Imperva SecureSphere Database Security Reviews

4.2 out of 5 stars
 (14)
Database security report from it central station 2017 12 24 thumbnail
Find out what your peers are saying about Imperva, IBM, Oracle and others in Database Security.
246,941 professionals have used our research since 2012.
Database security report from it central station 2017 12 24 thumbnail
Find out what your peers are saying about Imperva, IBM, Oracle and others in Database Security.
246,941 professionals have used our research since 2012.

User Assessments By Topic About Imperva SecureSphere Database Security

WAF is a great security layer to protect an organization from a wide spectrum of application attacks residing in OSI layer 7. The Imperva device relies on signature-based policies, as well as on a web correlation engine. In addition, the packet inspection can be enhanced with the aid of stream signature policies, which are policy items focused on the stream rather than the HTTP/HTTPS protocol. Imperva can easily match a web user to the requests launched from his client. While the default policy subset is very rich and covers different regulations (e.g., PCI, SOX), there is always an option to create custom policies addressing specific needs. Security alerts are comprehensive of all the necessary details for the analysis, such as connection details, signature triggered, alert type (e.g., Protocol, Profile), severity and followed action (e.g., syslog forward, IP monitoring). DAM also provides great value to audits and again, the data monitoring policies by default are very rich. If you don't know exactly what kind of data you store in-house, SecureSphere allows you to actively scan and classify your information, automatically providing you detailed status of the data, which can be further reviewed and finalised by analysts or DBAs. This is also valid for user rights on the data, understanding the level of privileges granted to users and suggesting countermeasures in detailed aggregated charts and reports. Once under monitoring, the data can be reviewed with an intuitive interface that allows the analyst to drill down, quickly narrowing the scope in a few clicks and focusing the attention only on the relevant queries. Once the pattern is identified, it is even possible to quickly report a detailed status of the findings, as well as generate a report template for future uses. This is on the hot data, what we have available in the management database. The time span can be increased indeterminately with a good retention configuration, combined with a SAN that stores the cold data, partitioned in daily slices and ready to be loaded into a separate database space for archives. This is brilliant if you think about scalability, for you can obtain a very big archive while preserving system resources and performance. However, to get this configuration, in-depth tuning is needed for several weeks in order to get all relevant metrics (e.g. data stored per day, data spikes, backup speed, link transfer capacity, etc.) and adopt the appropriate customizations. Audit data can also be correlated with application users by obtaining a detailed match of the database queries executed according to a particular web user’s HTTP requests. The FAM module allows organizations to continuously audit storages and network shares and keep a detailed record of every file operation across the company. Scans are available also in this context, providing user rights as well as access to the monitored files. A data classification is also possible with the FAM. All of Imperva’s features are extremely powerful, while a certain degree of knowledge is required to have a solid understanding of the product.

Imperva SecureSphere Database Security Consultants


Request a call with one of our top consultants and experts in Imperva SecureSphere Database Security. (Add me to this list.)
9e223545 7a7f 404d b59a d11569013a8a avatar?1438002727
3,529
TOP REVIEWERTOP 5
Säkerhetschef / Säkerhetsskyddschef / Security Manager
I am a ㊙️ Security guy and have titles like Security Officer, Security Manager, Säkerhetschef and Säkerhetsskyddschef. These are only titles and not limitations. My knowledge of Management, IT, Processes and people are broad and i love to do many things and help people wherever I go. The... more>>
Giacomo rosapepe li?1414337700
1,030
Senior IT Security Consultant
Reviewed Imperva SecureSphere Database Security: It relies on signature-based policies, as well as on...

What is Imperva SecureSphere Database Security?

Imperva SecureSphere Database Security:

  • Audits all access to sensitive data.
  • Alerts or blocks database attacks and unauthorized activities, in real time.
  • Detects and virtually patches database vulnerabilities.
  • Identifies excessive user rights and dormant users, and enables a complete rights review cycle.
  • Accelerates incident response and forensics investigations with advanced analytics.
Imperva SecureSphere Database Security customers

BlueCross BlueShield, eHarmony, EMF Broadcasting, GE Healthcare, Metro Bank, The Motley Fool, Siemens


Sign Up with Email