AlienVault announces availability of updated open ... » LONDON, UK: AlienVault announced the general availability of an updated version of Open Threat Excha... BeyondTrust introduces first commercial least pr... » PHOENIX: BeyondTrust has announced the release of PowerBroker for Mac to address security and compli... Free mobile app helps integrators work more effici... » OTTAWA, ONTARIO: March Networks has launched a new version of its industry-first GURU Smartphone App... Cult of celebrity reaches the gun world » A recent analysis of the sporting gun market by Bonhams, one of the major players in this field, sho... Bonhams antique arms and armour sales hit £1 mil... » The steely strength of the Antique Arms & Armour market at Bonhams was in evidence again this week w... Amosun, keep off campus politics...collecting N15,... » We would begin this editorial by sounding a very strong warning to all political officials in Nigeri... Trafficking: Human, Drug, Contraband and CBRNe at ... » Trafficking remains one of the major issues for border security and management agencies. Whether hum... Imperva Cited as a Leader by Independent Research ... » Imperva Incapsula DDoS Protection received highest score in Current Offering category REDWOOD SH... ROYAL NAVY'S LATEST SUBMARINE TO SET SAIL THIS SUM... » HMS Artful, the third of the Royal Navy’s new Astute Class attack submarines will set sail for sea t... Datum reaffirms its commitment to information secu... » FARNBOROUGH: Datum Datacentres has announced that it has achieved ISO 27001 transition to 2013 stand...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

SANTA CLARA and REDWOOD SHORES, CALIFORNIA, USA & LONDON, UK: Acunetix, a market leader in web application security technology, and Imperva, Inc. (NYSE: IMPV) a pioneer and leader a new category of business security solutions for critical applications and high-value data in the data center, yesterday announced that Acunetix Web Vulnerability Scan (WVS) results can now be imported into the SecureSphere Web Application Firewall (WAF) to automatically configure settings that will mitigate the discovered vulnerabilities.

 

When web application weaknesses such as SQL Injection or Cross Site Scripting are detected by Acunetix WVS, SecureSphere will transform the results into WAF security policies that offer immediate protection to companies needing the time to deal with and fix the security vulnerabilities and not be at risk in the meantime.

Using Acunetix WVS scan results to automate WAF configuration is designed to reduce workload and errors when compared to manually configuring a web application firewall such as SecureSphere.

“Many Imperva customers use Acunetix WVS to uncover Web vulnerabilities,” said Imperva CTO, Amichai Shulman. “We believe that the interoperability of the SecureSphere WAF with Acunetix WVS will allow our customers to mitigate those vulnerabilities quickly and reduce costly data breaches.”

“Acunetix sets a high standard when it comes to discovering web application vulnerabilities. We recommend using a web application firewall like SecureSphere to protect web applications until vulnerabilities can be dealt with directly,” said Nick Galea, Acunetix CEO.

Expected benefits of the interoperability of the SecureSphere WAF with Acunetix WVS are as follows:

• Reduced risk exposure – Vulnerabilities are mitigated before developers and testers can fix the web application’s code, thus shortening the Time-to-Fix.

• Accurate Protection – Virtual patching policies are created automatically, reducing the risk of configuration errors that can lead to false positive or negative alerts.

• Reduced Development Cost – Spend less development resources in emergency situations, fix code vulnerabilities during the normal release cycle.

• Compliance Reporting – Show auditors that vulnerabilities are virtually patched thanks to detailed WAF configuration reports.