Automatic data store profiles
Automatically examine application and database traffic to create a profile of baseline normal activity
Imperva Data Security Fabric (DSF) Data Activity Monitoring provides the robust compliance and security coverage necessary for protecting your data—with full visibility into data usage, vulnerabilities, and access rights
Imperva policies can be configured with predefined settings that allow you to easily maintain compliance with regulatory bodies such as Sarbanes Oxley (SOX), Payment Card Industry (PCI), the Health Insurance Portability and Accountability Act (HIPAA), and more.
Imperva DSF Data Activity Monitoring enables you to conduct data forensics, follow an audit trail, and ultimately understand the what, when, and how of questionable or problematic activity. Imperva filters and views enable you to select a specific policy, determine the time frame of data to be displayed, filter by various aspects such as operations, table groups, and types of operations, and then display the resulting data in easy-to-read graphical views.
Imperva Data Security Fabric uses the Common Vulnerability Scoring System (CVSS) to analyze the risk presented by the vulnerabilities discovered in your network and data and assign a Risk score. CVSS is “an open framework for communicating the characteristics and impact of IT vulnerabilities.” It is maintained by the National Institute of Standards and Technology as part of the Security Content Automation Protocol (SCAP) framework. Scoring vulnerabilities using CVSS provides an accurate model for measuring the risk inherent in discovered vulnerabilities and prioritizing them for mitigation. For more information about CVSS, see nvd.nist.gov/cvss.cfm
Monitoring is a key phase in Imperva Data Security Fabric’s (DSF) data management lifecycle. Imperva DSF is equipped with a friendly user interface that clearly displays monitoring event information in a central location. DSF Data Access Monitoring displays real-time information that includes system events, alerts, violations, blocked sources, gateway and agent status, system warnings, database auditing information, file server auditing information, archiving information, and more.
Monitoring events, alerts, and violations can take on many aspects. Depending on your specific implementation, there may be several types of users with varying roles and associated security policies. You can use the pre-configured severity ratings in Imperva DSF or customize your policies to fine-tune how events are interpreted to determine if an alert is a false positive, an attack, or something else.
Imperva Data Security Fabric (DSF) User Rights Management enables you to scan your data store locations for granted user rights and display various details regarding these rights – such as who granted them, who received them, objects to which rights have been granted, and more. It then enables you to perform an organized review of these rights to determine if they are appropriate, approve or reject the granting of these rights, or assign them to another for review – and produce reports on the entire process.
User Rights Management (URM) is a capability that will assess database access entitlements. It helps satisfy SOX or PCI provisions requiring data access to be granted only to individuals who “need to know.” It looks at information about the data type, sensitivity, and other monitored information about the organizational context of the user. URM maps users and privileges to all the database objects across all organization databases.
Imperva DSF enforces user rights management based on data type and user role. You can also see the last time the user logged in and the last time privileges were used. The result allows you to quickly identify dormant users or rights that need to be disabled.
Imperva Data Security Fabric is the first data-centric solution that enables your organization's security and compliance teams to quickly and easily secure sensitive data, no matter where it resides, with an integrated, proactive approach to visibility and predictive analytics.
Imperva Data Security Fabric is composed of cutting-edge orchestrated technical capabilities that work in unison to protect your data across your entire organization:
Discover ungoverned data, classify all data, and assess vulnerabilities.
Learn moreGain complete visibility and ensure compliance with continuous monitoring, auditing and analyzing all data store and data types.
Learn moreMeet any data archiving requirement using the most cost efficient storage technology available.
Learn moreDetect and report non-compliant, risky, or malicious data access behavior across all of your data repositories enterprise-wide to accelerate remediation.
Learn moreEnhance the value of your existing technology investments - for both incident context and additional data capabilities.
Learn moreProtect critical data with encryption, key management, and tokenization wherever it resides.
Learn moreModify sensitive data so it is of no value to unauthorized users while still being usable by your systems.
Learn moreAchieve higher scale and increase DevOps efficiency through the use of automated workflows delivered through trusted repositories.
Learn moreIdentify, locate, classify, and secure sensitive data across various data stores located either on-premises or in the cloud.
Learn more