If your organization collects and processes data, you face two major challenges: how to meet data compliance requirements and how to effectively protect from data theft. Imperva SecureSphere data security solutions help you discover your database assets and risks, protect sensitive data, and comply with company governance and mandated regulations.
10 Questions to Determine if Data Security is a Priority
- Where specifically, is your private data located?
- Who is accessing your data?
- How do they access your data?
- Should they have access to your data?
- What users have access to your data, but do not use it?
- Who is responsible if data is lost?
- Who is responsible for monitoring that data?
- How will you determine what data has been lost in a breach?
- Is your process repeatable, scalable, timely and cost-effective?
- What level of risk is acceptable?
Determining the best data security measures for your company can be a daunting task. At the end of your research, you will find that protecting the data requires a data-centric audit and protection solution that simplifies and automates the deployment and maintenance processes while providing high-fidelity compliance and security results.
Data Audit and Protection
Imperva SecureSphere platform forms the foundation for both SecureSphere data security and web application solutions. The solutions are designed to work together, yet can be independently deployed. SecureSphere protects data in the cloud and on premise, providing out-of-the-box capabilities that reduce the requirement for specialized security and compliance resources and staff. Deployment is fast, enabling even the largest organizations to provide protection of critical data in days or weeks, with in-depth and full coverage across thousands of data stores in a matter of months.
Enterprises can seamlessly integrate the SecureSphere activity log with Imperva CounterBreach to protect enterprise data from theft and loss caused by compromised, careless or malicious users. CounterBreach combines Imperva expertise in monitoring and protecting data with advanced machine learning to uncover dangerous user data access activity. Based on granular inputs from SecureSphere and Skyfence, CounterBreach develops a behavioral baseline of typical user data access and then detects critical deviations from the norm. CounterBreach proactively flags these dangerous actions for immediate investigation.
SecureSphere Database Firewall (DBF) SecureSphere Database Activity Monitoring (DAM) SecureSphere Database Assessment (DAS) Discovery and classification Monitor and audit log Block in real-time Vulnerability assessment1 Database agents1 Gateway clustering Optional Optional Big Data monitoring Optional Optional User rights management2 Optional Optional Optional3 Extended application specific service (Oracle EBS, SAP, PeopleSoft) Optional Optional High availability for Management Server (MX) Optional Optional Available on Amazon Web Services (AWS) BYOL4 Available on Microsoft Azure Data Masking5 Optional Optional Advanced machine learning based insider threat protection6 Optional Optional Web application threat correlation Optional Optional
1 Number included varies by appliance purchase, see data sheet for details: Imperva SecureSphere® Appliances
2 User Rights Monitoring is not available on Big Data Nodes
3 Features that require audit log detail will not be available if DAS is deployed stand-alone
4 Not all options are available in the AWS environment
5 Requires Imperva Camouflage Data Masking
6 Requires Imperva CounterBreach