• Overview
  • Specifications
  • Defend Business-Critical Data with Industry-Leading File Security Technology

    file auditing, monitoring and Security

    Hackers know what they want and where to find it. Critical data centers such as file servers are targets for your “crown jewels,” like intellectual property, financial information, deal data, or PII. Cyber-attacks have become increasingly sophisticated, leveraging multiple tactics and tools, all with one goal: getting in. Imperva SecureSphere File Firewall protects sensitive unstructured data where it resides, so that you can prevent breaches, along with their resulting exposure, costs and brand damage.

    Key Capabilities

    • Quickly Put a Stop to Suspicious Activity

      Prevent your files from becoming an easy target for internal and external threats. With SecureSphere File Firewall, you can immediately respond to suspicious file access activity by generating notifications, or in certain situations, blocking access completely. With the industry’s leading file security policy framework, you can trust that you have complete protection against unstructured data theft.

    • Incident Details at Your Fingertips

      When it comes to incident response, the sooner the better. Begin file security investigations right away with immediate access to a record of all file activity across your organization. Uncover all the details in just a few clicks with interactive audit analytics that help you identify suspicious behavior, understand file permissions, and document problems.

    • Boost Efficiency and Tighten Controls with Automated Access Rights Reviews

      To ensure file protection and prevent data theft, it’s important to continually review file permissions. With SecureSphere, you can finally put a regular workflow in place for access rights reviews. Allow data owners to make access control decisions by including them in your routine review cycles. Learn more about User Rights Management for Files.

    • Protect Your Data from Advanced Threats

      You can’t afford to leave your files exposed to malware and targeted attacks. With Imperva and FireEye, you don’t need to worry. Be confident that your sensitive and regulated data is safe from advanced threats with an added layer of file security, triggered by a leading malware detection system. Learn more about Imperva and FireEye.

  • File Firewall Specifications

    Specification Description
    Operating Systems Supported
    • Windows 2003, 2008 and 2012
    • RedHat 5.X
    • Solaris 10
    File Systems Supported
    • Windows file storage systems
    • UNIX/Linux file storage systems
    • NAS devices
    Directory Services Supported
    • Microsoft Active Directory users and groups
    User Rights Management
    • Audit user access rights to files and lists via file systems permissions
    • Validate excessive rights on sensitive data
    • Identify dormant accounts
    • Identify files accessible by global groups
    • Track changes to user rights
    • Revoke rights and group membership
    • Recommend data owners
    File System Activity Audit
    • User name
    • Domain
    • Object name
    • Groups
    • Operation (add/remove/delete)
    • Object type
    • Attribute
    • Before and after value
    • Source and Destination IP
    Data Classification
    Tamper-Proof Audit Trail
    • Audit trail stored in a tamper-proof repository
    • Optional encryption or digitally signing of audit data
    • Role based access controls to view audit data (read-only)
    • Real-time visibility of audit data
    Deployment Modes
    • Network: Non-inline sniffer, transparent bridge
    • Host: Lightweight agents (local or global mode)
    Management
    • Web User Interface (HTTP/HTTPS)
    • Command Line Interface (SSH/Console)
    Administration
    • MX Server for centralized management
    Events and Reporting
    • SNMP
    • Syslog
    • Integration with leading SIEM vendors
    • Email to data owners and other stakeholders
    • Custom followed action
    • SecureSphere task workflow
    • Integrated graphical reporting
    • Real-time dashboard
    Related Products