Imperva Blog|Login|中文Deutsch日本語

White Papers

Selected Tag: Audit | Show All

Download White Paper

An Inside Track on Insider Threats


How do leading companies mitigate the invisible problem of rogue insiders? Imperva analyzed dozens of companies to understand some of the commonly deployed practices across human resources, legal and technology to stop malicious insiders from taking data and intellectual property. Specifically, we identify nine practices top enterprises have found the most useful to control the leakage of digital assets. Pinpointing the source and scope of data theft is often hard to quantify, especially since your largest internal threat may actually be one of your most loyal employees. This research presents the findings of the first-ever global insider threat study that catalogs common practices used by leading organizations across numerous verticals.

Tags: Insider Threat, File Security, File Monitoring, File Auditing


Download White Paper

Implementing Security Controls for addressing DHS Sensitive Systems Policy Directive 4300A


This paper reviews how SecureSphere enables DHS components to implement the technical controls described in chapter 5 of the DHS 4300A Sensitive Systems Handbook. With SecureSphere Data Security Solutions, DHS components can facilitate detection of security violations, and support security requirements for applications and data, including Identification and Authentication, Access Controls and Auditing.

Tags: Data Security, Access Controls, Auditing, Government, DHS, 4300A, Database Security, Security Controls, Sensitive Systems Handbook


Download White Paper

How to Secure Your SharePoint Deployment


This paper presents five best practices for securing your SharePoint environment. It discusses how SecureSphere for SharePoint can help organizations get the most out of SharePoint's existing permissions system, and fill some of SharePoint's security gaps.

Tags: SharePoint, File Security, Compliance, Auditing, Unstructured Data, Data Security


Download White Paper

10 Building Blocks for Securing File Data


Three fundamental capabilities are lacking in most organizations:
  1. Operationally efficient file activity monitoring and auditing
  2. Scalable user rights management for files
  3. Automated business policy enforcement for file data
These three capabilities are core components of the emerging File Activity Monitoring market, and form the basis of a phased approach to file security. This guide describes ten phases for securing file data, including how and when to use these basic capabilities, as well as when to deploy other complementary technologies.

Tags: File Security, Security Policies, File Monitoring, File Auditing


Download White Paper

Security for PCI Compliance


Addressing Security and Auditing Requirements for Web Applications, Databases, and File Servers

For many organizations, Web, database, and file security present the most challenging barriers to achieving PCI DSS compliance. Often, businesses must provision new technologies or roll out new processes to satisfy Web application security, data audit, and user rights management requirements in the PCI standard.

This paper focuses on the key PCI DSS requirements that impact application and data security. Designed for auditors and security professionals, it describes how Imperva SecureSphere solutions can help organizations address the most costly and complex PCI mandates.

Tags: Web Application Security, Database Security, Audit, PCI, Compliance


Download White Paper

Implementing Sarbanes-Oxley Audit Requirements


The Sarbanes-Oxley Act (SOX) of 2002 set requirements for the integrity of the source data related to financial transactions and reporting. In particular, auditors are looking at regulated data residing in databases connected to enterprise applications such as SAP, Oracle E-Business Suite, PeopleSoft, and other Web Applications. In this White Paper, Imperva presents the range of functions that need to take place to achieve and demonstrate compliance with SOX.

Tags: Audit, Compliance, Sarbanes-Oxley, SOX


Download White Paper

Imperva Data Security and Compliance Lifecycle


SOX and other regulatory legislation are increasingly expanding formal enterprise audit processes to include information technology (IT) assets, especially databases. Imperva's Data Security and Compliance Lifecycle provides step-by-step best practices for implementing database controls and web application security.

Tags: Data Security Lifecycle, Compliance Lifecycle, Audit, Best Practices


Download White Paper

What Auditors Want -- Database Auditing


Give your auditors what they want -- the way they want it -- with zero impact to your database and staff. Learn the top 5 key requirements for database auditing for SOX, PCI, HIPAA and other regulations. Understand the options to native database logging of Web-based applications, such as Oracle E-Business Suite, PeopleSoft or SAP. Learn more about what auditors want for compliance, so you can make informed choices and deliver.

Tags: Database Auditing, Database Security, Compliance, SOX, PCI, HIPAA


Download White Paper

The Hidden Costs of Free Database Auditing


Native database auditing mechanisms are not as inexpensive as they might seem. This paper compares the costs of native database auditing with SecureSphere for a midsized IT datacenter.

Tags: Database Auditing, Datacenter

Selected Tag: Audit | Show All


Term of the Month