Imperva, Inc.
Imperva is a cyber security software and services company which provides protection to enterprise data and application software. The company is headquartered in San Mateo, California. History Imperva, originally named WEBcohort, was founded in 2002 by Shlomo Kramer, Amichai Shulman and Mickey Boodaei. The following year the company shipped its first product, SecureSphere Web Application Database Protection, a web application firewall. In 2004, the company changed its name to Imperva. In 2011, Imperva went public and was listed on the New York Stock Exchange (NYSE: IMPV). In August 2014, Imperva named Anthony Bettencourt as CEO. In 2016, it published a free scanner designed to detect devices infected with, or vulnerable to the Mirai botnet. In February 2017, Imperva sold Skyfence to Forcepoint for $40 million. In August 2017, the company named Chris Hylen, the former CEO of Citrix GetGo, as its new president and CEO. Its former CEO, Anthony Bettencourt, resigned as chairman of ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
IT Security
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide. The field has become of significance due to the expanded reliance on computer systems, the Internet, and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity is one of the most significant challenges of the contemporary world, due to both the complexity of information systems and the societies they support. Security is of especially high importance for systems that govern large-scale systems with far-reaching physical effects, such as power distribut ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
On-premises Software
On-premises software (abbreviated to on-prem, and incorrectly referred to as on-premise) is installed and runs on computers on the premises of the person or organization using the software, rather than at a remote facility such as a server farm or cloud. On-premises software is sometimes referred to as " shrinkwrap" software, and off-premises software is commonly called "software as a service" ("SaaS") or "cloud computing". The software consists of database and modules that are combined to particularly serve the unique needs of the large organizations regarding the automation of corporate-wide business system and its functions. Comparison between on-premises and cloud (SaaS) Location On-premises software is established within the organisation's internal system along with the hardware and other infrastructure necessary for the software to function. Cloud-based software is usually served via internet and it can be accessed by users online regardless of the time and their locati ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Magic Quadrant
Magic Quadrant (MQ) is a series of market research reports published by IT consulting firm Gartner that rely on proprietary qualitative data analysis methods to demonstrate market trends, such as direction, maturity and participants. Their analyses are conducted for several specific technology industries and are updated every 1–2 years: once an updated report has been published its predecessor is "retired". Rating Gartner rates vendors upon two criteria: ''completeness of vision'' and ''ability to execute''. ; Completeness of Vision : Reflects the vendor’s innovation, and whether the vendor drives or follows the market. ; Ability to Execute : Summarizes factors such as the vendor’s financial viability, market responsiveness, product development, sales channels and customer base. These component scores lead to a vendor position in one of four quadrants: ; Leaders : Vendors in the Leaders quadrant have the highest composite scores for their Completeness of Vision and Abili ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Gartner
Gartner, Inc is a technological research and consulting firm based in Stamford, Connecticut that conducts research on technology and shares this research both through private consulting as well as executive programs and conferences. Its clients include large corporations, government agencies, technology companies, and investment firms. In 2018, the company reported that its client base consisted of over 12,000 organizations in over 100 countries. As of 2022, Gartner has over 15,000 employees located in over 100 offices worldwide. It is a member of the S&P 500. History Gideon Gartner founded Gartner, Inc in 1979. Originally private, the company launched publicly as Gartner Group in 1986 before Saatchi & Saatchi acquired it in 1988. In 1990, Gartner Group was acquired by some of its executives, including Gartner himself, with funding from Bain Capital and Dun & Bradstreet. The company went public again in 1993. In 2000, the name was simplified from ''Gartner Group'' to G ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
CRN (magazine)
''CRN'' is an American computer magazine. It was first launched as ''Computer Retail Week'' on June 7, 1982, as a magazine targeted to computer resellers. It soon after was renamed ''Computer Reseller News''. History and profile Originally launched in 1982 and published by CMP Media of Manhasset, New York, United States, ''CRN'' was subsequently purchased by London-based United Business Media (UBM) as part of the $920 million acquisition of CMP. ''Computer Reseller News'' later changed its name to the acronym CRN and is still published today by franchise publishers in a number of other countries including Australia, Denmark, Germany, the Netherlands, India, Poland, Russia, the United Kingdom, and the United States. The Australian ''CRN'' is published by nextmedia, the UK version of ''CRN'' is published by Incisive Media which acquired VNU Business Publications UK in 2007 [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
International Computer Security Association
ICSA Labs (International Computer Security Association) began as NCSA (National Computer Security Association). Its mission was to increase awareness of the need for computer security and to provide education about various security products and technologies. In its early days, NCSA focused almost solely on the certification of anti-virus software. Using the Consortia model, NCSA worked together with anti-virus software vendors to develop one of the first anti-virus software certification schemes. Over the past decade, the organization added certification programs for other security-related products, and changed its name to ICSA Labs. Operating as an independent division of Verizon, ICSA Labs provides resources for research, intelligence, certification and testing of products, including anti-virus, firewall, IPsec VPN, cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respe ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Frost & Sullivan
Frost & Sullivan is an American business consulting firm. It offers market research and analysis, growth strategy consulting, and corporate training. It has about 45 offices in the Americas, Africa, Asia and Europe; the principal office is in Santa Clara, California. History Frost & Sullivan was started by Dan L. Sullivan and Lore A. Frost VQIR.com 14 April, 2017 in New York City in 1961. In the 1970s it started a corporate training division, began sponsoring conferences and industry meetings, and opened an office in London. In 1982, it was publicly traded, and had annual revenues of $9.1 million. By 1987 revenue had grown to around $17.5 million, with $290,000 in net earnings. Theodore Cross acquired 53% of the stock in the mid-1980s. In January 1988 the company was taken private by merger with a subsidiary of FAS Acquisition Co., a company formed by Cross and Warburg Pincus Capital. It was sold to David Frigstad in 1993. A sales office in New York was damaged in the Septem ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Data Masking
Data masking or data obfuscation is the process of modifying sensitive data in such a way that it is of no or little value to unauthorized intruders while still being usable by software or authorized personnel. Data masking can also be referred as anonymization, or tokenization, depending on different context. The main reason to mask data is to protect information that is classified as personally identifiable information, or mission critical data. However, the data must remain usable for the purposes of undertaking valid test cycles. It must also look real and appear consistent. It is more common to have masking applied to data that is represented outside of a corporate production system. In other words, where data is needed for the purpose of application development, building program extensions and conducting various test cycles. It is common practice in enterprise computing to take data from the production systems to fill the data component, required for these non-production e ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Software Bot
A software bot is a type of software agent in the service of software project management and software engineering. A software bot has an identity and potentially personified aspects in order to serve their stakeholders. Software bots often compose software services and provide an alternative user interface, which is sometimes, but not necessarily conversational. Software bots are typically used to execute tasks, suggest actions, engage in dialogue, and promote social and cultural aspects of a software project. The term ''bot'' is derived from robot. However, robots act in the physical world and software bots act only in digital spaces. Some software bots are designed and behave as chatbots, but not all chatbots are software bots. Erlenhov et al. discuss the past and future of software bots and show that software bots have been adopted for many years. Usage Software bots are used to support development activities, such as communication among software developers and automati ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Web API Security
Web API security entails authenticating programs or users who are invoking a web API. Along with the ease of API integrations come the difficulties of ensuring proper authentication (AuthN) and authorization (AuthZ). In a multitenant environment, security controls based on proper AuthN and AuthZ can help ensure that API access is limited to those who need (and are entitled to) it. Appropriate AuthN schemes enable producers (APIs or services) to properly identify consumers (clients or calling programs), and to evaluate their access level (AuthZ). In other words, may a consumer invoke a particular method (business logic) based on the credentials presented? "Interface design flaws are widespread, from the world of crypto processors through sundry embedded systems right through to antivirus software and the operating system itself." Method of authentication and authorization The most common methods for authentication and authorization include: # Static strings: These are like ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Runtime Application Self-protection
Runtime application self-protection (RASP) is a security technology that uses runtime instrumentation to detect and block computer attacks by taking advantage of information from inside the running software. The technology differs from perimeter-based protections such as firewalls, that can only detect and block attacks by using network information without contextual awareness. RASP technology is said to improve the security of software by monitoring its inputs, and blocking those that could allow attacks, while protecting the runtime environment from unwanted changes and tampering. RASP-protected applications rely less on external devices like firewalls to provide runtime security protection. When a threat is detected RASP can prevent exploitation and possibly take other actions, including terminating a user's session, shutting the application down, alerting security personnel and sending a warning to the user. RASP aims to close the gap left by application security testing and ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |