Imperva Blog|Login|中文Deutsch日本語

White Papers

Selected Tag: Auditing | Show All

Download White Paper

An Inside Track on Insider Threats


How do leading companies mitigate the invisible problem of rogue insiders? Imperva analyzed dozens of companies to understand some of the commonly deployed practices across human resources, legal and technology to stop malicious insiders from taking data and intellectual property. Specifically, we identify nine practices top enterprises have found the most useful to control the leakage of digital assets. Pinpointing the source and scope of data theft is often hard to quantify, especially since your largest internal threat may actually be one of your most loyal employees. This research presents the findings of the first-ever global insider threat study that catalogs common practices used by leading organizations across numerous verticals.

Tags: Insider Threat, File Security, File Monitoring, File Auditing


Download White Paper

Implementing Security Controls for addressing DHS Sensitive Systems Policy Directive 4300A


This paper reviews how SecureSphere enables DHS components to implement the technical controls described in chapter 5 of the DHS 4300A Sensitive Systems Handbook. With SecureSphere Data Security Solutions, DHS components can facilitate detection of security violations, and support security requirements for applications and data, including Identification and Authentication, Access Controls and Auditing.

Tags: Data Security, Access Controls, Auditing, Government, DHS, 4300A, Database Security, Security Controls, Sensitive Systems Handbook


Download White Paper

How to Secure Your SharePoint Deployment


This paper presents five best practices for securing your SharePoint environment. It discusses how SecureSphere for SharePoint can help organizations get the most out of SharePoint's existing permissions system, and fill some of SharePoint's security gaps.

Tags: SharePoint, File Security, Compliance, Auditing, Unstructured Data, Data Security


Download White Paper

10 Building Blocks for Securing File Data


Three fundamental capabilities are lacking in most organizations:
  1. Operationally efficient file activity monitoring and auditing
  2. Scalable user rights management for files
  3. Automated business policy enforcement for file data
These three capabilities are core components of the emerging File Activity Monitoring market, and form the basis of a phased approach to file security. This guide describes ten phases for securing file data, including how and when to use these basic capabilities, as well as when to deploy other complementary technologies.

Tags: File Security, Security Policies, File Monitoring, File Auditing


Download White Paper

What Auditors Want -- Database Auditing


Give your auditors what they want -- the way they want it -- with zero impact to your database and staff. Learn the top 5 key requirements for database auditing for SOX, PCI, HIPAA and other regulations. Understand the options to native database logging of Web-based applications, such as Oracle E-Business Suite, PeopleSoft or SAP. Learn more about what auditors want for compliance, so you can make informed choices and deliver.

Tags: Database Auditing, Database Security, Compliance, SOX, PCI, HIPAA


Download White Paper

The Hidden Costs of Free Database Auditing


Native database auditing mechanisms are not as inexpensive as they might seem. This paper compares the costs of native database auditing with SecureSphere for a midsized IT datacenter.

Tags: Database Auditing, Datacenter

Selected Tag: Auditing | Show All


Term of the Month