HOME
*





Imperva
Imperva is a cyber security software and services company which provides protection to enterprise data and application software. The company is headquartered in San Mateo, California. History Imperva, originally named WEBcohort, was founded in 2002 by Shlomo Kramer, Amichai Shulman and Mickey Boodaei. The following year the company shipped its first product, SecureSphere Web Application Database Protection, a web application firewall. In 2004, the company changed its name to Imperva. In 2011, Imperva went public and was listed on the New York Stock Exchange (NYSE: IMPV). In August 2014, Imperva named Anthony Bettencourt as CEO. In 2016, it published a free scanner designed to detect devices infected with, or vulnerable to the Mirai botnet. In February 2017, Imperva sold Skyfence to Forcepoint for $40 million. In August 2017, the company named Chris Hylen, the former CEO of Citrix GetGo, as its new president and CEO. Its former CEO, Anthony Bettencourt, resigned as chairman of ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Shlomo Kramer
Shlomo Kramer ( he, שלמה קרמר), is an Israeli information technology entrepreneur and investor. He is the co-founder of cyber-security companies Check Point and Imperva, as well as Cato Networks, a cloud-based network security provider. Personal life Shlomo Kramer has been actively involved with technology all his life. As a youth, he worked on mainframes and sold video games. He landed his first job – selling personal computers at a Tel Aviv shop – at age 15. After discovering that one of the shop's best-selling games was developed and marketed by a 17-year-old in Britain who had set up his own company, Kramer knew that he "wanted to be like him – an entrepreneur, even though it would be quite a few years before I knew the word." Kramer served in the Israel Defense Forces’ Unit 8200, a crack cybersecurity and intelligence team whose operations include gathering, analyzing and decrypting data; over the years, the unit has produced many of Israel’s top high-tech ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Incapsula
Imperva Incapsula is an American cloud-based application delivery platform. It uses a global content delivery network to provide web application security, DDoS mitigation, content caching, application delivery, load balancing and failover services. History Incapsula was founded in 2009 by Gur Shatz and Marc Gaffan. The company has its origins in Imperva (NYSE:IMPV), an American-based cyber security firm which at the time owned 85% of Incapsula. It was spun out from Imperva in 2009. While reported to be growing at a rate of between 50%, 76% and 102% per quarter as of August 2013, the company lost over $1.7 million in the second quarter of that same year. In February 2014 Imperva bought the remaining part of Incapsula and it became a product line within the parent company. In 2013 Incapsula launched a tool named "Backdoor Protect". The tool is reported to detect and block malicious back-doors and "webshells". The tool works by comparing a website's traffic against a database ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Denial-of-service Attack
In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. In a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. More sophisticated strategies are required to mitigate this type of attack, as simply attempting to block a single source is insufficient because there are multiple sources. A DoS or DDoS attack is analogous to a group of people crowding the entry door of a shop, making it hard for legitimate customers to enter, thus disrupting trade. Criminal perpetrators of DoS attacks oft ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Application Firewall
An application firewall is a form of firewall that controls input/output or system calls of an application or service. It operates by monitoring and blocking communications based on a configured policy, generally with predefined rule sets to choose from. The application firewall can control communications up to the application layer of the OSI model, which is the highest operating layer, and where it gets its name. The two primary categories of application firewalls are ''network-based'' and ''host-based''. History Gene Spafford of Purdue University, Bill Cheswick at AT&T Laboratories, and Marcus Ranum described a third-generation firewall known as an application layer firewall. Marcus Ranum's work, based on the firewall created by Paul Vixie, Brian Reid, and Jeff Mogul, spearheaded the creation of the first commercial product. The product was released by DEC, named the DEC SEAL by Geoff Mulligan - Secure External Access Link. DEC's first major sale was on June 13, 1991, t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Forcepoint
Forcepoint, an American multinational corporation software company headquartered in Austin, Texas, that develops computer security software and data protection, cloud access security broker, firewall and cross-domain solutions. Forcepoint was founded in 1994 as an information technology reseller called NetPartners. It was renamed Websense in 1999 and became a public company in 2000 at the peak of the dot-com bubble. Vista Equity Partners acquired Websense in 2013 for $906 million. Raytheon acquired an 80% interest in Websense in April 2015 for $1.9 billion and acquired the remaining 20% interest in 2019. In 2015, Websense acquired network security vendor Stonesoft from Intel and in 2016, the company was renamed Forcepoint. Francisco Partners acquired the company from Raytheon in January 2021. Corporate history NetPartners The company was founded in 1994 as NetPartners in Sorrento Valley, San Diego by Phil Trubey. The company began as a reseller for network security products, the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Runtime Application Self-protection
Runtime application self-protection (RASP) is a security technology that uses runtime instrumentation to detect and block computer attacks by taking advantage of information from inside the running software. The technology differs from perimeter-based protections such as firewalls, that can only detect and block attacks by using network information without contextual awareness. RASP technology is said to improve the security of software by monitoring its inputs, and blocking those that could allow attacks, while protecting the runtime environment from unwanted changes and tampering. RASP-protected applications rely less on external devices like firewalls to provide runtime security protection. When a threat is detected RASP can prevent exploitation and possibly take other actions, including terminating a user's session, shutting the application down, alerting security personnel and sending a warning to the user. RASP aims to close the gap left by application security testing and ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Web API Security
Web API security entails authenticating programs or users who are invoking a web API. Along with the ease of API integrations come the difficulties of ensuring proper authentication (AuthN) and authorization (AuthZ). In a multitenant environment, security controls based on proper AuthN and AuthZ can help ensure that API access is limited to those who need (and are entitled to) it. Appropriate AuthN schemes enable producers (APIs or services) to properly identify consumers (clients or calling programs), and to evaluate their access level (AuthZ). In other words, may a consumer invoke a particular method (business logic) based on the credentials presented? "Interface design flaws are widespread, from the world of crypto processors through sundry embedded systems right through to antivirus software and the operating system itself." Method of authentication and authorization The most common methods for authentication and authorization include: # Static strings: These are like ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Software Bot
A software bot is a type of software agent in the service of software project management and software engineering. A software bot has an identity and potentially personified aspects in order to serve their stakeholders. Software bots often compose software services and provide an alternative user interface, which is sometimes, but not necessarily conversational. Software bots are typically used to execute tasks, suggest actions, engage in dialogue, and promote social and cultural aspects of a software project. The term ''bot'' is derived from robot. However, robots act in the physical world and software bots act only in digital spaces. Some software bots are designed and behave as chatbots, but not all chatbots are software bots. Erlenhov et al. discuss the past and future of software bots and show that software bots have been adopted for many years. Usage Software bots are used to support development activities, such as communication among software developers and automation o ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

IT Security
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide. The field has become of significance due to the expanded reliance on computer systems, the Internet, and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity is one of the most significant challenges of the contemporary world, due to both the complexity of information systems and the societies they support. Security is of especially high importance for systems that govern large-scale systems with far-reaching physical effects, such as power distribution, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Data Masking
Data masking or data obfuscation is the process of modifying sensitive data in such a way that it is of no or little value to unauthorized intruders while still being usable by software or authorized personnel. Data masking can also be referred as anonymization, or tokenization, depending on different context. The main reason to mask data is to protect information that is classified as personally identifiable information, or mission critical data. However, the data must remain usable for the purposes of undertaking valid test cycles. It must also look real and appear consistent. It is more common to have masking applied to data that is represented outside of a corporate production system. In other words, where data is needed for the purpose of application development, building program extensions and conducting various test cycles. It is common practice in enterprise computing to take data from the production systems to fill the data component, required for these non-production en ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cloud Computing
Cloud computing is the on-demand availability of computer system resources, especially data storage ( cloud storage) and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each of which is a data center. Cloud computing relies on sharing of resources to achieve coherence and typically uses a "pay as you go" model, which can help in reducing capital expenses but may also lead to unexpected operating expenses for users. Value proposition Advocates of public and hybrid clouds claim that cloud computing allows companies to avoid or minimize up-front IT infrastructure costs. Proponents also claim that cloud computing allows enterprises to get their applications up and running faster, with improved manageability and less maintenance, and that it enables IT teams to more rapidly adjust resources to meet fluctuating and unpredictable demand, providing burst computing capability: high computing p ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




International Computer Security Association
ICSA Labs (International Computer Security Association) began as NCSA (National Computer Security Association). Its mission was to increase awareness of the need for computer security and to provide education about various security products and technologies. In its early days, NCSA focused almost solely on the certification of anti-virus software. Using the Consortia model, NCSA worked together with anti-virus software vendors to develop one of the first anti-virus software certification schemes. Over the past decade, the organization added certification programs for other security-related products, and changed its name to ICSA Labs. Operating as an independent division of Verizon, ICSA Labs provides resources for research, intelligence, certification and testing of products, including anti-virus, firewall, IPsec VPN, cryptography, SSL VPN, network IPS, anti-spyware and PC firewall products. External links * Computer security organizations Verizon Communications {{business- ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]