SlideShare a Scribd company logo
© 2017 Imperva, Inc. All rights reserved.
Protecting What Matters Most
Haiko Wolberink, VP, MEA
© 2017 Imperva, Inc. All rights reserved.
of companies have
been hacked at
one time or another
2
Traditional
security
© 2017 Imperva, Inc. All rights reserved.
Protect
what’s
More People Can Access It
More Places to Sell It
Structured
Unstructured Big Data SaaS
Web
Apps
Customer
portal
Mobile
Apps
Web Services
or APIs
More Data in More Places
More Apps are Available
Knowledge
Workers Customers Contractors
Privileged
Users
MaliciousCarelessCompromised
© 2017 Imperva, Inc. All rights reserved.
Protecting
is exactly what Imperva does
© 2017 Imperva, Inc. All rights reserved.
APPLICATION
• We Protect data where
it resides: databases
and file servers
• We Protect where it’s accessed:
Web applications
• We guard against outside and
internal threats
More People Can Access ItMore Data in More Places
More Places to Sell ItMore Apps are Available
Structured
Unstructured Big Data SaaS
Web
Apps
Customer
portal
Mobile
Apps
Web Services
or APIs
Knowledge
Workers Customers Contractors
Privileged
Users
Cloud DDoS
File Server Firewall
Web Application
Firewall
Database Security
DATAAPPS
OrganizationalAssets
EXTORTION THEFT
Cybercrime Monetization
© 2017 Imperva, Inc. All rights reserved.
Imperva is also a DDoS Leader
http://www.toptenreviews.com/business/internet/best-ddos-protection-services/
© 2017 Imperva, Inc. All rights reserved.
Forrester Wave for DDoS Service Providers Ranks Imperva a Leader
• Leader in DDoS service provider space
• Highest score in the “Current Offering category”
(technical strength)
• Large market presence
Confidential11
Source: 2015 Forrester Wave™ for DDoS Service Providers, Q3 2015
© 2017 Imperva, Inc. All rights reserved.
WAF &
DDoS Data
Centers
45
Dubai PoP fully operational
© 2017 Imperva, Inc. All rights reserved.
Sub-One-Second
Time-to-Mitigation
• Rapid time-to-mitigation prevents downtime
and protects against hit-and-run attacks
• Other vendors can take tens of minutes to start
mitigating attacks
• We detect and mitigate attacks in under 1
second
© 2017 Imperva, Inc. All rights reserved.
• Switching traffic over to a scrubbing network
adds latency
• Other vendors have very few scrubbing PoPs,
making them prone to latency
• We offer connectivity speeds of under 50
Milliseconds to more than 90% of the world
Near Zero
Latency
© 2017 Imperva, Inc. All rights reserved.
• High packet rate attacks are the new play in
the DDoS space
• Others focus on bandwidth (bits per sec): were
not designed to handle large PPS volumes
• Our network has the capacity to mitigate
the most packet-intensive attacks
Capacity
to Handle Any DDoS Attack
© 2017 Imperva, Inc. All rights reserved.
Gartner, Magic Quadrant for Web Application Firewalls, Jeremy D'Hoinne, Adam Hils, Claudio Neiva, 07 August 2017
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the
entire document. The Gartner document is available upon request from Imperva. Gartner does not endorse any vendor, product or
service depicted in its research publications, and does not advise technology users to select only those vendors with the highest
ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not
be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including
any warranties of merchantability or fitness for a particular purpose.
A LEADER for
FOUR CONSECUTIVE
YEARS
2017 Gartner Magic
Quadrant for
Web Application Firewalls
16
© 2017 Imperva, Inc. All rights reserved.
Imperva AI & Machine Learning now combined with Global Threat Intelligence
SecureSphere WAF Correlation Engine
∂
ThreatRadar(TR) threat intelligence
∂
ProtocolValidation
Policies/Signatures
ApplicationProfiling
SecureSphere Core EngineTRATOProtection
TRBotProtection
TRReputationService
Correlation of ThreatRadar context with WAF core capabilities improves detection accuracy
Web.
Servers
On-premises
Removes Unwanted Traffic
Cuts Infrastructure Cost
Improves SOC Efficiency
Improves Security Posture
© 2017 Imperva, Inc. All rights reserved.18
Big Picture
Competitive
Environment – DCAP
Gartner Market Guide
for Data-Centric Audit
and Protection,
December 2015
Source: Gartner, Market Guide for Data-Centric Audit and Protection, 15 December 2015
© 2017 Imperva, Inc. All rights reserved.
Factoring in the Unknown
Database
Who is connecting to the
database?
How do they connect to
the database?
Do their peers access
data in the same way?
When do they usually
work?
What data are they
accessing?
How much data do they
query?
Data Security
20
Monitor
Users
User behavior
analytics
Peer group
analysis
Uniform coverage
Apply
Policies
Quarantine risky
users
Monitor Data,
Block Activity
Data activity
monitoring
Incident response
Discover and
Classify
Server discovery
Data discovery
Classification
Investigate and
Report
Contextual SIEM feed
Security analysis
Compliance automation
© 2017 Imperva, Inc. All rights reserved.
OUR GLOBAL BUSINESS
• Founded in 2002
• Global operations; HQ in Redwood Shores, CA
• 1000+ employees
• Customers in 100+ countries
21
© 2017 Imperva, Inc. All rights reserved.
OUR CUSTOMERS
5,200+ direct; thousands Cloud-Based
• 325+
government agencies and departments
• 425+
global 2000 companies
• 7 of the top 10
global telecommunications providers
• 3 of the top 5
- US commercial banks
- global financial services firms
- global computer hardware companies
- global biotech companies
- global diversified insurance services
Technology Alliances - No lock in
Anti-Malware
• Partnered with best-of-breed solutions
• Industry's broadest technology security ecosystem
• Certified integration
• Extend and augment the functionality of existing investment in security,
networking, and business software solutions.
Business Software Cloud Fraud Prevention Identity
Masking
Encryption
Network Visibility Platform
SIEM
Vulnerability
Assessment
Protecting What Matters Most – Data
© 2017 Imperva, Inc. All rights reserved. Confidential25
More People Can Access ItMore Data in More Places
More Places to Sell ItMore Apps are Available
Structured
Unstructured Big Data SaaS
Web
Apps
Customer
portal
Mobile
Apps
Web Services
or APIs
Knowledge
Workers Customers Contractors
Privileged
Users
Cloud DDoS
File Server Firewall
Web Application
Firewall
Database Security
DATAAPPS
OrganizationalAssets
EXTORTION THEFT
Cybercrime Monetization
Protecting What Matters Most – Data

More Related Content

PDF
Debunked: 5 Myths About Zero Trust Security
PPTX
Strengthen Cloud Security
PDF
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
PDF
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
PDF
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
PDF
How Zero Trust Makes the Mission Simple & Secure
PDF
Jisc cloud services: helping our members deliver their cloud strategies
PPTX
An Inside-Out Approach to Security in Financial Services
Debunked: 5 Myths About Zero Trust Security
Strengthen Cloud Security
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
How Zero Trust Makes the Mission Simple & Secure
Jisc cloud services: helping our members deliver their cloud strategies
An Inside-Out Approach to Security in Financial Services

What's hot (20)

PDF
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
PDF
Optimize IT Infrastructure
PDF
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
PDF
Signs It's Time to Modernize Your Identity Management Software
PDF
Forcepoint Dynamic Data Protection
PDF
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
PDF
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
PDF
SEB Forcepoint Corporate Overview
PDF
Symantec Webinar | Tips for Successful CASB Projects
PDF
Cisco Connect 2018 Singapore - Do more than keep the lights on
PDF
Jason Tooley – Welcome to Vision Solution Day EMEA
PDF
Upgrading Your Firewall? Its Time for an Inline Security Fabric
PPTX
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
PPTX
Rethinking Cybersecurity for the Digital Transformation Era
PDF
David Noy – Realising the true potential of software-defined storage
PDF
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
PDF
eDiscovery platform EMEA user conference 2017
PPTX
Dissecting ssl threats
PPTX
Cloudy with a Chance of...Visibility, Accountability & Security
PPTX
Beyond takeover: stories from a hacked account
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Optimize IT Infrastructure
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Signs It's Time to Modernize Your Identity Management Software
Forcepoint Dynamic Data Protection
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
SEB Forcepoint Corporate Overview
Symantec Webinar | Tips for Successful CASB Projects
Cisco Connect 2018 Singapore - Do more than keep the lights on
Jason Tooley – Welcome to Vision Solution Day EMEA
Upgrading Your Firewall? Its Time for an Inline Security Fabric
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
Rethinking Cybersecurity for the Digital Transformation Era
David Noy – Realising the true potential of software-defined storage
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
eDiscovery platform EMEA user conference 2017
Dissecting ssl threats
Cloudy with a Chance of...Visibility, Accountability & Security
Beyond takeover: stories from a hacked account
Ad

Similar to Protecting What Matters Most – Data (20)

PPTX
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
PDF
Peter Grimmond – Harnessing the power of data
PDF
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
PPTX
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
PDF
Protect Your Customers Data from Cyberattacks
PPTX
Driving Digital Transformation through Big Data Analytics and Machine Learning
PDF
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
PPTX
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
PDF
5 Mobile App Security MUST-DOs in 2018
PDF
Improving Cloud Visibility, Accountability & Security
PDF
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
PDF
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
PPTX
Cisco Security as a foundation for SP Digitization
PPTX
Cloud vs. On-Premises Security: Can you afford not to switch?
PPTX
Making the Case for Stronger Endpoint Data Visibility
PDF
Making Security Work—Implementing a Transformational Security Program
PPTX
Ping Identity: Corporate Overview Financial Services
PDF
Интуитивная сеть как платформа для надежного бизнеса
PPTX
01-Chapter 01-Introduction to CASB and Netskope.pptx
PPTX
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Peter Grimmond – Harnessing the power of data
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Protect Your Customers Data from Cyberattacks
Driving Digital Transformation through Big Data Analytics and Machine Learning
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
5 Mobile App Security MUST-DOs in 2018
Improving Cloud Visibility, Accountability & Security
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Cisco Security as a foundation for SP Digitization
Cloud vs. On-Premises Security: Can you afford not to switch?
Making the Case for Stronger Endpoint Data Visibility
Making Security Work—Implementing a Transformational Security Program
Ping Identity: Corporate Overview Financial Services
Интуитивная сеть как платформа для надежного бизнеса
01-Chapter 01-Introduction to CASB and Netskope.pptx
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Ad

More from Fujitsu Middle East (18)

PDF
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
PDF
Leading in the digital economy
PDF
Human Centric Innovation - Driving Digital Transformation - Co-creation
PDF
Welcome to Fujitsu World Tour
PDF
Partner Awards
PDF
FUJITSU Integrated System PRIMEFLEX: Win data center orders and have satisfie...
PDF
Is Automation the Solution to Security Overload?
PDF
Best Practices for Creating an Optimal Data Lake
PDF
Threat Life Cycle Management
PDF
BAS Portfolio update
PDF
SAP Digital Transformation in Cloud
PDF
Cloud Data Management: Protecting your Cloud strategy
PDF
Crossing the river with confidence; how Oracle Cloud Applications can transfo...
PDF
Digital Co-creation with Hybrid IT
PDF
Experience Big Data Analytics use cases ranging from cancer research to IoT a...
PDF
Channel Portfolio Update
PDF
Hyper-convergence – The only way to the software-defined data center? - Gerno...
PDF
Transformation to Digital Business with SAP and Fujitsu
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Leading in the digital economy
Human Centric Innovation - Driving Digital Transformation - Co-creation
Welcome to Fujitsu World Tour
Partner Awards
FUJITSU Integrated System PRIMEFLEX: Win data center orders and have satisfie...
Is Automation the Solution to Security Overload?
Best Practices for Creating an Optimal Data Lake
Threat Life Cycle Management
BAS Portfolio update
SAP Digital Transformation in Cloud
Cloud Data Management: Protecting your Cloud strategy
Crossing the river with confidence; how Oracle Cloud Applications can transfo...
Digital Co-creation with Hybrid IT
Experience Big Data Analytics use cases ranging from cancer research to IoT a...
Channel Portfolio Update
Hyper-convergence – The only way to the software-defined data center? - Gerno...
Transformation to Digital Business with SAP and Fujitsu

Recently uploaded (20)

PDF
WRN_Investor_Presentation_August 2025.pdf
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
PPTX
Probability Distribution, binomial distribution, poisson distribution
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PDF
Laughter Yoga Basic Learning Workshop Manual
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PDF
Training And Development of Employee .pdf
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
DOCX
Business Management - unit 1 and 2
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PPTX
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
DOCX
Euro SEO Services 1st 3 General Updates.docx
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
How to Get Funding for Your Trucking Business
PPTX
Business Ethics - An introduction and its overview.pptx
PDF
Business model innovation report 2022.pdf
WRN_Investor_Presentation_August 2025.pdf
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
Probability Distribution, binomial distribution, poisson distribution
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Reconciliation AND MEMORANDUM RECONCILATION
Laughter Yoga Basic Learning Workshop Manual
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
Training And Development of Employee .pdf
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
Business Management - unit 1 and 2
Roadmap Map-digital Banking feature MB,IB,AB
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
Euro SEO Services 1st 3 General Updates.docx
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
How to Get Funding for Your Trucking Business
Business Ethics - An introduction and its overview.pptx
Business model innovation report 2022.pdf

Protecting What Matters Most – Data

  • 1. © 2017 Imperva, Inc. All rights reserved. Protecting What Matters Most Haiko Wolberink, VP, MEA
  • 2. © 2017 Imperva, Inc. All rights reserved. of companies have been hacked at one time or another 2
  • 4. © 2017 Imperva, Inc. All rights reserved. Protect what’s
  • 5. More People Can Access It More Places to Sell It Structured Unstructured Big Data SaaS Web Apps Customer portal Mobile Apps Web Services or APIs More Data in More Places More Apps are Available Knowledge Workers Customers Contractors Privileged Users
  • 7. © 2017 Imperva, Inc. All rights reserved. Protecting is exactly what Imperva does
  • 8. © 2017 Imperva, Inc. All rights reserved. APPLICATION • We Protect data where it resides: databases and file servers • We Protect where it’s accessed: Web applications • We guard against outside and internal threats
  • 9. More People Can Access ItMore Data in More Places More Places to Sell ItMore Apps are Available Structured Unstructured Big Data SaaS Web Apps Customer portal Mobile Apps Web Services or APIs Knowledge Workers Customers Contractors Privileged Users Cloud DDoS File Server Firewall Web Application Firewall Database Security DATAAPPS OrganizationalAssets EXTORTION THEFT Cybercrime Monetization
  • 10. © 2017 Imperva, Inc. All rights reserved. Imperva is also a DDoS Leader http://www.toptenreviews.com/business/internet/best-ddos-protection-services/
  • 11. © 2017 Imperva, Inc. All rights reserved. Forrester Wave for DDoS Service Providers Ranks Imperva a Leader • Leader in DDoS service provider space • Highest score in the “Current Offering category” (technical strength) • Large market presence Confidential11 Source: 2015 Forrester Wave™ for DDoS Service Providers, Q3 2015
  • 12. © 2017 Imperva, Inc. All rights reserved. WAF & DDoS Data Centers 45 Dubai PoP fully operational
  • 13. © 2017 Imperva, Inc. All rights reserved. Sub-One-Second Time-to-Mitigation • Rapid time-to-mitigation prevents downtime and protects against hit-and-run attacks • Other vendors can take tens of minutes to start mitigating attacks • We detect and mitigate attacks in under 1 second
  • 14. © 2017 Imperva, Inc. All rights reserved. • Switching traffic over to a scrubbing network adds latency • Other vendors have very few scrubbing PoPs, making them prone to latency • We offer connectivity speeds of under 50 Milliseconds to more than 90% of the world Near Zero Latency
  • 15. © 2017 Imperva, Inc. All rights reserved. • High packet rate attacks are the new play in the DDoS space • Others focus on bandwidth (bits per sec): were not designed to handle large PPS volumes • Our network has the capacity to mitigate the most packet-intensive attacks Capacity to Handle Any DDoS Attack
  • 16. © 2017 Imperva, Inc. All rights reserved. Gartner, Magic Quadrant for Web Application Firewalls, Jeremy D'Hoinne, Adam Hils, Claudio Neiva, 07 August 2017 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Imperva. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. A LEADER for FOUR CONSECUTIVE YEARS 2017 Gartner Magic Quadrant for Web Application Firewalls 16
  • 17. © 2017 Imperva, Inc. All rights reserved. Imperva AI & Machine Learning now combined with Global Threat Intelligence SecureSphere WAF Correlation Engine ∂ ThreatRadar(TR) threat intelligence ∂ ProtocolValidation Policies/Signatures ApplicationProfiling SecureSphere Core EngineTRATOProtection TRBotProtection TRReputationService Correlation of ThreatRadar context with WAF core capabilities improves detection accuracy Web. Servers On-premises Removes Unwanted Traffic Cuts Infrastructure Cost Improves SOC Efficiency Improves Security Posture
  • 18. © 2017 Imperva, Inc. All rights reserved.18 Big Picture Competitive Environment – DCAP Gartner Market Guide for Data-Centric Audit and Protection, December 2015 Source: Gartner, Market Guide for Data-Centric Audit and Protection, 15 December 2015
  • 19. © 2017 Imperva, Inc. All rights reserved. Factoring in the Unknown Database Who is connecting to the database? How do they connect to the database? Do their peers access data in the same way? When do they usually work? What data are they accessing? How much data do they query?
  • 20. Data Security 20 Monitor Users User behavior analytics Peer group analysis Uniform coverage Apply Policies Quarantine risky users Monitor Data, Block Activity Data activity monitoring Incident response Discover and Classify Server discovery Data discovery Classification Investigate and Report Contextual SIEM feed Security analysis Compliance automation
  • 21. © 2017 Imperva, Inc. All rights reserved. OUR GLOBAL BUSINESS • Founded in 2002 • Global operations; HQ in Redwood Shores, CA • 1000+ employees • Customers in 100+ countries 21
  • 22. © 2017 Imperva, Inc. All rights reserved. OUR CUSTOMERS 5,200+ direct; thousands Cloud-Based • 325+ government agencies and departments • 425+ global 2000 companies • 7 of the top 10 global telecommunications providers • 3 of the top 5 - US commercial banks - global financial services firms - global computer hardware companies - global biotech companies - global diversified insurance services
  • 23. Technology Alliances - No lock in Anti-Malware • Partnered with best-of-breed solutions • Industry's broadest technology security ecosystem • Certified integration • Extend and augment the functionality of existing investment in security, networking, and business software solutions. Business Software Cloud Fraud Prevention Identity Masking Encryption Network Visibility Platform SIEM Vulnerability Assessment
  • 25. © 2017 Imperva, Inc. All rights reserved. Confidential25
  • 26. More People Can Access ItMore Data in More Places More Places to Sell ItMore Apps are Available Structured Unstructured Big Data SaaS Web Apps Customer portal Mobile Apps Web Services or APIs Knowledge Workers Customers Contractors Privileged Users Cloud DDoS File Server Firewall Web Application Firewall Database Security DATAAPPS OrganizationalAssets EXTORTION THEFT Cybercrime Monetization