Media Contact:
Clinton Karr
(415) 432-2441
Clinton.Karr@lewispulse.com
Imperva Report Inculcates Organizations with the Psychological, Legal and Technological Tactics to Prevent Insider Threats
Redwood Shores, Calif., October 24, 2012 –Imperva, Inc. (NYSE:IMPV) a pioneer and leader of a new category of business security solutions for critical applications and high-value data in the data center, today announced “An Inside Track on Insider Threats,” a report that examines that the psychological, legal and technological tactics employed by leading organizations to mitigate insider threats, a class of enterprise risk perpetuated by a trusted person who has access to intellectual property or data, but uses that information outside of acceptable business requirements
The risk of insider threats has entered mainstream consciousness with Wikileaks damaging the sensitivity of confidential information and a rash of corporate espionage targeting trade secrets. Even trusted employees may act on impulses to misappropriate corporate intellectual property. In 2010, an Imperva survey revealed 70 percent of employees plan to take copies of files and data when they leave their organization. According to the Federal Bureau of Investigation, the economic impact of insider threats costs the American economy more than $13 billion per year.
“The digital information age offers unfettered access for any actor trusted enough to enter our enterprise walls,” said Amichai Shulman, co-founder and CTO, Imperva. “For most organizations, insider threats have moved beyond risk into reality; however, many threat vectors can be protected against with a measured approach to business security.”
The report catalogs information gained by analyzing the best practices and incident response tactics of the 40 organizations most effective at preventing insider threats from a surveyed sample of more than 1,000. These best practices include:
- Making a case for business security: Imperva found that the best prepared organizations spend time with key stakeholders to identify risk tolerance and “worst case” scenarios in order to build effective security policies, often related to greater compliance initiatives.
- Organizing for security: Imperva provides a framework to organize IT security, IT operations, HR and legal departments to implement security processes into business workflow.
- Education: By instilling education programs, organizations can eliminate much of the risk that comes from employees that don’t know any better.
- Control access with checks and balances: The report suggests compensating controls should be implemented to protect against administrators and super users. All employee access to sensitive information should be monitored and aberrant information should be automatically detected and reported.
To download the report, please visit https://www.imperva.com/lg/lgw.asp?pid=477.
About Imperva
Imperva is a pioneer and leader of a new category of business security solutions for critical applications and high-value data in the data center. Imperva’s award-winning solutions protect against data theft, insider abuse, and fraud while streamlining regulatory compliance by monitoring and controlling data usage and business transactions across the data center, from storage in a database or on a file server to consumption through applications. With over 1,900 end-user customers in more than 60 countries and thousands of organizations protected through cloud-based deployments, securing your business with Imperva puts you in the company of the world’s leading organizations. For more information, visit www.imperva.com, follow us on Twitter or visit our blog. We’re hiring! Help us protect the world’s data: http://www.imperva.com/go/jobs
Forward Looking Statements
This news release contains forward-looking statements, including without limitation those regarding Imperva’s expectation of receipt of certification under the Common Criteria for Information Technology Evaluation Framework in 2012. These forward-looking statements are subject to material risks and uncertainties that may cause actual results to differ substantially from expectations. You should consider important risk factors, which include: the risk that our products do not achieve certification under the Common Criteria for Information Technology Evaluation Framework; and other risks detailed under the caption “Risk Factors” in Imperva’s filings on the SEC’s website at http://www.sec.gov/. We undertake no obligation to update any of the forward-looking statements contained herein after the date of this release, whether as a result of new information, future events or otherwise.
© 2012 Imperva, Inc. All rights reserved. Imperva, the Imperva logo and SecureSphere are trademarks of Imperva, Inc.