Big Data Security
Overview:
Unequaled adaptability and efficiency
With Imperva SecureSphere, you don’t have to worry about “agent versus network” deployment choices. Competing solutions force you to choose between the two. However, IT environments often require both options because of network or server constraints. SecureSphere offers non-intrusive network monitoring appliances, lightweight agents, or a hybrid mix of the two. SecureSphere dramatically reduces the hidden hardware and software costs associated with competing products and built-in auditing tools because SecureSphere agents are highly efficient and easy to deploy and manage.
Imperva SecureSphere Agent for Big Data is the industry solution for Big Data. Imperva best practice for Big Data helps you complete your audits faster with fewer violations. Big Data deployments are difficult for legacy solutions to protect because of the security challenges associated with the highly distributed architectures. Most Big Data auditing solutions were not built to scale with the high volume, velocity and variety of sensitive data stored within Big Data environments. This is where the uniquely scalable and cost-efficient SecureSphere can help you efficiently demonstrate protection and compliance through automated processes, audit analysis, and customizable reports across Big Data deployments. In addition, SecureSphere Agent for Big Data accelerates security and compliance incident response and forensic investigation with centralized management and advanced drill-through analytics.
SecureSphere Agent for Big Data is an integral part of the unique Imperva cyber security vision of protecting applications, as well as data across all repositories, including structured, semi-structured, unstructured, and cloud. Unified policies can be applied across different data repositories, with a common easy-to-use interface.
Features:
Best in Class Protection and Audit
- Monitor all types of data stores: Big Data, Data Warehouses, Files, RDBMS, and SharePoint
- Dual channel monitoring for compliance and security purposes
- Monitor local server access
- Fraud identification
- Data leak identification
- Permanently collect and log only activities needed for governance and compliance
- Optimized data collection
- Centralized management and administration
- Automate deployment and configuration updates
- Regular in-service updates
- Backward compatibility
Enterprise Scale Benefits
- Protect more, audit more: consistent policy enforcement across multiple data store types
- Faster deployment: centralized management with API for automation
- Predictable planning: consistent database/gateway sizing
- Better performance: unmatched scalability through highly efficient monitoring and audit logging technology
- Less down time: in-service updates and upgrades reduce the number of restarts and audit gaps
- Enterprise friendly: backward compatibility eliminates requirement for “mass upgrade”
- Reduced time and resource requirements: automation and built in subject matter expertise, reduce requirements for DBA’s, professional services, and manual or custom built processes
Coverage Across Critical Systems
- SecureSphere supports leading distributions from Cloudera, Hortonworks, IBM BigInsights and MongoDB. With service support for NoSQL; Hadoop Hive, HDFS and Hbase with more agents being added, check with your Imperva representative for a complete list
- Monitor all major databases on Unix, Linux and Windows systems
- Specialized agents are available for monitoring DB2 and IMS on z/OS mainframes and for DB2/400 on iSeries platforms
- File Coverage: local or global mode, Unix, Linux, NAS, and Windows systems
- SharePoint content and database
Database Firewall and Database Activity Monitor Specifications:
Specification | Description |
---|---|
Supported Database Platforms |
|
Deployment Modes |
|
Performance Overhead |
|
Centralized Management |
|
Database Audit |
|
Privileged Activities |
|
Access to Sensitive |
|
Security Exceptions |
|
Data Modification |
|
Stored Procedures |
|
Triggers |
|
Tamper-Proof Audit Trail |
|
Fraud Identification |
|
Data Leak Identification |
|
Database Security |
|
Platform Security |
|
Network Security |
|
Policy Updates |
|
Real-Time Event Management and Report distribution |
|
Server Discovery |
|
Data Discovery and Classification |
|
User Rights Management (add-on option) |
|
Vulnerability Assessment |
|
Documentation:
Download the SecureSphere Data Security Datasheet (PDF).