Se prefira sair da plataforma, por favor, encerre sua conta do SlideShare. Saiba mais.

×
×
×
×
×
×

Imperva

Imperva
  • Seguindo Seguir   Processing…
  • 126 SlideShares
  • 297 seguidores
  • 1 painel de recortes

Modal header

One fine body…

    • Redwood Shores, CA, United States
  • Setor Technology / Software / Internet
  • Site www.imperva.com
  • Sobre Imperva® (NASDAQ: IMPV) is a leading provider of cyber security solutions that protect business-critical data and applications. The company’s SecureSphere, CounterBreach, and Incapsula product lines enable organizations to discover assets and risks, protect information wherever it lives – in the cloud and on-premises – and comply with regulations. Imperva is headquartered in Redwood Shores, California.
TwitterFacebookLinkedIn
Marcadores (221)

application security cross site scripting cyber attack cyber crime cyber security data breach data security data theft database security ddos hacker hackers hacking imperva insider threat malware online attack presentation remote file inclusion report sql injection sqli web application attacks web application security web security xss mais…

account takeover account takeover attack advanced persistent threat alert fatigue amazon web services anatomy of an attack anonymous anti-malware anti-virus antivirus api apisecurity appeconomy application attacks application security apt artificial intelligence attack analytics attack vectors audit automated attacks automated web application attacks aws azure bitb blacklists bot botnet botnets bots boy-in-the-browser business logic attacks captcha client-side malware cloud security cms cms hacking comment spam common vulnerabilities and exposures compliance content management systems credential theft cross site scripting cross-site request forgery cross-site scripting cusrf cves cyber attack cyber crime cyber security cybercrime cybercriminals cybersecurity data audit data auditing data breach data governance data growth data loss prevention data owners data protection data risk data security data theft database security database attacks database audit database audit and protection database monitoring database security database threat database threats datasecurity dbaas dcap ddos ddos attack denial of service devsecops directory traversal dlp dos dt dynamic profiling e-commerce ebook excessive privilege abuse fam file activity monitoring file audit file inclusion file management file security file systems firewalls gartner mq gdpr general data protection regulation google hacking hack hacker hacker forum hacker forums hackers hacking hacktivist hacktivists havij healthcare heartbleed himss honey pots html html 5 http http/2 http/2 protocol imperva imperva gdpr dpo machinelearning ai incapsula incident response industrialized hacking infographic information security insider threat internet protocol internet security ips it security joomla known vulnerability attack leet botnet legitimate privilege abuse lfi libwww-perl local file inclusion lulzsec machine learning malware man in the browser man-in-the-browser metadata framework mitb native audit netsparker network security next-gen firewalls office 365 online attack owasp password worst practices passwords pci pci dss pdf attack peering architecture permissions management phishing phishing kit php presentation privilege elevation query acl ransomware remote file inclusion report reverse engineering rfi rsa2018 search engine hacking search engine poisoning securesphere securing sharepoint security alerts security trends securityshorts seo sep share point security share point vulnerabilities sharepoint sharepoint governance sharepoint security sharepoint security ebook siem skyfence social engineering social media spear phishing sql sql injection sqli sqlmap ssl stolen credentials superglobals survey targeted attacks tax scam third-party software trends trojan user access rights video vulnerabilities vulnerability attack waf weak audit web web application attacks web application firewall web application security web attacks web protocol web security white paper wikileakes world wide web xss zero day zero downtime …menos

Visualizar tudo Documents (33)

  • 7 Tips to Protect Your Data from Contractors and Privileged Vendors 7 Tips to Protect Your Data f... Há 3 anos
  • SEO Botnet Sophistication SEO Botnet Sophistication Há 3 anos
  • Phishing Made Easy Phishing Made Easy Há 3 anos
  • Combat Payment Card Attacks with WAF and Threat Intelligence Combat Payment Card Attacks w... Há 3 anos

Visualizar tudo Videos (12)

  • Investigating Hacker Forums Video Investigating Hacker Forums V... Há 8 anos
  • SQL Injection -- by the Numbers Video SQL Injection -- by the Numbe... Há 8 anos
  • Protect Against Malicious PDFs Protect Against Malicious PDFs Há 8 anos
  • Google Hacking: How Hackers Automate Google Hacking with Botnets Google Hacking: How Hackers A... Há 9 anos

Visualizar tudo Presentations (75)

  • Survey: CyberSecurity Event Alerts Overwhelming Security Teams Survey: CyberSecurity Event A... Há 2 anos
  • Cybersecurity and Healthcare - HIMSS 2018 Survey Cybersecurity and Healthcare ... Há 2 anos
  • Cybersecurity and Healthcare - HIMSS 2018 Survey Cybersecurity and Healthcare ... Há 2 anos
  • API Security Survey API Security Survey Há 2 anos
  • English
  • Español
  • Português
  • Français
  • Deutsch
  • Sobre
  • Desenvolvedores e API
  • Blog
  • Termos
  • Privacidade
  • Direitos Autorais
  • Suporte
Feeds RSS