Enhance the value of your existing technology investments
Imperva DSF’s open architecture enables new partner-builder innovation. In many cases, DSF provides customers with additional value from their current technology investments while allowing partners to deliver improved capabilities and simplify their orchestration.
- Integrates with your existing security and IT ecosystem
- Combine technologies for the highest resolution of data risk exposure
- Automate actions through thousands of playbooks
- Speed investigation, streamline, and automate decision processes
Turn data findings into efficient business processes
Reduce days of busy work into minutes with orchestration and automation
- Combines event-level data from all monitored systems plus metadata for context
- Automate any number of manual processes such as risk reporting and mitigation workflows, entitlement review, change reconciliation requests, and more
Imperva DSF can optimize your Splunk installation
Many enterprises use Splunk as the primary repository for native database logging and data activity monitoring (DAM) tools.
These logs can represent a significant amount of the data indexed in Splunk. Storing these logs enables adherence to compliance regulations but is often otherwise unused due to the lack of security context.
Organizations implement Imperva Data Security Fabric (DSF) as a database log pre-processor to Splunk to increase the value of raw logs. Imperva DSF filters, compresses, stores, and indexes the raw event data, making it available in Splunk via virtual indices. Analytics within Imperva DSF bridge user identity, data sensitivity, and attack detection, meaning that threat alerts include rich technical context and detection timelines. Security analysts have bidirectional access for interactive data exploration.
This approach enables organizations to increase the security value of their Splunk deployment and markedly reduces Splunk ingestion and development costs.
The Imperva DSF “any database, any location, any scale” design ensures compatibility with your current and future architectures. Bi-directional integration lets Splunk users access all raw data stored in Imperva using the Splunk UI.
How it works
Native logs from on-premises and cloud data repositories are forwarded to Imperva Data Security Fabric for pre-processing. Imperva enriches the information with context into users, access, and threats. Only the intelligence extracted from raw data is forwarded to Splunk, allowing Splunk to remain effective at incidence response and enterprise-level event correlation.
Integrated single sign-on support
Imperva DSF can integrate with any single sign-on (SSO) identity provider that implements Security Assertion Markup Language (SAML). When integrating DSF with SAML SSO identity providers, you can import existing users from the identity provider or create users in DSF.
Extend your CyberArk™ deployment for authentication within Imperva DSF
CyberArk offers an extensible privilege access management platform, protecting identities and critical assets by enabling Zero Trust and enforcing least privilege. Imperva enables you to extend your CyberArk deployment to be used as a secret manager within DSF, allowing you to use it to authenticate against your data stores.
Imperva Data Security Fabric (DSF) helps IBM™ Guardium™ customers extend data activity monitoring to their entire data estate, delivering total and unified visibility
Imperva Data Security Fabric protects your Guardium investment by supporting more data types, cloud service platforms, and cloud data lakes, extending coverage to more data repositories, reducing manual efforts & operations costs, and improving the effectiveness and efficiency of your governance & security programs.
Imperva Data Security Fabric protects all data types with a single system that delivers multiple business capabilities
Imperva Data Security Fabric is the first data-centric solution that enables your organization's security and compliance teams to quickly and easily secure sensitive data, no matter where it resides, with an integrated, proactive approach to visibility and predictive analytics.
Imperva Data Security Fabric is composed of cutting-edge orchestrated technical capabilities that work in unison to protect your data across your entire organization:
Data Discovery & Classification
Discover ungoverned data, classify all data, and assess vulnerabilities.
Learn moreData Activity Monitoring
Gain complete visibility and ensure compliance with continuous monitoring, auditing and analyzing all data store and data types.
Learn moreData Retention & Archive
Meet any data archiving requirement using the most cost efficient storage technology available.
Learn moreData Risk Management
Detect and report non-compliant, risky, or malicious data access behavior across all of your data repositories enterprise-wide to accelerate remediation.
Learn moreEcosystem Integrations
Enhance the value of your existing technology investments - for both incident context and additional data capabilities.
Learn moreData Encryption & Tokenization
Protect critical data with encryption, key management, and tokenization wherever it resides.
Learn moreStatic Data Masking
Modify sensitive data so it is of no value to unauthorized users while still being usable by your systems.
Learn moreAutomated Workflows & Playbooks
Achieve higher scale and increase DevOps efficiency through the use of automated workflows delivered through trusted repositories.
Learn moreSensitive Data Management
Identify, locate, classify, and secure sensitive data across various data stores located either on-premises or in the cloud.
Learn more