Imperva
Imperva, Inc. is an American cyber security software and services company which provides protection to enterprise data and application software. The company is headquartered in San Mateo, California. French multinational Thales Group acquired the company for approximately $3.6 billion from private equity firm Thoma Bravo in 2023. History Imperva, originally named ''WebCohort'', was founded in 2002 by Shlomo Kramer, Amichai Shulman and Mickey Boodaei. The following year the company shipped its first product, SecureSphere Web Application Database Protection, a web application firewall. In 2004, the company changed its name to Imperva. In 2011, Imperva went public and was listed on the New York Stock Exchange (NYSE: IMPV). In August 2014, Imperva named Anthony Bettencourt as CEO. In 2016, it published a free scanner designed to detect devices infected with, or vulnerable to the Mirai botnet. In February 2017, Imperva sold Skyfence to Forcepoint for $40 million. In August 2017, ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Shlomo Kramer
Shlomo Kramer (; born 1966), is an Israeli information technology entrepreneur and investor. He is the co-founder of cyber-security companies Check Point and Imperva, as well as Cato Networks, a cloud-based network security provider. As of January 27, 2024, Forbes listed Shlomo Kramer net worth at US$2.2 billion, ranking him 1412 on the Billionaires list and he was ranked 17th among the top wealthiest people in Israel. Personal life Shlomo Kramer has been actively involved with technology all his life. As a youth, he worked on mainframes and sold video games. Kramer served in the Israel Defense Forces' Unit 8200, a crack cybersecurity and intelligence team whose operations include gathering, analyzing and decrypting data; over the years, the unit has produced many of Israel's top high-tech entrepreneurs. After completing his military service, Kramer earned a master's degree in Computer Science from the Hebrew University of Jerusalem and a bachelor's degree in Mathematics and ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Incapsula
Imperva Incapsula is an American cloud-based application delivery platform. It uses a global content delivery network to provide web application security, DDoS mitigation, content caching, application delivery, load balancing and failover services. History Incapsula was founded in 2009 by Gur Shatz and Marc Gaffan. The company has its origins in Imperva (NYSE:IMPV), an American-based cyber security firm which at the time owned 85% of Incapsula. It was spun out from Imperva in 2009. While reported to be growing at a rate of between 50%, 76% and 102% per quarter as of August 2013, the company lost over $1.7 million in the second quarter of that same year. In February 2014 Imperva bought the remaining part of Incapsula and it became a product line within the parent company. In 2013 Incapsula launched a tool named "Backdoor Protect". The tool is reported to detect and block malicious back-doors and "webshells". The tool works by comparing a website's traffic against a database ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Denial-of-service Attack
In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. The range of attacks varies widely, spanning from inundating a server with millions of requests to slow its performance, overwhelming a server with a substantial amount of invalid data, to submitting requests with an illegitimate IP address. In a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. More sophisticated strategies are required to mitigate this type of attack; simply attempting to block a single source is insuffic ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Thales Group
Thales S.A., Trade name, trading as Thales Group (), is a French multinational corporation, multinational aerospace and defence industry, defence corporation specializing in electronics. It designs, develops and manufactures a wide variety of aerospace and military systems, devices and equipment but also operates in the computer security, cybersecurity and formerly civil ground transportation sectors. The company is headquartered in Paris' business district, La Défense, and its stock is listed on Euronext Paris. Founded as Thomson-CSF in 1968, the group was rebranded ''Thales'' (named after the Greek philosopher Thales , pronounced as in French language, French) in 2000 due to the company's desire to simplify and improve the group's brand. Thales is partially owned by the Agence des participations de l'État, French state and operates in more than 68 countries. In 2023, the company generated €18,42 billion in revenue and was the 17th largest defence contractor in the world, ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Thoma Bravo
Thoma Bravo, LP is an American private equity and growth capital firm based in Chicago, Illinois. It is known for being particularly active in acquiring enterprise software companies and has over $130billion in assets under management . It is the successor to the firm Golder Thoma & Co., which was established in 1980 by Stanley Golder and Carl Thoma. Thoma Bravo is led by managing partners Seth Boro, Orlando Bravo, Scott Crabill, Lee Mitchell, Holden Spaht and Carl Thoma. The company focuses on the application, infrastructure and cybersecurity software and technology-enabled business service sectors, and uses a "consolidation" or " buy and build" investment strategy. Investments , the company had completed over 440 software deals and as of 2020, oversaw a portfolio of over 70 software companies. Software investments Thoma Cressey Equity Partners began investing in the enterprise software sector in 2002 with the acquisition of Prophet 21, a provider of software for d ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Forcepoint
Forcepoint is an American multinational corporation software company headquartered in Austin, Texas, that develops computer security software and data protection, cloud access security broker, firewall and cross-domain solutions. Forcepoint was founded in 1994 as an information technology reseller called NetPartners. It was renamed Websense in 1999 and became a public company in 2000 at the peak of the dot-com bubble. Vista Equity Partners acquired Websense in 2013 for $906 million. Raytheon acquired an 80% interest in Websense in April 2015 for $1.9 billion and acquired the remaining 20% interest in 2019. In 2015, Websense acquired network security vendor Stonesoft from Intel and in 2016, the company was renamed Forcepoint. Francisco Partners acquired the company from Raytheon successor RTX Corporation in January 2021. Corporate history NetPartners The company was founded in 1994 as NetPartners in Sorrento Valley, San Diego by Phil Trubey. The company began as a reseller of netw ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Application Firewall
An application firewall is a form of firewall that controls input/output or system calls of an application or service. It operates by monitoring and blocking communications based on a configured policy, generally with predefined rule sets to choose from. The two primary categories of application firewalls are ''network-based'' and ''host-based''. History Gene Spafford of Purdue University, Bill Cheswick at AT&T Laboratories, and Marcus Ranum described a third-generation firewall known as an application layer firewall. Marcus Ranum's work, based on the firewall created by Paul Vixie, Brian Reid, and Jeff Mogul, spearheaded the creation of the first commercial product. The product was released by DEC, named the DEC SEAL by Geoff Mulligan - Secure External Access Link. DEC's first major sale was on June 13, 1991, to Dupont. Under a broader DARPA contract at TIS, Marcus Ranum, Wei Xu, and Peter Churchyard developed the Firewall Toolkit (FWTK) and made it freely available ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
On-premises Software
On-premises software (abbreviated to on-prem, and often written as "on-premise") is installed and runs on computers on the premises of the person or organization using the software, rather than at a remote facility such as a server farm or cloud. On-premises software is sometimes referred to as " shrinkwrap" software, and off-premises software is commonly called "software as a service" ("SaaS") or "cloud computing". The software consists of database and modules that are combined to particularly serve the unique needs of the large organizations regarding the automation of corporate-wide business system and its functions. Comparison between on-premises and cloud (SaaS) Location On-premises software is established within the organisation's internal system along with the hardware and other infrastructure necessary for the software to function. Cloud-based software is usually served via internet and it can be accessed by users online regardless of the time and their location. Un ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Cloud Computing
Cloud computing is "a paradigm for enabling network access to a scalable and elastic pool of shareable physical or virtual resources with self-service provisioning and administration on-demand," according to International Organization for Standardization, ISO. Essential characteristics In 2011, the National Institute of Standards and Technology (NIST) identified five "essential characteristics" for cloud systems. Below are the exact definitions according to NIST: * On-demand self-service: "A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider." * Broad network access: "Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations)." * Pooling (resource management), Resource pooling: " The provider' ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Software Bot
Software consists of computer programs that instruct the execution of a computer. Software also includes design documents and specifications. The history of software is closely tied to the development of digital computers in the mid-20th century. Early programs were written in the machine language specific to the hardware. The introduction of high-level programming languages in 1958 allowed for more human-readable instructions, making software development easier and more portable across different computer architectures. Software in a programming language is run through a compiler or interpreter to execute on the architecture's hardware. Over time, software has become complex, owing to developments in networking, operating systems, and databases. Software can generally be categorized into two main types: # operating systems, which manage hardware resources and provide services for applications # application software, which performs specific tasks for users The rise of cloud ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Runtime Application Self-protection
Runtime application self-protection (RASP) is a security technology that uses runtime instrumentation to detect and block computer attacks by taking advantage of information from inside the running software. The technology differs from perimeter-based protections such as firewalls, that can only detect and block attacks by using network information without contextual awareness. RASP technology is said to improve the security of software by monitoring its inputs, and blocking those that could allow attacks, while protecting the runtime environment from unwanted changes and tampering. RASP-protected applications rely less on external devices like firewalls to provide runtime security protection. When a threat is detected RASP can prevent exploitation and possibly take other actions, including terminating a user's session, shutting the application down, alerting security personnel and sending a warning to the user. RASP aims to close the gap left by application security testing and n ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Web API Security
Web API security entails authenticating programs or users who are invoking a web API. Along with the ease of API integrations come the difficulties of ensuring proper authentication (AuthN) and authorization (AuthZ). In a multitenant environment, security controls based on proper AuthN and AuthZ can help ensure that API access is limited to those who need (and are entitled to) it. Appropriate AuthN schemes enable producers (APIs or services) to properly identify consumers (clients or calling programs), and to evaluate their access level (AuthZ). In other words, may a consumer invoke a particular method (business logic) based on the credentials presented? "Interface design flaws are widespread, from the world of crypto processors through sundry embedded systems right through to antivirus software and the operating system itself." Method of authentication and authorization The most common methods for authentication and authorization include: # Static strings: These are lik ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |