Imperva SecureSphere Database Security Benefits
Using Imperva SecureSphere Database Security has improved our organization by providing us with safety from vulnerabilities. We have better rules and rights management for our sensitive database.
View full review »DC
Darren Chaker
Operator at Halliburton
Imperva SecureSphere allows people to secure data, while seamlessly allowing the distribution of that data in an effortless manner.
View full review »AJ
AdesolaJolaoso
Network Engineer at CBN
In terms of regulatory compliance, one of the key requirements is to ensure that our core databases are monitored. SecureSphere allows us to generate details to prove that we're compliant with all requirements.
View full review »Buyer's Guide
Imperva SecureSphere Database Security
March 2024
Learn what your peers think about Imperva SecureSphere Database Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
767,847 professionals have used our research since 2012.
FB
FredBbaale
Senior Solutions Architect at eLAAB Limited
The ability to automate reports simplifies what an organization has to do. Even the in-built reports are quite useful. But customization can make the product experience very specific and efficient.
But besides that, clients like to compare industry benchmarks and establish best practices. Report analysis can help with that.
View full review »DA
Danish Ansari
Senior IT Security Specialist at National Water Company
It addresses our needs and our clients' needs for Oracle DB reporting.
View full review »AC
Ajay-Chattwal
Project Manager at a energy/utilities company with 10,001+ employees
It helps us look into who's doing what, particularly on databases related to critical applications. That's the way we see it as useful. We've been using it for four or five years now, and it has been bringing in the value that we expected it to.
View full review »Before SecureSphere was used, the native auditing tools were used, and now there is a segregation of duties when managing audit data from DBAs and DBS teams. It is a much more secure way to have audit data from databases and to monitor actions of privileged accounts.
View full review »Some of the ways in which this product has helped our organization are:
- All the databases are being monitored.
- All the compliance requirements can be taken care of through a console.
- The daily and weekly reports are helpful in understanding the environment.
It provides a more granular monitoring of database activity at the column and row level as opposed to high level database management system logs.
View full review »AA
Arash Azari Samani
Data Center Network Expert at TOSAN
This solution has helped secure our Internet-based services, protecting us against DoS and other types of web-based attacks.
View full review »The solution has improved our organization as follows:
- Better agent performance compared to v9.5
- Gateways are much more stable
- Gateway cluster improves resource utilization and provides better resiliency
- Offers the option to manage cluster capacity without touching the agent configuration
It hasn't really improved the way we function, but it has allowed us to meet several audit issues that were outstanding for many years. We tried another product, but we found it did not meet our requirements.
View full review »The solution helps us with monitoring the databases, servers, and activities.
View full review »RH
reviewer1729983
Senior Database Administrator at a financial services firm with 1,001-5,000 employees
It serves as a way and means to see if any unauthorized person is trying to access the database. It helps to implement specific rules to ensure that only authenticated people have access to the database.
View full review »SB
Sanjeet Kumar Bhuyan
Security Consultant and Cybersecurity Support at a tech services company with 51-200 employees
As we are very sensitive to financial impacts, this product provides great protection for our organization.
It enabled us to monitor the most critical DBA activities, and most critically helped us identify default accounts and passwords. Additionally, with this solution we were able to block an external attack on our Oracle DB.
View full review »Imperva helps you comply with data regulations such as SOX or PCI. It helps SOC analysts to enlarge the scope analysis, significantly providing great procedures to drill down into the audit or a customizable enrichment fed by several types of input, e.g. Active Directory or other external platforms, and even a layer 7 inspection. When fully integrated, the application user requests are bound with the queries executed, giving a comprehensive picture of how your web application interacts with the data layer highlighting all possible security flaws in the data management, code bugs or server misconfigurations. All this logical data collection is effectively arranged into detailed profiles from where it is possible to spot the unusual deviations or to create advanced conditions to trigger upon this baseline. Think about access to PCI data from users different to the ones allowed, such as DBAs, only from a certain subnet, let's say the external network, out of the business hours, like nights or weekends. This is one possibility of what Imperva can achieve in your organization to protect the data from unauthorised users.
View full review »Database auditing has become simple and easy, releasing storage previously used for native database audit processes. We found new patterns of database users' behaviour and corrected some user authorisations.
View full review »First of all, the product is useful for securing the websites of our company, which is basically preserving our brand value in the market.
Secondly, the product is very much competent with evolving threat vectors in cyberspace. Hence, this piece of security requires very few fine tuning efforts be put in place; everything falls right into its exact place.
View full review »It was instrumental in scanning a large inventory of databases to identify sensitive data. Using Imperva Assessment scans, we were able to identify SHR, PII & confidential data sources in a large inventory of database systems.
This helped us classify our large inventory and apply additional security controls based on the data classification output.
View full review »If the purpose is compliance or auditing, ex PCI-DSS you need a system like this to pass part of the compliance. As I help customers with compliance, this is a great tool to make it all "simple" and the report part makes the lives easier for the users/auditors.
If it's used for security, this, or systems like this, are the last line of defence, and you will prevent incursions, or at least know what happened, and what was stolen.
If it is to be used to monitor availability, you will only know the real ROI if you are a victim of a large attack, then you can pat yourself on the back and say "Yay! We prevented that". This cannot be achieved solely on the Imperva system and you need the full suite of WAF.
View full review »This product has helped us to protect the environment against malicious activities. We have detected some security violations and have taken actions against them.
View full review »This solution provides analytics using rules in the application. For example, it can report who most often uses certain queries.
View full review »SecureSphere covers the legal obligations for Turkish banks. According to Turkish banking regulations, database activities (especially admins' activities) should be monitored and alerted.
View full review »This product has limited attacks to the core tax collection application. It also provides audit logs for changes to the database and gives user account details.
View full review »RB
Devosof335
Software Developer at a university with 1,001-5,000 employees
One example of how this has improved my organization is with respect to security. We previously had a default passcode in place, and this is discouraged by our password policy. I was able to find this problem and solve it.
View full review »I can drill down/troubleshoot errors much quicker.
View full review »We are able to prevent and protect external and internal threats by using Imperva’s complete product line.
View full review »- Easy monitoring
- Protection of internet banking applications
I was working for Crescendo International, which is a small company in Romania. My primary role was in network solution integration. I was the only person in the country with experience of three deployments of Imperva products at two major banks.
View full review »We have seen our security risk decreased due to customization and meeting all the security needs for every application.
View full review »Buyer's Guide
Imperva SecureSphere Database Security
March 2024
Learn what your peers think about Imperva SecureSphere Database Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
767,847 professionals have used our research since 2012.