SOLUTION SETS
NEWSLETTERS
LOGIN
Follow us on
Upload your Case Studies
JOIN CONTENTREE
SIGN UP
Vendors
Imperva
Imperva
Imperva
232 Solutions
Do you work for
Imperva ?
Contact us to update this profile
All information is currently provided by Contentree
Imperva
0 Solution Set
Search
Solutions
Case Study
Smallpdf protects its customers and ensures availability using…
Case Study
Silver Fern Farms Proactively works to shield against potential…
Case Study
Major European-Based Energy Company Company Safeguards customer…
Ebook
Imperva API Security
Ebook
Imperva Application Security for Healthcare
Ebook
Imperva Data Security Fabric Unstructured Data
Case Study
Affiliated Dermatology saves 10 hours a week & automates manual…
Ebook
Secure, Simplify, and Scale Financial Services With Egnyte
Ebook
Client-Side Protection for PCI DSS 4.0 Compliance
White Paper
How AI-Driven Applications Are Prioritizing Bot Protection and…
Case Study
hibank Indonesia Experiences 30% faster API threat detection and…
Case Study
Softcat Enhances web application protection and strengthens…
Ebook
Imperva Data Security Fabric
Ebook
2024 Cyberthreat Defense Report - Executive Brief
Ebook
Data Risk Intelligence
Ebook
Website Security-as-a-Service
Ebook
Imperva Content Delivery Network (CDN)
Infographic
Discover your APIs BEFORE BAD BOTS DO!
Infographic
Essential Holiday Season Prep Checklist for Online Retailers
Infographic
2024 Bad Bot Report: Travel and Airlines Traffic Profile…
Infographic
2024 The Economic Impact of API and Bot Attacks
Infographic
2024 Bad Bot Report: The Cost of an Account Takeover Attack
Infographic
2024 Bad Bot Report: Breakdowns of Bad vs Good vs Human Traffic
Infographic
2024 Bad Bot Report: Account Takeover Attacks by the Numbers
Case Study
Vnetrix helps SMEs protect online presence from security attacks…
Guide
CISO Strategic Guide: 5 Keys to Elevate Data Security Posture
Report
Bad Bot Report
Ebook
How Imperva Protects Against the OWASP API Security Top Ten Risks
White Paper
Data Security
Case Study
Quálitas Compañia de Seguros continues its quality services…
Case Study
BSE Bolsters security posture using Imperva Application Security…
Case Study
Universidad La Salle México Meets compliance standards and…
Ebook
Imperva Expand Data Security to the Cloud
Ebook
Network DDoS Protection for Healthcare
Ebook
Streamline healthcare audit and compliance reporting
Ebook
Securing Positive Patient Outcomes
Ebook
Protect your Oracle Cloud Infrastructure (OCI) compute resources…
Ebook
Protect your Cloudera data with Imperva
Ebook
Secure and monitor your healthcare data activity, anywhere
Case Study
One Platform to Unify, Protect, and Control Documents
White Paper
How to Select a Load Balancing Solution
Ebook
Document Room
White Paper
The Role of Client-Side
Guide
Essential Capabilities for Business Logic Protection
White Paper
10 Things Every Web Application Firewall Should Provide
White Paper
A Guide to Runtime Application Self-Protection (RASP)
Case Study
Insurance Company reduces IBM Guardium administration effort by…
Case Study
Switching to Imperva Database Security streamlined operations,…
Case Study
Major Food Deliverer Embraces Imperva WAF to Optimize Online…
Ebook
Advanced Bot Protection for AWS
Ebook
Enterprise Services for Data Security Fabric
Ebook
Protect your Oracle Cloud Infrastructure (OCI) compute resources…
Case Study
Egnyte for Salesforce DataSheet
Infographic
How Are Bad Bots Hurting Your Business?
Infographic
Get Ahead of Insider Threats
White Paper
Splunk Optimization and Cost Savings using Imperva Data Security…
White Paper
How the Evolution of Agents has Been Essential for Modern…
White Paper
A Data-Centric CyberSecurity Framework for Digital Transformation
Guide
Ten Essential Capabilities of a Bot Management Solution
White Paper
WHITEPAPER Why Your Organization Needs Data-
White Paper
Meeting Data Security Challenges in the Age of Digital…
White Paper
The importance of a resilient CDN for digital performance
Ebook
Splunk Optimization by Imperva
Case Study
Tower ensures website visibility and uninterrupted business…
Ebook
Security Analysts for Web Application Firewall GW
Ebook
Protecting against data loss in AWS managed database services
Ebook
Modernize Guardium with Imperva Data Security Fabric
Ebook
Defending Against Complex Data-centric Attacks
Infographic
Ransomware in the Life Sciences Industry
Infographic
Top M365 Security and Compliance Risks
Infographic
14 Questions to Ask Your Application Security Vendor
Infographic
7 TIPS TO PROTECT YOUR DATA
Infographic
The Greeting Card No One Wants
Infographic
Phishing is the starting point for most network and data…
Infographic
THE MOST DANGEROUS CYBER SECURITY THREAT MIGHT BE SITTING NEXT…
Infographic
Industrialization of Hacking
Case Study
IT Admin Productivity Impact
Infographic
How Your Web Applications are Under Attack
Ebook
15 Ways Your Website is Under Attack
Ebook
Securing Database as a Service (DBaaS)
Ebook
The Easiest Way to Securely Share and Collaborate on All of Your…
Ebook
Ransom DDoS
Report
Content Security and Governance for the Hybrid Workforce
Ebook
14 Questions to Ask Your Application Security Vendor
Ebook
Book 1: Getting Started
Guide
The Imperva Incapsula DDoS
Guide
The Imperva Incapsula Network Ops DDoS Playbook
Report
Imperva Incapsula Report: Top 10 DDoS Attack Trends
White Paper
A Practical Guide to Choosing a DDoS Mitigation Solution
Infographic
The Checklist Imperva Domain Ke Imperva Domain Ke…
Infographic
2021 Cyberthreat Defense Report
Ebook
Recommended Actions for Detection of Bad Bot Activity
Infographic
How do you stop bad bots?
Infographic
Cheap and Nasty: The Anatomy of a DDoS Attack
White Paper
How to Create a Data Security Strategy When Moving Workloads to…
White Paper
i s cydi
White Paper
Understanding the Overhead of Database Monitoring and Auditing
White Paper
Overhead of Database Native Auditing in the Real World
Case Study
CISOs: Why Is Database Security So Elusive and What Can You Do…
Case Study
A CyberSecurity Framework for Securing Cloud Data for Digital …
Case Study
5 Key Ways Supply Chain Attacks Occur
Case Study
Lessons learned from Lessons learned from analyzing 100 data …
Case Study
The 6 Most Common Security Barriers to Technology Modernization
Case Study
Why Your Organization Needs Data-
Case Study
Protecting Against Ransom Denial of Service Attacks
Case Study
Top 7 Factors Affecting Database Security in the “New Normal”
Case Study
Insider Threats Drive Data Protection Improvements
Case Study
Leading University Selects Imperva WAF Gateway to Secure Web…
Infographic
2020 Cyberthreat Defense Report
Ebook
Securing Data Before the Cloud
White Paper
The Three Keys to Secure and Successful Cloud Migrations
White Paper
Protecting Financial Institutions from DDoS Attacks