BlueCross BLueShield
EE logo black
Uncover hidden risks

Uncover hidden risks

You can’t protect what you don’t know about. Discover forgotten or rogue databases, classify sensitive data, and assess databases for vulnerabilities and misconfigurations. Imperva Discovery and Assessment automates database discovery and classification.


Comply with regulations and industry standards

Limit the scope and costs of compliance by automating manual, time-consuming audit activities. Discover databases and data in scope for audits. Implement least privilege and need-to-know data access. Schedule regular database vulnerability scans using pre-defined assessment tests such as PCI DSS and HIPAA. Demonstrate compliance with database vulnerability assessment results.

How Discovery and Assessment Works

database vulnerabilities

Discovers unknown databases

Automate database discovery and gain visibility into unknown databases. Scan your enterprise network and identify database services and servers. Configure database discovery to scan specific network segments on-demand or at scheduled intervals. Scan results include: IP address, ports used, and whether it’s new or existing.

data classification

Pinpoints and classifies sensitive data

Automate data classification and identify systems in scope for audits. Pinpoint sensitive data locations and classify using dictionary and pattern-matching classification methods. Scan database content and metadata for pre-defined and custom data types. Pre-defined data types include: credit card numbers, national identifiers, email, system credentials, and more.

Protect websites

Identifies security gaps attackers can exploit

Automate your database security assessment process to detect database vulnerabilities and misconfigurations such as default passwords. Leverage over 1,500 pre-defined vulnerability tests, based on CIS and DISA STIG benchmarks that are updated regularly by the Imperva research team. Run scans on-demand or at scheduled intervals. Get detailed reports, including recommended remediation steps.

database vulnerabilities

Address Database Vulnerabilities

Imperva Discovery and Assessment automatically finds the vulnerabilities and misconfigurations in your databases based on industry standards such as DISA STIG and CIS. Then gives you a risk score, tells you how to mitigate those risks, and facilitates remediation

User Rights Management for Databases

Finds excessive user rights

Automate review and authorization of user rights. Aggregate user rights across data stores with user rights management capabilities. Correlate user access rights with organizational context and data sensitivity, and identify excessive user rights to sensitive data. Demonstrate compliance with GDPR, SOX and PCI DSS.


Specifications and System Requirements


 Specification Description
Supported Databases
  • Oracle®
  • SQL Server®
  • DB2®
  • Sybase ASE®
  • Teradata®
  • MySQL®
  • HSQL
  • Netezza
  • Postgres SQL
  • IMS via export to VSAM (KSDS, ESDS) or QSAM data files
  • And more
Supported Main Frame
  • DB2®
  • VSAM
  • IMS
Supported Flat File
  • Hadoop HDFS
  • XML
  • CSV


Click here to see which Operating Systems and Databases each of our products supports.

Related Content

Key Resources

Top 5 Database Security Threats

Top 5 Database Security Threats

White Paper
Read paper ›
Scuba: Database Vulnerability Scanner

Scuba: Database Vulnerability Scanner

Free tool
Download tool ›