Imperva Blog|Login|中文Deutsch日本語

White Papers

Selected Tag: Compliance | Show All

Download White Paper

Data Protection Under POPI


6 Step Data Privacy Protection Plan for the South African Protection of Personal Information (POPI) Bill

Is your organization ready to address the South African Protection of Personal Information (POPI) bill? POPI prescribes information protection principles to regulate collection and processing of South African citizens' personal data. In this paper, we review POPI's eight principles and discuss how best to address those with practical data security processes and solutions.

Tags: POPI, Data Security, Database Security, PII, Data Breach, Compliance


Download White Paper

SharePoint Governance and Security: Where to Start


SharePoint is a complex platform experiencing explosive growth in adoption, exposure, and storage of sensitive content. Consequently, SharePoint security and governance are under greater scrutiny at the executive level and require immediate mitigation actions. The phased, risk-based perspective outlined in this paper aligns investments and priorities to accomplish the greatest security return for existing SharePoint deployments. Security plans should include both preventative and analytical capabilities and incorporate automated tools to provide controls and information that cannot be addressed practically by native SharePoint functionality or corporate resources.

Tags: SharePoint, Data Security, Database Security, Government, Compliance


Download White Paper

Data Privacy: The High Cost of Unprotected Sensitive Data


Today, organizations face a heightened threat landscape with data breaches constantly on the rise. Financial records, medical records, personally identifiable information (PII), and other private business data exist in virtually every enterprise data center. Failing to safeguard the databases that store this information can damage your reputation, impact your operations, and result in regulatory violations, fines, and legal fees. This white paper will (1) present 6 steps to automate and enforce enterprise data privacy policies (2) identify the database security tools needed to accomplish each step (3) highlight Imperva's market-leading SecureSphere Data Security Suite.

Tags: Data Privacy, Data Security, Data Protection Plan, Database Security, Personally Identifiable Information, PII, Compliance


Download White Paper

Compliance with the HIPAA Security Rule - Meeting the Electronic Code of Federal Requirements


The HIPAA Security Rule establishes national standards to protect individuals' medical records and other personal health information. In this paper we review the security standards for protection of e-PHI as listed under part 164 of the 45 CFR, and map SecureSphere Data Security Suite solutions to the specified requirements described in these standards.

Tags: Data Security, Compliance, HIPAA, Government, e-PHI, Database Security


Download White Paper

How to Secure Your SharePoint Deployment


This paper presents five best practices for securing your SharePoint environment. It discusses how SecureSphere for SharePoint can help organizations get the most out of SharePoint's existing permissions system, and fill some of SharePoint's security gaps.

Tags: SharePoint, File Security, Compliance, Auditing, Unstructured Data, Data Security


Download White Paper

Meeting NIST SP 800-53 Guidelines


This paper reviews information security requirements described by NIST in SP 800-53. It discusses the main implementation challenges organizations struggle with. The paper also maps key capabilities of Imperva's SecureSphere Data Security Suite to NIST SP 800-53 guidelines, describing how SecureSphere solutions can be used to implement required controls, manage risk to federal information and demonstrate compliance.

Tags: Data Security, Compliance, NIST, FISMA, NIST SP 800-53, Government


Download White Paper

Security for PCI Compliance


Addressing Security and Auditing Requirements for Web Applications, Databases, and File Servers

For many organizations, Web, database, and file security present the most challenging barriers to achieving PCI DSS compliance. Often, businesses must provision new technologies or roll out new processes to satisfy Web application security, data audit, and user rights management requirements in the PCI standard.

This paper focuses on the key PCI DSS requirements that impact application and data security. Designed for auditors and security professionals, it describes how Imperva SecureSphere solutions can help organizations address the most costly and complex PCI mandates.

Tags: Web Application Security, Database Security, Audit, PCI, Compliance


Download White Paper

Five Signs Your File Data is at Risk


Persistent insider threats and regulatory compliance mandates make protecting sensitive file data a business requirement for virtually every organization. However, the sheer volume of file data and its rapid and continuous growth make it a challenge to secure properly. This whitepaper reviews the five questions to help you assess your file security posture. If you aren't able to answer these five questions confidently, your file data is probably at risk.

Tags: File Security, Compliance, Threats, Insider Threat, Unstructured Data, Data, File Activity Monitoring


Download White Paper

Top 10 Guide to Data Security for Federal Agencies


Web application and database security remains one of the most vulnerable areas across federal agencies as well as the private sector in virtually every geography and business vertical. An essential difference between enterprises and federal agencies is the attacker.

Irrespective of attacks from inside or outside an organization data remains the prize. Traditional network security controls while valuable and necessary simply don't scale to address data-centric attacks, and organizations need to augment them with data-centric solutions focused on the targets: Web applications and databases. But federal agencies are not just focused on security - they also need to demonstrate compliance to both agency and congressional mandates.

Tags: Government, Federal, Compliance, FISMA, SOX, PCI, GLBA, HIPAA, NERC, Data Security


Download White Paper

Protecting Databases from Unauthorized Activities


The threat of compromising sensitive information either by leakage or unauthorized changes is driving compliance regulations such as Sarbanes-Oxley (SOX), the Payment Card Industry Data Security Standard (PCI DSS), and others, which require organizations to implement strong database access controls.

Tags: Compliance, Data Security, Database Security, PCI, SOX


Download White Paper

The Business Case for Database Security


Build an airtight business case for database security and convince your senior management of the need for a dedicated security solution. This white paper describes database compliance and security requirements, project risks, alternatives, and evaluates the economic benefits of selecting Imperva SecureSphere.

Tags: Database Security, Compliance, Business Case


Download White Paper

Implementing Sarbanes-Oxley Audit Requirements


The Sarbanes-Oxley Act (SOX) of 2002 set requirements for the integrity of the source data related to financial transactions and reporting. In particular, auditors are looking at regulated data residing in databases connected to enterprise applications such as SAP, Oracle E-Business Suite, PeopleSoft, and other Web Applications. In this White Paper, Imperva presents the range of functions that need to take place to achieve and demonstrate compliance with SOX.

Tags: Audit, Compliance, Sarbanes-Oxley, SOX


Download White Paper

Imperva Data Security and Compliance Lifecycle


SOX and other regulatory legislation are increasingly expanding formal enterprise audit processes to include information technology (IT) assets, especially databases. Imperva's Data Security and Compliance Lifecycle provides step-by-step best practices for implementing database controls and web application security.

Tags: Data Security Lifecycle, Compliance Lifecycle, Audit, Best Practices


Download White Paper

What Auditors Want -- Database Auditing


Give your auditors what they want -- the way they want it -- with zero impact to your database and staff. Learn the top 5 key requirements for database auditing for SOX, PCI, HIPAA and other regulations. Understand the options to native database logging of Web-based applications, such as Oracle E-Business Suite, PeopleSoft or SAP. Learn more about what auditors want for compliance, so you can make informed choices and deliver.

Tags: Database Auditing, Database Security, Compliance, SOX, PCI, HIPAA

Selected Tag: Compliance | Show All


Term of the Month