- 14 July 2010 11:22
Imperva introduces File Security family to help mitigate insider threats
Sydney, July 14, 2010 - Imperva, the leader in data security, announced a File Security product line, the latest addition to the company’s SecureSphere Data Security Suite.
SecureSphere File Firewall prevents unauthorised access to unstructured data residing on file servers, network attached storage (NAS). SecureSphere File Activity Monitoring (FAM) allows enterprises to monitor access to sensitive file data, establish an audit trail for compliance and reduce data access rights to a business need-to-know level. With this product expansion, Imperva’s data security suite helps enterprises protect not only web applications and databases but file systems as well.
“Critical business data exists everywhere: databases, applications and, most commonly, file servers,” said Imperva CTO Amichai Shulman. “Valuable business documents, intellectual property such as software source code, finance spreadsheets, and many other types of data are stored in these files. Yet, businesses today still lack the appropriate tools needed to monitor and secure sensitive file data within their organisation. And securing file systems is essential if companies wish to comply successfully with PCI, SOX or other data security mandates.”
According to research firm IDC, 80 per cent of all business data is file data, which will continue to grow at 60 per cent annually. At the same time, many government and private industry mandates require companies to track and monitor access to sensitive data regardless of where it resides. Imperva’s File Security products allow businesses to:
• Analyse who has access to, who owns, and who has accessed sensitive data. • Identify where access is ‘excessive’ and can be reduced. • Monitor access and alert and/or block access that violates business policy.
Additionally, key capabilities of the new product line include:
• User rights management for files: Companies can aggregate, review, approve or reject rights to sensitive files/folders; quickly identify suspect excessive and dormant rights. • Real-time file access auditing, security, integrity: Companies can audit, alert, and block access to sensitive files/folders.
Gartner analyst Neil MacDonald said: “Activity monitoring is an important security capability for any organisation. By identifying and detailing unusual activity when accessing information, insider threats can be mitigated and advanced threats that have bypassed our traditional security controls can be detected. Additionally, activity monitoring builds strong forensics capabilities while bolstering compliance programs to meet growing regulatory mandates.”
To view a short video and demo overview of the new product, click here: http://www.imperva.com/resources/videos.asp?t=FAM
About Imperva Imperva is the global leader in data security. With more than 1,300 direct customers and 25,000 cloud customers, Imperva’s customers include leading enterprises, government organizations, and managed service providers who rely on Imperva to prevent sensitive data theft from hackers and insiders. The award-winning Imperva SecureSphere is the only solution that delivers full activity monitoring for databases, applications and file systems. For more information, visit www.imperva.com, follow us on Twitter or visit our blog.
Media queries Grenadine Lau Imperva Phone: +65.6749 4482 Mobile: +65.9666 1886 Email: Grenadine.Lau@Imperva.com
David Frost PR Deadlines Pty Ltd, for Imperva Phone: +61.2.4341 5021 Mobile: +61 (0) 408 408 210 Email: firstname.lastname@example.org
Sign up now »
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTR&D EngineerSA
- FTQuality ManagerSA
- FTSenior Python DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTLead Software EngineerSA
- FTOS Web Applications DeveloperNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTechnical Business AnalystNSW
Integrated Computing Platforms, such as EMC VSPEX RAs, provide a solution by eliminating the time (and cost) of designing, testing, and engineering integrated environments with components built independently of one ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Four dissenters to spur next year's security debates
- AusCERT 2013: Kill the password, says Mozilla
- AusCERT 2013: Unmanaged, unknown privileged logins opening the door for APTs: Cyber-Ark
- AusCERT 2013: Companies unaware of IPv6 security risk even if they’re not using it
- In pictures: AusCERT 2013 roundup
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia