Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor

Application Firewall Add-on Defends Against Large Scale Cyber-Attacks

Imperva : 02 March, 2010  (New Product)
ThreatRadar from Imperva provides additional security to Web Application Firewalls to block traffic from malicious sources even as the source of the threat is shifted
Imperva has announced the general availability of ThreatRadar, a new add-on to Imperva's market-leading Web Application Firewall (WAF) that provides automated, reputation-based defence against large scale industrialised cyber attacks.

"ThreatRadar dramatically increases an enterprise's ability to stop attacks by automatically adapting the defence so traffic from malicious sources can be blocked before an attack is attempted," explained Imperva's CTO Amichai Shulman. "By harnessing the collective insight of the security community, ThreatRadar can block traffic from malicious sources. As attackers shift locations and techniques Imperva's ThreatRadar-powered WAF delivers the broadest arsenal of defence capabilities available today."

Anyone using ThreatRadar with Imperva's WAF will have an effective means to mitigate:

* Mass SQL Injection attacks coming from botnets
* Several types of automated attacks such as Comment SPAM campaigns, scraping attacks, web email SPAM attacks

ThreatRadar specific ally provides protection against:

* Malicious sources: Up-to-date protection from sources that have repeatedly performed malicious activity on other web applications. Often part of the ten million plus Botnet network they are executing attacks on behalf of remote hackers.
* Anonymous Proxies: Up-to-date protection from sources that are used as anonymous proxies. By hiding the identity of traffic sources, anonymous proxies are often exploited by hackers to launch attacks.
* The Onion Router (or TOR Ips): Up-to-date protection from the TOR hacker network. Hackers use the TOR network to launch attacks without revealing their identity and location.
* Phishing URLs: Real time alerting on phishing incidents against your domain.

In addition, ThreatRadar will provide:

* IP Forensics Tool: A dynamic, web-based tool providing additional context on attackers, including geographic location and user profile, that takes the guesswork out of incident analysis.
* Ongoing threat updates-Imperva's Application Defense Center (ADC) has researched and integrated credible attack source data providers to ensure protection accuracy and effectiveness. The ADC will continually update attack sources as an ongoing service.

Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo