Community Blogs

1 person recommends this.
https://unsplash.com/photos/kBUfvkbFIoE Discover how Imperva’s holistic approach to bot defense detects and mitigates malicious bot behavior. The larger an enterprise’s web presence is, the greater a surface area it provides to cyberattackers. Today’s hackers use highly automated systems to probe for vulnerabilities, carry out cyberattacks, and scrape data from public-facing web pages. Enterprises are leading the overall growth of web application and user interconnectivity. The enterprise networking market is growing at a rate of 30.8% per year . At the same time, Gartner expects 5.8 billion enterprise and automotive IoT endpoints will be ...
0 comments
Be the first person to recommend this.
https://unsplash.com/photos/fzOITuS1DIQ ATO Protection addresses attack strategies typically underserved by other cybersecurity technologies. Two and a half thousand years ago, on the banks of the Yellow river near the modern-day city of Luoyang, a horse-mounted general scribbled a note to himself that would change history: The skillful leader subdues the enemy's troops without any fighting; he captures their cities without laying siege to them; he overthrows their kingdom without lengthy operations in the field The value of the practical advice in Sun Tzu’s Art of War has made it one of the most revered books in history. Over ...
0 comments
Be the first person to recommend this.
https://unsplash.com/photos/YmgTIrUJCgc Distinguishing between “good” bots and “bad” bots is key to implementing a solid security framework. Automated web traffic is a fundamental part of the Internet. The bots that generate this traffic come from a wide variety of sources, from Google’s harmless web crawling to malicious hackers targeting government voter registration pages. In fact, bots drove almost 40% of all collected Internet traffic in 2018. That means that out of every ten Internet users, only six are actually human beings sitting behind a computer or peering into a smartphone. The vast proliferation of bots is a concerning ...
0 comments
Be the first person to recommend this.
As of February 2020, Google Chrome and other Chromium-based browsers have stopped sending third-party cookies in cross-site requests unless the cookies are secured and flagged using an IETF standard called SameSite . This article provides an information for Imperva On-Prem WAF customers about the change and how to make sure this functionality is supported. The SameSite cookie attribute gives websites control over how to handle their cookies, specifically by not sending cookies to third-party sites. In allowing our customers to control where cookies are sent, their application will be protected against CSRF since an attacker cannot obtain information ...
3 comments
Be the first person to recommend this.
Cezmi Çal provides world-class security services to clients through one of Turkey’s leading cybersecurity firms. Imperva technology can be found everywhere there are security challenges to mitigate, from small businesses to multi-national government security vendors. Today’s spotlight shines on an information security expert and certified ethical hacker whose company, Barikat, holds NATO-grade security clearances and National Defense Ministry contracts. Barikat Internet Security earned its place as Turkey’s top-ranking security service provider in 2019 . It is through the work of people like expert information security specialist @cezmi ...
0 comments
Be the first person to recommend this.
https://unsplash.com/photos/glRqyWJgUeY Keeping up with new audit requirements and database monitoring needs requires solutions for handling far higher agent deployments. At its core, database activity monitoring (DAM) is a concept as simple as it is powerful. The DAM agent is registered to a database server and assigned to a specific gateway. It then monitors and analyzes database activity independently of the database management system. This allows for improved database performance while complying with regulatory systems like the PCI DDS, The HIPAA Act, or Sarbanes-Oxley. It also protects sensitive databases from external attacks by providing ...
0 comments
3 people recommend this.
https://unsplash.com/photos/_X-f0s20tcM ATO Protection addresses attack strategies typically under-served by other cybersecurity technologies. Two and a half thousand years ago, on the banks of the Yellow river near the modern-day city of Luoyang, a horse-mounted general scribbled a note to himself that would change history: The skillful leader subdues the enemy's troops without any fighting; he captures their cities without laying siege to them; he overthrows their kingdom without lengthy operations in the field The value of the practical advice in Sun Tzu’s Art of War has made it one of the most revered books in history. Over ...
0 comments
Be the first person to recommend this.
https://unsplash.com/photos/J3pkJFnpDkM Troubleshoot this common problem to improve search rankings and user satisfaction. Slow page load times can stop an online business in its tracks. Many website owners already know that that page load speed is one of Google’s top ranking factors . It’s also a critical element of good UI design – nothing frustrates users quite like a slow website. But as web technology improves, so do user expectations when it comes to website features. This is especially true when it comes to cybersecurity, where the number and sophistication of technologies is growing at a rapid rate. This is why slow page load speeds ...
1 comment
1 person recommends this.
Find out how one of San Francisco’s most reputable financial service providers keeps its users safe and secure. The Imperva community is an important source of information, troubleshooting advice, and in-depth guidance for cybersecurity professionals who rely on Imperva technology. Just ask @Robert Miller , Senior Cybersecurity Engineer at the Bank of the West. Bob leveraged a background in mainframe programming and database infrastructure into a critical role identifying and resolving security vulnerabilities for a bank with 600+ branches and almost 2 million customers . Introducing Bob Miller Bob’s first foray into the world of ...
3 comments
1 person recommends this.
https://unsplash.com/photos/w7ZyuGYNpRQ Find out how we identify and respond to new security threats in real-time. Maintaining data security for an enterprise demands vigilance and hard work. The larger a company, the greater the surface area it presents to attackers is. For enterprise-level organizations, every application carries a potential for cybercriminal abuse. New vulnerabilities and exploits are coming to surface every day, and it takes a dedicated team to develop solutions to those vulnerabilities in time. Imperva has earned its place as one of the industry’s most reputable cybersecurity vendors thanks to its dedication to fast ...
0 comments
1 person recommends this.
Handling DAM connectivity with multiple agents requires taking a careful approach to sizing and performance. When it comes to data-centric security, database administrators have a broad range of tools to choose from. While the native audit is a popular and easy-to-use solution, it comes with limitations. Native audits only use the database server’s built-in tools, so there is an inherent trade-off between security and performance. Database activity monitoring (DAM), on the other hand, identifies and reports unauthorized behavior without severely impacting operations or productivity. This gives DAM solutions a valuable edge over native ...
0 comments
Be the first person to recommend this.
Introduction Imperva Release Notes provide information on changes and enhancements to our Cloud WAF product in each release. In October 2019 a series of changes were implemented to protect Imperva Cloud WAF customers against HTTP Request Smuggling attacks (learn more here ). Further updates have been made over the past 60 days; these changes have also been detailed in in Release Notes. This article will explain recent updates, detail the attack technique that precipitated them and explain why it is important to be protected against such attacks. What is HTTP Smuggling? An HTTP Request Smuggling attack includes HTTP requests aiming ...
0 comments
2 people recommend this.
Discover how Imperva helps S&T Global engineer security solutions for its Albanian customers. To many of its customers and partners, Imperva means more than world-class security technologies. The Imperva user community is an important part of our entire business ecosystem. Our customers and partners regularly rely on expert advice to solve the industry’s toughest challenges and obtain guidance for delicate deployments. Cybersecurity is a demanding, constantly changing field. Imperva’s user community helps people around the globe gain access to the latest developments in the industry, and empowers them to share their insights with other Imperva ...
0 comments
Be the first person to recommend this.
Preparing to deploy DAM and multiple Agents, what are the important factors in doing this deployment. Sizing Probably the most important factor is proper sizing. Sizing has two main factors – HPS and Throughput HPS – hits per second – are the number of SQL hits/sec the GW can accept and process Every GW model has its own maximum HPS that it can support, so its important to know what model of GW is being deployed Throughput, is the amount of raw data that can be accepted by the GW The throughput is the total data being sent by all agents that are connected to the GW Audit requirements It is critical to know ...
0 comments
1 person recommends this.
Security Modules and Alert Mode Alert mode should only be used for websites that are subject to the “Cross Site Scripting Rule”. If your website is not subject to the rule and your security modules are set to “Alert Only”, your settings may not be meeting best practice. Please follow the below steps to change settings: 1. Log in to your my.imperva.com account. 2. On the sidebar, click Websites (default). 3. Click a site name to access the site's dashboard. 4. On the sidebar, click Settings. 5. Click WAF and you will be directed to the below page: Define Threat Responses For each type of threat, you ...
0 comments
Be the first person to recommend this.
AIX Requirements Imperva requires the DB to be started if it’s running on AIX, why is this an Imperva requirement? This is not an Imperva requirement, it is dictated by AIX design and processing This situation involves system call updates and how they are made available to the processes that need those calls to function as expected Specifically the system calls updated or newly added by the agent These system-calls are updated directly to the primary system-call table – aka svc table In addition to the main svc table there are copies of this table which are used by the various processes/applications In order to have the updated ...
0 comments
Be the first person to recommend this.
VM Admin is resisting requests to reserve resources for the Imperva instance. What is the proper response? VM advantages Imperva recognizes that there are many advantages of deploying virtual instances One primary advantage is that it allows the instances/hosts on a VM to share available resources The idea is that if an instance needs more CPU or memory it can request it when needed In this situation resources are not reserved and only allocated when needed/requested. This solution works for applications or databases where operations can be queued or retried In the case of a security appliance this is not an ...
0 comments
Be the first person to recommend this.
When performing DAM – Database Activity Monitoring – the legacy deployment is to install the agent on the DB server, register the agent and assign it to a specific gateway. There is also an option to assign a secondary gateway for fail-over purposes.   This model worked well for years, but as audit requirements changed so did the need to monitor database activity. There are customer deployments that have over 100 agents deployed and actively monitoring. The legacy deployment was simply not sufficient to support large agent deployments. There needed to be more flexibility and visibility.   DAM Clusters were introduced just for that reason. ...
3 comments
Be the first person to recommend this.
#CloudWAF(formerlyIncapsula)
0 comments

EOS and EOL information

Be the first person to recommend this.
Where do I find EOS and EOL information and what is the difference between the two. EOL/EOS information can be found at https://www.imperva.com/services/technicalsupport Search for Software schedule and it will take you to the tabs EOL – end of life – Software When a software version reaches EOL no more patches will be released for that version In addition there will be no bug fixes released Support will still troubleshoot issues during the EOL period but it will require being on the latest patch for that version If the issue is not a known issue with a corresponding workaround or is not resolved by the latest available patch, an upgrade ...
0 comments