WP Comprehensive Ecosystem Integration for Data Security | Imperva DSF

Home > Data Security > Data Security Fabric > Ecosystem Integration 

Ecosystem Integration

Imperva Data Security Fabric (DSF) fully integrates with ecosystem technologies for both incident context and additional data capabilities—fully leveraging DSF's automated workflows

Enhance the value of your existing technology investments

Imperva DSF’s open architecture enables new partner-builder innovation. In many cases, DSF provides customers with additional value from their current technology investments while allowing partners to deliver improved capabilities and simplify their orchestration.

  • Integrates with your existing security and IT ecosystem
  • Combine technologies for the highest resolution of data risk exposure
  • Automate actions through thousands of playbooks
  • Speed investigation, streamline, and automate decision processes
Security Automation diagram 1
Security Automation diagram 1

Turn data findings into efficient business processes

Reduce days of busy work into minutes with orchestration and automation

  • Combines event-level data from all monitored systems plus metadata for context
  • Automate any number of manual processes such as risk reporting and mitigation workflows, entitlement review, change reconciliation requests, and more
Frame 16188
Frame 16188

Imperva DSF can optimize your Splunk installation

Many enterprises use Splunk as the primary repository for native database logging and data activity monitoring (DAM) tools.

These logs can represent a significant amount of the data indexed in Splunk. Storing these logs enables adherence to compliance regulations but is often otherwise unused due to the lack of security context.

Organizations implement Imperva Data Security Fabric (DSF) as a database log pre-processor to Splunk to increase the value of raw logs. Imperva DSF filters, compresses, stores, and indexes the raw event data, making it available in Splunk via virtual indices. Analytics within Imperva DSF bridge user identity, data sensitivity, and attack detection, meaning that threat alerts include rich technical context and detection timelines. Security analysts have bidirectional access for interactive data exploration.

This approach enables organizations to increase the security value of their Splunk deployment and markedly reduces Splunk ingestion and development costs.

Data Security Fabric coverage diagram

The Imperva DSF “any database, any location, any scale” design ensures compatibility with your current and future architectures. Bi-directional integration lets Splunk users access all raw data stored in Imperva using the Splunk UI.

How it works

Native logs from on-premises and cloud data repositories are forwarded to Imperva Data Security Fabric for pre-processing. Imperva enriches the information with context into users, access, and threats. Only the intelligence extracted from raw data is forwarded to Splunk, allowing Splunk to remain effective at incidence response and enterprise-level event correlation.

Download datasheet

Integrated single sign-on support

Imperva DSF can integrate with any single sign-on (SSO) identity provider that implements Security Assertion Markup Language (SAML). When integrating DSF with SAML SSO identity providers, you can import existing users from the identity provider or create users in DSF.

cyberark logo

Extend your CyberArk™ deployment for authentication within Imperva DSF

CyberArk offers an extensible privilege access management platform, protecting identities and critical assets by enabling Zero Trust and enforcing least privilege. Imperva enables you to extend your CyberArk deployment to be used as a secret manager within DSF, allowing you to use it to authenticate against your data stores.

Imperva Data Security Fabric (DSF) helps IBM™ Guardium™ customers extend data activity monitoring to their entire data estate, delivering total and unified visibility

Imperva Data Security Fabric protects your Guardium investment by supporting more data types, cloud service platforms, and cloud data lakes, extending coverage to more data repositories, reducing manual efforts & operations costs, and improving the effectiveness and efficiency of your governance & security programs.

Data Security Fabric coverage diagram

Imperva Data Security Fabric protects all data types with a single system that delivers multiple business capabilities

Imperva Data Security Fabric is the first data-centric solution that enables your organization's security and compliance teams to quickly and easily secure sensitive data, no matter where it resides, with an integrated, proactive approach to visibility and predictive analytics.

Imperva Data Security Fabric is composed of cutting-edge orchestrated technical capabilities that work in unison to protect your data across your entire organization:

Data Discovery & Classification

Data Activity Monitoring

Data Retention & Archive

Data Risk Management

Ecosystem Integrations

Data Encryption & Tokenization

Static Data Masking

Automated Workflows & Playbooks

Sensitive Data Management

CRN logo footer
cyber security logo footer
Globe awards logo footer
cyber defense magazine award logo footer
Fortress award logo footer