Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

8/14/2018
09:45 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Imperva Completes the Acquisition of Prevoty

REDWOOD SHORES, Calif. – August 13, 2018 – Imperva, Inc. (NASDAQ: IMPV), a leading global provider of best-in-class cybersecurity solutions on premises, in the cloud, and across hybrid environments, announced it completed its acquisition of Prevoty, Inc. a leader in Runtime Application Self-Protection, on Thursday, August 9.

“We are excited to welcome the Prevoty team to Imperva,” said Chris Hylen, president and CEO of Imperva. “Together we will set the bar for application and data protection while also advancing our mission, strategy and priorities. Prevoty complements current Imperva application, data and insights offerings that will enable us to deliver compelling, comprehensive solutions to keep our customers' data and applications safe from cybercriminals.”

The combination of Imperva and Prevoty will expand customers’ security capabilities and their visibility into how applications are accessed, what happens within the applications, and how applications and users interact with data. With this expanded view across their business assets, customers will have deeper insights to help them understand and mitigate security risk.

With the acquisition now closed, Prevoty CEO Julien Bellanger reports to Eldad Chai, SVP of Product Management. The Prevoty team joins Imperva under Julien’s leadership.

Disclosure of non-stockholder approved employment inducement grants made in reliance on NASDAQ rules:  In accordance with Nasdaq Listing Rule 5635(c), Imperva has granted equity awards under its Amended and Restated 2015 Equity Inducement Plan to the new employees who joined Imperva in connection with the acquisition. Imperva granted a total of 84,408 restricted stock units to 39 employees. 49,820 of the restricted stock units will vest over four years with 25 percent vesting on the first anniversary of the vesting commencement date and the remaining 75 percent vesting quarterly in equal installments, subject to the employees’ continued service to Imperva through each applicable vesting date. 34,588 of the restricted stock units will vest over three and a half years with approximately 38 percent vesting on the first anniversary of the vesting commencement date and the remaining 62 percent vesting quarterly in equal installments until fully vested, subject to the employees’ continued service to Imperva through each applicable vesting date. The employees who received restricted stock units joined Imperva as a result of the acquisition and none are executive officers of Imperva.

Forward-Looking Statements

This press release contains forward-looking statements, including without limitation those regarding the company’s beliefs about the benefits to Imperva and its customers of the Prevoty acquisition and the combined vision to lead the world’s fight to keep data and applications safe from cybercriminals. These forward-looking statements are subject to material risks and uncertainties that may cause actual results to differ substantially from expectations including that the company may not be able to successfully integrate Prevoty; customers may not accept, or may not demand, the capabilities of the combined companies to the degree that Imperva anticipates; customers may focus their additional cybersecurity spending on other technologies or addressing other risks; and other risks detailed under the caption “Risk Factors” in the company’s Form 10-Q filed with the Securities and Exchange Commission, or the SEC, on August 3, 2018 and the company’s other SEC filings. You can obtain copies of the company’s SEC filings on the SEC’s website at www.sec.gov.

The foregoing information represents the company’s outlook only as of the date of this press release, and Imperva undertakes no obligation to update or revise any forward-looking statements, whether as a result of new information, new developments or otherwise.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2002-0390
PUBLISHED: 2019-07-21
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0639. Reason: This candidate is a reservation duplicate of CVE-2002-0639. Notes: All CVE users should reference CVE-2002-0639 instead of this candidate. All references and descriptions in this candidate have been removed to prevent ...
CVE-2018-17210
PUBLISHED: 2019-07-20
An issue was discovered in PrinterOn Central Print Services (CPS) through 4.1.4. The core components that create and launch a print job do not perform complete verification of the session cookie that is supplied to them. As a result, an attacker with guest/pseudo-guest level permissions can bypass t...
CVE-2019-12934
PUBLISHED: 2019-07-20
An issue was discovered in the wp-code-highlightjs plugin through 0.6.2 for WordPress. wp-admin/options-general.php?page=wp-code-highlight-js allows CSRF, as demonstrated by an XSS payload in the hljs_additional_css parameter.
CVE-2019-9229
PUBLISHED: 2019-07-20
An issue was discovered on AudioCodes Mediant 500L-MSBR, 500-MBSR, M800B-MSBR and 800C-MSBR devices with firmware versions F7.20A to F7.20A.251. An internal interface exposed to the link-local address 169.254.254.253 allows attackers in the local network to access multiple quagga VTYs. Attackers can...
CVE-2019-12815
PUBLISHED: 2019-07-19
An arbitrary file copy vulnerability in mod_copy in ProFTPD up to 1.3.5b allows for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306.