{"id":1321,"date":"2004-08-25T00:00:00","date_gmt":"2004-08-25T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/08\/25\/security-appliances-add-dynamic-profiling-to-firewall-technology\/"},"modified":"2021-12-30T11:39:09","modified_gmt":"2021-12-30T11:39:09","slug":"security-appliances-add-dynamic-profiling-to-firewall-technology","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/08\/25\/security-appliances-add-dynamic-profiling-to-firewall-technology\/","title":{"rendered":"Security appliances add dynamic profiling to firewall technology"},"content":{"rendered":"<p>The new SecureSphere G4 Dynamic Profiling Firewall and MX Management Server application security appliances represent the first unified security platform to protect enterprise application and database assets from all attack vectors, including Web application hacking, internal database breaches, and worm infections, Imperva says.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SecureSphere 3.0 includes multiple layers of security, including a standards-based deep inspection firewall, Web and database firewalls, and protection from zero-day worms via Imperva&#8217;s new Worm Profiling technology.<\/p>\n<p>The Dynamic Database Firewall, meanwhile, relies on the database elements of the dynamic profile to detect unusual database queries.<\/p>\n<p>http:\/\/zdnet.com.com\/2110-1104_2-5323921.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1321","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1321"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1321\/revisions"}],"predecessor-version":[{"id":3808,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1321\/revisions\/3808"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}