1 / 15

The Leader in Application Data Security and Compliance

The Leader in Application Data Security and Compliance. Thomas Drews, SE CEEU. Security and Compliance Requirements. Full Visibility Who is accessing your data? Who has accessed your data? Granular Controls Who is attacking your data and how? Is your data leaking outside the organization?

jorn
Download Presentation

The Leader in Application Data Security and Compliance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Leader in Application Data Security and Compliance Thomas Drews, SE CEEU

  2. Security and Compliance Requirements • Full Visibility • Who is accessing your data? • Who has accessed your data? • Granular Controls • Who is attacking your data and how? • Is your data leaking outside the organization? • How do you protect your data? Imperva delivers the industry’s most robust and widely deployed solution for addressing the entire application data security and compliance lifecycle. - CONFIDENTIAL -

  3. Thin Client 3 Tier App Thick Client 2 Tier App Application Interface DBA Data SQL Applications Web/Web services Browser Monitoring & Protecting Data

  4. Imperva Overview • Founded in 2002 • The leader in Application Data Security and Compliance • Global company with int’l revenue consisting of 40%+ • North American HQ in California; International HQ in Israel • Local presence in all major markets (EMEA, APAC, Japan) • Customers in 30 countries • Strong global network of channel partners • 600+ customers and over 4500 organizations protected • Shlomo Kramer, CEO & President • One of 3 founders of Check Point - CONFIDENTIAL -

  5. Imperva Wins eWEEKExcellenceAward “Imperva SecureSphere’s … in-line protection for both Web applications and communications with back-end databases is simply unmatched.” Editor’s Choice for Database Extrusion Prevention “Right from the start, the Imperva SecureSphere Database Security Gateway impressed us with its plethora of features…dynamic user profiling is almost reason enough to choose it. SecureSphere Dominates Awards Editor’s Choice for Web Application Firewalls “From beginning to end, Imperva SecureSphere is our kind of WAF.” Imperva Wins2007 Readers’ Choice Award from Security Magazine “SecureSphere scored well in every criteria: granularity of access controls and integration with existing infrastructure, scalability and management…” “Imperva's SecureSphere Database Security Gateway is a win on both counts. It did a fine job learning our user behavior, and numerous signatures let it handily block known attacks.” - CONFIDENTIAL -

  6. Assess • Test database configuration according • to standards • Evaluate inherent risks • Discover who uses the data • and what do they do? • Set Policies/Controls • Set policies automatically and • quickly • Keep up with changes • Configurable policies and controls • based on situation • Monitor and Enforce • Ensure separation of duties • Ensure end user accountability • Capture full details • Provide security at all layers • Alert/block in real-time • Measure • Built in compliance reports • Roll-up & drill down of data • Security event analysis Achieving Data Security & Compliance IMPERVA ADDRESSES THE ENTIRE LIFE CYCLE - CONFIDENTIAL -

  7. „Postive“ Security Protection from unknown threats and vulnerabilities PROFILING of Applications Protection Approaches (WAF) • „Negative“ Security • Protection from known threats and vulnerabilities • Protocol Validation • Signatures

  8. Efficient Deployment and OperationsNo Impact to IT, Easily Managed, Low TCO

  9. Imperva SecureSphere Product Line Database Monitor Agent Management Server (MX) Database ADC Insights Database Security Gateway Web Application Firewall Web Database Monitoring Gateway Internet 14 - CONFIDENTIAL -

  10. Flexible Deployment Options • Transparent Inline Bridge • Supports full enforcement • High performance, low latency • Fail-open interfaces • Transparent & Reverse Proxy • High performance for content modification • URL rewriting, cookie signing, SSL termination • Non-inline Deployment • Primarily for monitoring, zero network latency Data Center SecureSphere Switch SecureSphere • Reverse Proxy Deployment • Inline Bridge Deployment • Non-Inline Deployment

  11. Unified, Scalable Management • Centralized administration • Manages all devices from a single console • Integrated auditing and reporting • Easy deployment of new appliances • Appliances auto-configured by MX server • Task-oriented workflows • Hierarchical policy management • Granular role-based access control • Web browser interface BrowserInterface MX Management Server SecureSphere Appliances

  12. Introducing SecureSphere • Only complete solution for enterprise data that includes: • Data activity monitoring • Real-time data protection • Full visibility and granular control of data usage • From end user through application and into database • Full stack protection • Unmatched ease-of-use and ease-of-deployment

  13. SecureSphere Product Line

  14. Demo Imperva, Inc. 950 Tower Lane, Suite 1550, Foster City, CA 94404   Sales: +1-866-926-4678 www.imperva.com

  15. Demo-Setup SuperVeda (IIS + MS-SQL) SecureSphere (single-box) mgmt DB-Agent data Browser SQL-Tools

More Related