Cubic to showcase integrated solutions from trai... » SAN DIEGO: Cubic Global Defense (CGD) has announced it will exhibit various training and Command, Co... Tenable Network Security wins Governor’s Award » London, UK: Tenable Network Security, Inc. has recognized by the Chesapeake Regional Tech Council (C... Online transaction fraud to to reach $25bn by 2020... » Hampshire, UK: A new study from Juniper Research has found that the value of online fraudulent trans... Wolstencroft Cup match held in memory of prolific ... » A charity football match is being held in memory of limbless veteran Warren Wolstencroft and to rais... Axis celebrates 20 years of network video cameras » Axis Communications is celebrating the 20th anniversary of the world’s first network video camera, a... MOD DRIVES £100M SAVINGS THROUGH NEW FLEET MANAGEM... » A new contract to manage the Ministry of Defence’s fleet of lease and hire vehicles will target savi... Cyber attacks target ISIS in a new line of comba... » Security experts react to The New York Times article, “US Cyberattacks Target ISIS in New Line of Co... FAST and V.i. Labs join forces to educate market... » The Federation Against Software Theft (FAST) and long-term industry member V.i. Labs, have launched ... Wick Hill Wins ‘Distributor of the Year’ at IT E... » Woking, Surrey: Wick Hill has won the strongly contested ‘Distributor of the Year’ title at the IT E... Thales delivers digital trust across connected ... » Samsung Developer Conference, San Francisco, CA: Thales has announced that the SAMSUNG ARTIK™ platfo...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

SANTA CLARA and REDWOOD SHORES, CALIFORNIA, USA & LONDON, UK: Acunetix, a market leader in web application security technology, and Imperva, Inc. (NYSE: IMPV) a pioneer and leader a new category of business security solutions for critical applications and high-value data in the data center, yesterday announced that Acunetix Web Vulnerability Scan (WVS) results can now be imported into the SecureSphere Web Application Firewall (WAF) to automatically configure settings that will mitigate the discovered vulnerabilities.

 

When web application weaknesses such as SQL Injection or Cross Site Scripting are detected by Acunetix WVS, SecureSphere will transform the results into WAF security policies that offer immediate protection to companies needing the time to deal with and fix the security vulnerabilities and not be at risk in the meantime.

Using Acunetix WVS scan results to automate WAF configuration is designed to reduce workload and errors when compared to manually configuring a web application firewall such as SecureSphere.

“Many Imperva customers use Acunetix WVS to uncover Web vulnerabilities,” said Imperva CTO, Amichai Shulman. “We believe that the interoperability of the SecureSphere WAF with Acunetix WVS will allow our customers to mitigate those vulnerabilities quickly and reduce costly data breaches.”

“Acunetix sets a high standard when it comes to discovering web application vulnerabilities. We recommend using a web application firewall like SecureSphere to protect web applications until vulnerabilities can be dealt with directly,” said Nick Galea, Acunetix CEO.

Expected benefits of the interoperability of the SecureSphere WAF with Acunetix WVS are as follows:

• Reduced risk exposure – Vulnerabilities are mitigated before developers and testers can fix the web application’s code, thus shortening the Time-to-Fix.

• Accurate Protection – Virtual patching policies are created automatically, reducing the risk of configuration errors that can lead to false positive or negative alerts.

• Reduced Development Cost – Spend less development resources in emergency situations, fix code vulnerabilities during the normal release cycle.

• Compliance Reporting – Show auditors that vulnerabilities are virtually patched thanks to detailed WAF configuration reports.