This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Imperva launches community-backed threat protection

Share this article:

Imperva has announced the launch of a crowd-sourced technology that it says can protect users and enable them to draw intelligence from.

Launching SecureSphere 10.0, the company also unveiled ThreatRadar Community Defense, its first crowd-sourced threat intelligence service that aggregates and validates attack data from web application firewalls to help protect against hackers, automated clients and zero-day attacks.

According to the company, Imperva ThreatRadar Community Defense delivers crowd-sourced threat intelligence gathered from live attack data from web application firewalls deployed around the world and distributes this data in near real-time.

Amichai Shulman, co-founder and chief technology officer of Imperva, said: “Together, Imperva ThreatRadar Reputation Services and Community Defense pull crowd-sourced data from around the world to provide heightened insight into the identity of these attackers.

“As the first company to deliver crowd-sourced threat intelligence for web application firewalls, we continue to innovate to deliver what we believe are the best, most advanced web application security solutions available to meet the evolving needs of our customers.”

According to its April Hacker Intelligence Initiative report, analysis of real-world attack traffic against 60 web applications between January and March 2013 found that businesses can reduce the risk of successful attacks against their organisations by identifying and blocking attack sources, payloads and tools that are found to target multiple websites or organisations.

It said that attack sources make up a disproportionate amount of the overall traffic against enterprise organisations in the report, and can be identified only by analysing crowd-sourced attack data from a broader community.

It found that crowd-sourcing increases community protection against large-scale attacks, as multiple attacking sources and payloads gradually cover more and more targets, thus affecting larger parts of the community and a cooperating community can benefit by exchanging security and threat information.

Shulman told SC Magazine that generally, few people are responsible for attacks and these are generally criminal and industrial hackers. “Only three per cent of all IP addresses are recognised as being attackers, but they are responsible for 97 per cent of all attack volume and if you are aware of the IP address, you can benefit,” he said.

“This is our way of slotting into the application security domain. These are not application security attacks, with reputation feeds it was hard to achieve and analyse when we were looking at phishing, command and control servers and botnets. This is the first time we have added a layer of application security.”

Shulman said that ThreatRadar Community Defense is available for free for users if they choose to send data, or a charge applies if they do not send it.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud

Exclusive video webcast & Q&A sponsored by Vormetric

As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.

View the webcast here to find out more

More in News

Microsoft warns on yet another zero-day security flaw

Microsoft warns on yet another zero-day security flaw

Microsoft has warned Windows users about a zero-day security issue with malicious PowerPoint documents being emailed to recipients. The software giant is working on a patch for the problem.

Google launches FIDO-compliant 2FA USB key for Chrome and Gmail

Google launches FIDO-compliant 2FA USB key for Chrome ...

Google has souped up its two-factor authentication (2FA) login process with the launch of Security Key, a physical USB that only works after verifying the login site is truly a ...

Evolving TorrentLocker ransomware generating big money

Evolving TorrentLocker ransomware generating big money

The TorrentLocker ransomware has returned with a vengeance and is starting to bring in big money for its operators.