If your organization collects and processes data, you face two major challenges: how to meet data compliance requirements and how to effectively protect from data theft. Imperva SecureSphere data security solutions help you do both at scale in a cost-effective manner that leverages your existing infrastructure and IT staff.
10 Questions to Determine if Data Security is a Priority
- Where specifically, is your private data located?
- Who is accessing your data?
- How do they access your data?
- Should they have access to your data?
- What users have access to your data, but do not use it?
- Who is responsible if data is lost?
- Who is responsible for monitoring that data?
- How will you determine what data has been lost in a breach?
- Is your process repeatable, scalable, timely and cost-effective?
- What level of risk is acceptable?
Determining the best data security measures for your company can be a daunting task. At the end of your research, you will find that protecting the data requires a data-centric audit and protection solution that simplifies and automates the deployment and maintenance processes while providing high-fidelity compliance and security results.
Data Audit and Protection
Imperva SecureSphere platform forms the foundation for SecureSphere data, file and web application solutions. The solutions are designed to work together, yet can be independently deployed. SecureSphere protects data in the cloud and on premise, providing out-of-the-box capabilities that reduce the requirement for specialized security and compliance resources and staff. Deployment is fast, enabling even the largest organizations to provide protection of critical data in days or weeks, with in-depth and full coverage across thousands of data stores in a matter of months.
Enterprises can seamlessly integrate the SecureSphere activity log with Imperva CounterBreach to protect enterprise data from theft and loss caused by compromised, careless or malicious users. CounterBreach combines Imperva expertise in monitoring and protecting data with advanced machine learning to uncover dangerous user data access activity. Based on granular inputs from SecureSphere and Skyfence, CounterBreach develops a behavioral baseline of typical user data access and then detects critical deviations from the norm. CounterBreach proactively flags these dangerous actions for immediate investigation.
SecureSphere Database Firewall (DBF) SecureSphere Database Activity Monitoring (DAM) SecureSphere Database Assessment (DAS) Discovery and classification Monitor and audit log Block in real-time Vulnerability assessment1 Vulnerability management8 Optional Optional Optional User rights management2 Optional Optional Optional3 Ransomware detection and blocking7 Optional Optional Insider threat protection based on advanced machine learning6 Optional Optional Available on Amazon Web Services (AWS) BYOL4 Available for Microsoft Azure Database agents1 Clustering and high availability Optional Optional Big Data monitoring Optional Optional Mainframe monitoring Optional Optional Web application threat correlation Optional Optional Data Masking5 Optional Optional
1 Number included varies by appliance purchase, see data sheet for details: Imperva SecureSphereÂ® Appliances
2 User Rights Monitoring is not available on Big Data or mainframe data stores
3 Features that require audit log detail will not be available if DAS is deployed stand-alone
4 Not all options are available in the AWS environment
5 Requires Imperva Data Masking
6 Requires Imperva CounterBreach
7 Requires Imperva SecureSphere File Firewall
8 Requires Imperva RiskSense Vulnerability Manager