3400 Bridge Parkway, Suite 101
94065 Redwood Shores, CA, us
+44 (20) 7183-2834
Imperva Introduces ThreatRadar To Mitigate Automated, Industrialized Cyber Attacks
First Reputation-Based Service for Web Application Security
"ThreatRadar dramatically increases an enterprise's ability to stop attacks by automatically adapting the defense so traffic from malicious sources can be blocked before an attack is attempted," explained Imperva's CTO Amichai Shulman. "By harnessing the collective insight of the security community, ThreatRadar can block traffic from malicious sources. As attackers shift locations and techniques Imperva's ThreatRadarpowered WAF delivers the broadest arsenal of defense capabilities available today."
Anyone using ThreatRadar with Imperva's WAF will have an effective means to mitigate:
- Mass SQL Injection attacks coming from botnets
- Several types of automated attacks such as Comment SPAM campaigns, scraping attacks, web email SPAM attacks
ThreatRadar specific ally provides protection against:
- Malicious sources: Uptodate protection from sources that have repeatedly performed malicious activity on other web applications. Often part of the ten million plus botnet network they are executing attacks on behalf of remote hackers.
- Anonymous Proxies: Uptodate protection from sources that are used as anonymous proxies. By hiding the identity of traffic sources, anonymous proxies are often exploited by hackers to launch attacks.
- The Onion Router, a.k.a., TOR IPs: Uptodate protection from the TOR hacker network. Hackers use the TOR network to launch attacks without revealing their identity and location.
- Phishing URLs: Real time alerting on phishing incidents against your domain.
In addition, ThreatRadar will provide:
- IP Forensics Tool: A dynamic, webbased tool providing additional context on attackers, including geographic location and user profile, that takes the guesswork out of incident analysis.
- Ongoing threat updates-Imperva's Application Defense Center (ADC) has researched and integrated credible attack source data providers to ensure protection accuracy and effectiveness. The ADC will continually update attack sources as an ongoing service.
The use of information published here for personal information and editorial processing is generally free of charge. Please clarify any copyright issues with the stated publisher before further use. In the event of publication, please send a specimen copy to email@example.com.