- Experts challenge Skyhigh's patent for cloud-based encryption gateway
- New collision attacks against triple-DES, Blowfish break HTTPS sessions
- Facebook, Google, Twitter lax on terrorists’ misuse of their sites, say UK MPs
- Passwords stolen from Mail.Ru were old, the company says
- This Android botnet relies on Twitter for its commands
- 14 July 2010 11:22
Imperva introduces File Security family to help mitigate insider threats
Sydney, July 14, 2010 - Imperva, the leader in data security, announced a File Security product line, the latest addition to the company’s SecureSphere Data Security Suite.
SecureSphere File Firewall prevents unauthorised access to unstructured data residing on file servers, network attached storage (NAS). SecureSphere File Activity Monitoring (FAM) allows enterprises to monitor access to sensitive file data, establish an audit trail for compliance and reduce data access rights to a business need-to-know level. With this product expansion, Imperva’s data security suite helps enterprises protect not only web applications and databases but file systems as well.
“Critical business data exists everywhere: databases, applications and, most commonly, file servers,” said Imperva CTO Amichai Shulman. “Valuable business documents, intellectual property such as software source code, finance spreadsheets, and many other types of data are stored in these files. Yet, businesses today still lack the appropriate tools needed to monitor and secure sensitive file data within their organisation. And securing file systems is essential if companies wish to comply successfully with PCI, SOX or other data security mandates.”
According to research firm IDC, 80 per cent of all business data is file data, which will continue to grow at 60 per cent annually. At the same time, many government and private industry mandates require companies to track and monitor access to sensitive data regardless of where it resides. Imperva’s File Security products allow businesses to:
• Analyse who has access to, who owns, and who has accessed sensitive data. • Identify where access is ‘excessive’ and can be reduced. • Monitor access and alert and/or block access that violates business policy.
Additionally, key capabilities of the new product line include:
• User rights management for files: Companies can aggregate, review, approve or reject rights to sensitive files/folders; quickly identify suspect excessive and dormant rights. • Real-time file access auditing, security, integrity: Companies can audit, alert, and block access to sensitive files/folders.
Gartner analyst Neil MacDonald said: “Activity monitoring is an important security capability for any organisation. By identifying and detailing unusual activity when accessing information, insider threats can be mitigated and advanced threats that have bypassed our traditional security controls can be detected. Additionally, activity monitoring builds strong forensics capabilities while bolstering compliance programs to meet growing regulatory mandates.”
To view a short video and demo overview of the new product, click here: http://www.imperva.com/resources/videos.asp?t=FAM
About Imperva Imperva is the global leader in data security. With more than 1,300 direct customers and 25,000 cloud customers, Imperva’s customers include leading enterprises, government organizations, and managed service providers who rely on Imperva to prevent sensitive data theft from hackers and insiders. The award-winning Imperva SecureSphere is the only solution that delivers full activity monitoring for databases, applications and file systems. For more information, visit www.imperva.com, follow us on Twitter or visit our blog.
Media queries Grenadine Lau Imperva Phone: +65.6749 4482 Mobile: +65.9666 1886 Email: Grenadine.Lau@Imperva.com
David Frost PR Deadlines Pty Ltd, for Imperva Phone: +61.2.4341 5021 Mobile: +61 (0) 408 408 210 Email: firstname.lastname@example.org
- New Destination Gigamon Security Resources IS HERE
- Ransomware explosion is the latest security wakeup call for CxOs
- As networks evolve, visibility remains key to managing IT-security risk in business terms
- The Future is Encrypted. Manage It.
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- CLOUDSEC2016 - Timothy Wallach, Cyber Taskforce FBI (USA) speaks on the status & evolution of global cybercrime. Save your seat
- Next-generation SIEM turns low-level security monitoring for high-level business goals
- See Your Traffic for What It Really Is
- Join special guest Jeff Lanza, Retired FBI Agent (USA), Ty Miller, Mark Gregory & Andy Solterbeck for a discussion on ransomware security
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- Join Skeeve Stevens, Stanley Shanapinda, and more on how to manage metadata to maximise your ability to detect and prevent an attack. Register
- Test Your Knowledge of Network Encryption
- Caution: That SSL Blind Spot is Growing
- Acquisitions and restructuring costs leave Megaport with $21 million loss
- Macquarie back in the black after growth in Cloud and government
- Steve Murphy takes Frontline role on NextGen board
- Optus boosts mobile coverage in the Northern Territory
- JCurve extends NetSuite agreement to target top end of town
- CMO's top 10 martech stories for the week - 25 August
- Woolworths CEO looks for customer emphasis as group reports $1.2bn loss
- Why it's time your brand leveraged user-generated content
- Aus Post's customer chief: CX is about convenience, control and choice
- Report forecasts rapid beacon uptake by market segments beyond retail