Modernizing Data Security: Imperva and IBM zSystems in Action

As data security continues to evolve, businesses require solutions that scale to modern environments. Imperva and IBM zSystems have partnered to deliver a comprehensive approach to securing data within IBM z/OS environments ...

Imperva Clinches 2023 SC Media Trust Award for Best Database Security Solution: A Back-to-Back Victory

Imperva, a global leader in cybersecurity, is proud to announce that we have once again been honored for our industry-leading database security solutions, earning the prestigious 2023 SC Media Trust Award for ...
™

Imperva recognized as a Strong Performer in Forrester Wave: Data Security Platforms, Q1 2023

Imperva Data Security Fabric demonstrates robust security and risk management practices to reduce risks across hybrid multicloud environments The Forrester Wave™ evaluated the largest end-to-end providers of data security capabilities across a ...

The importance of combined user and data behavior analysis in anomaly detection

Muqeet Khan, Head of Sales Engineering Australia and New Zealand For decades security teams have understood the importance of tracking user behavior to identify potential cybersecurity threats. Behavior analysis systems first appeared ...

The Four-Step Approach to Modernizing Your DAM Strategy

Effective data security is critical to an organization’s success and requires a strategy that aligns with the company’s objectives and those of its stakeholders. As the data landscape changes, most Database Activity ...

7 Ways Imperva Solutions Reduce the Cost of Data Security

As we push into Q4, economic uncertainty caused by rising interest rates, as-yet unchecked inflation, and a bear market is driving many enterprises to buck the trend and tighten cyber security budgets ...

Imperva DSF Secures Your Data in Amazon Web Services Enterprise Data Lakes

Data lakes serve as a central repository for storing several data types – structured, semi-structured, and unstructured – at scale. One of the ways data lakes are useful is they do not ...
™

Why Imperva is a Cybersecurity Awareness Month Champion

This is our second consecutive year as a champion of Cybersecurity Awareness Month. Nowadays, IT security is everyone’s responsibility, and that’s something we take very seriously. Cybersecurity Awareness Month raises awareness of ...

For Cost-Conscious Compliance Reporting, Rethink Your Data Retention Capability

Staffing costs required to generate reports for compliance audits are high, but the time required to generate the reports themselves is not necessarily to blame if you have suitable access to your ...

Five Steps to Integrating a Data Repository Vulnerability Assessment Into A WAF–Driven Vulnerability Management Program

A vulnerability assessment is a systematic review of security weaknesses in an information system. It evaluates if the system is susceptible to any known vulnerabilities, assigns severity levels to those vulnerabilities, and ...