Data Protection and Compliance
Overview:
Enterprise Scale Data Security and Compliance
SecureSphere data protection solutions address all aspects of database security and compliance with database auditing and real-time protection that will not impact performance or availability. SecureSphere scales to support the largest database and Big Data installations. By automating security and compliance, it is not surprising that thousands of organizations choose Imperva SecureSphere for data to safeguard their most valuable assets.
SecureSphere for data
- Discover and help classify sensitive databases
- Audit all access to sensitive data across all data stores
- Identify excessive user rights and dormant users, and enable a complete rights review cycle
- Protect RDBMS, data warehouses, Big Data platforms, and mainframe databases
- Alert, quarantine, and block database attacks and unauthorized activities in real time
- Accelerate incident response and forensics investigations with advanced analytics
- Match your evolving IT needs for high availability clustering and Amazon Web Services (AWS) cloud deployment
- Provide rapid time-to-value and predictable costs without negatively impacting database performance
Features:
Flexible Enterprise Ready Deployment
Imperva takes a comprehensive view of the enterprise with a centralized management console capable of providing command and control at a global level. The top-level management console enables the rapid deployment of global policies and automation of tasks such as data classification, thereby speeding implementation time.
Imperva also recognizes the value of IT provisioning, providing API sets to facilitate seamless software distribution, configuration updates, policy distribution and data discovery. Deployment and configuration automation is a primary factor in time-to-value. As an example, an Imperva customer was able to deploy to over 69,000 databases in the span of just a few months using these automation tools.
Imperva goes beyond the typical deployment scenario where agents are required on all database servers; SecureSphere supports multiple deployment methods, including a local agent, a network transparent bridge option and a non-inline sniffer mode. By using a combination of deployment methods, the enterprise can meet a wide variety of needs without being locked into a one-size-fits-all model.
Discover Hidden Risks and Costs
SecureSphere Database Assessment identifies database vulnerabilities and measures compliance with industry standards and best practices. Combined with sensitive data discovery and data classification, organizations can accurately scope security and compliance projects and prioritize risk mitigation efforts.
Monitor all Traffic for Protection and Compliance
Even with a high volume of database traffic, SecureSphere simultaneously monitors all traffic for security policy violations and compliance policy purposes. The highly efficient monitoring for separate purposes allows companies to address both security and compliance requirements with a single unified solution.
SecureSphere analyzes all database activity in real-time, providing organizations with a proactive security enforcement layer and detailed audit trail that shows the “who, what, when, where, and how” of each transaction. SecureSphere audits privileged users who directly access the database server, as well as users accessing the database through a browser, mobile, or desktop-based application.
Manage User Access
Virtually every regulation has requirements to manage user rights to sensitive data. Complying with these requirements is one of the most difficult tasks for enterprises to manually perform across large data sets. SecureSphere automatically aggregates user rights across heterogeneous data stores and helps establish an automated access rights review process to eliminate excessive user rights. It facilitates a routine demonstration of compliance with regulations such as SOX and PCI DSS. The automation of these mundane, but critical tasks, lowers labor costs and reduces the risk of error or reporting gaps.
Streamline Data Compliance
Unlike solutions that require DBA involvement and reliance on expensive professional services, SecureSphere provides the necessary management and centralization capabilities to manage thousands of databases, Big Data nodes, and file repositories. Pre-defined policies, remediation workflows, and hundreds of reports markedly reduce the need for SQL scripts and compliance matter expertise. Elimination of the need for ongoing DBA involvement ensures compliance with the separation of duties requirement. By utilizing the out-of-the-box process APIs, management console, workflows, reports and analysis tools existing personnel can deploy and manage the system.
discover and Manage Database Vulnerabilities
Malicious insiders and hackers can easily steal data by exploiting unpatched systems, accessing accounts with default passwords, and leveraging administrative rights. SecureSphere helps you prioritize and remediate vulnerabilities with assessments for database platforms and configurations. The assessments are kept up-to-date with the latest research from the Imperva Application Defense Center (ADC).
Dynamic Profiling - Spot and Stop Abnormal Behavior
SecureSphere identifies normal user access patterns to data using Imperva patented Dynamic Learning Method (DLM) and Adaptive Normal Behavior Profile (NBP) technology. It establishes a baseline of all user activity including DML, DDL, DCL, read-only activity (SELECTs), and usage of stored procedures. SecureSphere detects material variances when users perform unexpected queries.
Multi-action alerts, temporary quarantines and if appropriate blocking of unauthorized activities can be used to protect data without the need to disable the user’s account avoiding potential disruptions in critical business processes. Automated remediation workflows drive multi-action security alerts that can send information to SPLUNK, SIEM, ticketing, or other third-party solutions to streamline business processes.
Protect in Real-Time
Stopping attacks in real-time is the only effective way to prevent hackers from getting to your data. SecureSphere monitors all traffic for security policy violations looking for attacks on the protocol and OS level, as well as unauthorized SQL activity. The highly efficient monitoring can quarantine activity pending user rights verification or block the activity – without disrupting business by disabling the entire account.
Blocking is available both at the database agent and network levels enabling the fine tuning of the security profile to balance the need for absolute security with the need for maximum performance.
Stop Advanced Targeted Attacks
To truly enhance proactive security, deploy Imperva SecureSphere Web Application Firewall, which utilizes the same architecture and management platform as SecureSphere data solutions. Additional integrations with malware protection, SIEM, and other specialized security systems help organizations align processes and close security gaps.
Discover and Manage Database Vulnerabilities
Typically, months elapse between when a database vulnerability is discovered and when it can be patched. SecureSphere Database Assessment and Database Firewall work together to identify vulnerabilities and automatically build policies that thwart them.
SecureSphere Database Firewall virtual patching provides protection for specifically known, but unpatched vulnerabilities. The assessments are kept up-to-date with the latest research from Imperva Application Defense Center (ADC).
Database Firewall and Database Activity Monitor Specifications:
Specification | Description |
---|---|
Supported Database Platforms |
|
Deployment Modes |
|
Performance Overhead |
|
Centralized Management |
|
Database Audit |
|
Privileged Activities |
|
Access to Sensitive |
|
Security Exceptions |
|
Data Modification |
|
Stored Procedures |
|
Triggers |
|
Tamper-Proof Audit Trail |
|
Fraud Identification |
|
Data Leak Identification |
|
Database Security |
|
Platform Security |
|
Network Security |
|
Policy Updates |
|
Real-Time Event Management and Report distribution |
|
Server Discovery |
|
Data Discovery and Classification |
|
User Rights Management (add-on option) |
|
Vulnerability Assessment |
|
Documentation:
Download the SecureSphere Data Security Datasheet (PDF).