Imperva Securesphere Data Security: Protect and Audit Critical Data
Imperva Securesphere Data Security: Protect and Audit Critical Data
Data Security
DA T A SH E E T
1
D ATASHE E T
Database •
•
Logs only what activity is necessary while monitoring all activity for security violations
Monitors and protects high-transaction databases
Firewall •
•
Blocks suspicious behavior when it happens – investigate in-context
Executes multi-action security alerts, eliminating bottlenecks and delays
• Interlocks database protection with the SecureSphere Web Application Firewall,
• Discover and help classify sensitive CounterBreach Insider threat protection, and malware protection, providing multi-
databases and data factored data security
• Find and remediate database and
system vulnerabilities
Meet compliance requirements
• Identify excessive user rights and
dormant users, and enable a SecureSphere helps organizations address compliance regulations including GDPR, PCI
complete rights review cycle DSS, SOX, POPI, and HIPAA.
• Protect RDBMS, data warehouses, • Addresses virtually all compliance requirements for databases with pre-defined
Big Data platforms, and policies and reports
mainframe databases and files • Rapid configuration and deployment of new and modified policies – no DBA required
• Alert, quarantine, and block • Privileged user monitoring, including local server access
database attacks and unauthorized • In-service and phone home updates minimize restarts and resulting gaps in audit data
activities in real-time
• Flexibility and responsiveness to address evolving IT environments
• Automate and schedule
and compliance requirements
compliance tasks and reporting
2
D ATASHE E T
Imperva Data
SecureSphere Discovery
Security Capabilities
and Assessment pinpoints
sensitive data locations Data security starts with data discovery
and provides a risk-based To protect and monitor data requires the discovery and classification of the sensitive
data. In smaller companies this may be achieved through manual surveys and reviews;
prioritization that can as the size of a company grows, the number of databases grow at a near-exponential
help companies plan their rate. Automated discovery and classification are the only reliable way to routinely and
consistently discover and classify new or modified database instances containing
risk mitigation programs, previously unknown sensitive data. SecureSphere Discovery and Assessment Server
systems, and policies (included with DBF and available as a stand-alone server) pinpoints sensitive data
locations, and provides a risk-based prioritization that can help companies plan their risk
mitigation programs, systems, and policies.
3
D ATASHE E T
Big Data nodes, and files. malicious users by seamlessly integrating the SecureSphere activity log with Imperva
CounterBreach. CounterBreach uses machine learning and peer group analytics to
establish a full contextual baseline of typical user access to database tables, and then
detects and prioritizes anomalous activity. A dashboard of actionable results explain
the issues, possible ramifications, and prioritize them. Once dangerous behaviors
are identified, enterprises can quickly quarantine risky users in order to protectively
prevent or contain data breaches.
The CounterBreach algorithms are specifically built for analysis of SecureSphere logs.
This differs from the generic algorithms utilized by SIEM tools that must normalize logs
fed to it from multiple sources. CounterBreach has other advantages over SIEM based
user behavior analytics, including access to the complete log of activity. Most SEIM
tools are provided with database activity logs that are pre-filtered by defined policy
rules designed to either remove the “normal” system activity or alert only on known
suspicious behavior. By pre-filtering the baseline data, the algorithm will be incapable
of defining “normal” or completing an accurate pattern analysis. The direct connection
between SecureSphere and CounterBreach ensure that all activity is analyzed in full
context.
4
D ATASHE E T
5
D ATASHE E T
Automated health
monitoring capabilities Imperva Enterprise-Class
detect configuration
problems and system
Readiness
errors, thereby reducing Predictable performance at scale
administrative overhead Imperva achieves scalability through highly efficient audit logging technology. Unlike
competing solutions that rely on standard relational databases for the data monitoring,
and down-time
Imperva utilizes techniques found in big-data analytics solutions. The ability to write fast
and read even faster gives Imperva the ability to scale far beyond the competition.
The system may be configured to monitor all activity for security policy violations while
monitoring and logging a different set of activities for audit purposes. The separation
can result in a substantial improvement in data security, performance, audit log size, and
relevance when compared to other solutions.
SecureSphere supports high-availability by eliminating single points of failure with active
redundancy built into the solution. SecureSphere implements intelligent high-availability
features, including agent connections that can balance themselves and move around
the Gateway cluster as needed, thus helping to maintain a fault-free data program and
uninterrupted audit log.
6
D ATASHE E T
Cloud-enabled
Imperva SecureSphere for AWS extends the security and compliance capabilities
to the Amazon Web Services environment. SecureSphere is the only enterprise-
Imperva includes the
class data protection and compliance solution available for AWS. Running natively
capability to look at the in the AWS, the BYOL version of SecureSphere leverages the same market-leading
capabilities as the on premises version.
environment and match
SecureSphere provides protection for databases deployed in the Microsoft Azure
it to known vulnerabilities cloud environment using the standard SecureSphere Database Agents.
providing a clear picture of
Assessment and virtual patching of database vulnerabilities
exactly what data is at risk
With the enterprise data being stored around the world in a variety of databases,
each at a potentially different release and patch level, it is imperative to have a
simplified way to seek out known vulnerabilities. Imperva includes the capability
to look at the environment and match it to known vulnerabilities, providing a clear
picture of exactly what data is at risk. SecureSphere virtual patching blocks attempts
to exploit specific known, but unpatched vulnerabilities. Virtual patching helps
minimizes the window of exposure, and drastically reduces the risk of a data breach
while testing and deploying database patches.
The new Imperva RiskSense Vulnerability Manager enables efficient workflow
management and mitigation of database vulnerabilities discovered using the
Imperva Discovery and Assessment Server (DAS).
Rapid time-to-value
The flexible SecureSphere architecture enables growth without disruption to the
existing environment, and allows businesses to do more with less. Imperva brings
predictable enterprise scalability to the table. A Fortune 500 company switched to
Imperva because they were unable to plan or budget confidently for the future with
their existing solution. With Imperva, the company was not only able to significantly
reduce the monitoring footprint and operational costs, but they were also able to
plan and budget accurately for their future growth.
© 2018, Imperva, Inc. All rights reserved. Imperva, the Imperva logo, SecureSphere, Incapsula and Skyfence are 7
trademarks of Imperva, Inc. and its subsidiaries. All other brand or product names are trademarks or registered
trademarks of their respective holders. 26-04-2018-1.1LA
imperva.com