SlideShare a Scribd company logo
The Leader in Application Data
Security and Compliance
Thomas Drews, SE CEEU
- CONFIDENTIAL -
3
Security and Compliance Requirements
 Full Visibility
 Who is accessing your data?
 Who has accessed your data?
 Granular Controls
 Who is attacking your data and how?
 Is your data leaking outside the organization?
 How do you protect your data?
Imperva delivers the industry’s most robust and
widely deployed solution for addressing the entire
application data security and compliance lifecycle.
Web/Web services
Applications
Monitoring & Protecting Data
Browser
DBA
Thick Client
2 Tier App
Thin Client
3 Tier App
Application
Interface
SQL
Data
- CONFIDENTIAL -
5
Imperva Overview
 Founded in 2002
 The leader in Application Data Security and Compliance
 Global company with int’l revenue consisting of 40%+
 North American HQ in California; International HQ in Israel
 Local presence in all major markets (EMEA, APAC, Japan)
 Customers in 30 countries
 Strong global network of channel partners
 600+ customers and over 4500 organizations protected
 Shlomo Kramer, CEO & President
 One of 3 founders of Check Point
- CONFIDENTIAL -
6
SecureSphere Dominates Awards
Imperva Wins eWEEK
Excellence Award
“Imperva SecureSphere’s … in-line
protection for both Web applications
and communications with back-end
databases is simply unmatched.”
Editor’s Choice for
Database Extrusion
Prevention
“Right from the start, the Imperva
SecureSphere Database Security
Gateway impressed us with its plethora
of features…dynamic user profiling is
almost reason enough to choose it.
Editor’s Choice
for Web Application
Firewalls
“From beginning to
end, Imperva
SecureSphere is our
kind of WAF.”
“Imperva's SecureSphere
Database Security Gateway is
a win on both counts. It did a
fine job learning our user
behavior, and numerous
signatures let it handily block
known attacks.”
Imperva Wins
2007 Readers’
Choice Award
from Security
Magazine
“SecureSphere scored well in
every criteria: granularity of
access controls and integration
with existing infrastructure,
scalability and management…”
- CONFIDENTIAL -
7
Set Policies/Controls
• Set policies automatically and
quickly
• Keep up with changes
• Configurable policies and controls
based on situation
Monitor and Enforce
• Ensure separation of duties
• Ensure end user accountability
• Capture full details
• Provide security at all layers
• Alert/block in real-time
Measure
• Built in compliance reports
• Roll-up & drill down of data
• Security event analysis
Assess
• Test database configuration according
to standards
• Evaluate inherent risks
• Discover who uses the data
and what do they do?
Achieving Data Security & Compliance
IMPERVA
ADDRESSES
THE
ENTIRE LIFE
CYCLE
Protection Approaches (WAF)
 „Postive“ Security
 Protection from unknown
threats and vulnerabilities
 PROFILING of Applications
 „Negative“ Security
 Protection from known
threats and vulnerabilities
 Protocol Validation
 Signatures
Efficient Deployment and Operations
No Impact to IT, Easily Managed, Low TCO
Imperva SecureSphere Product Line
- CONFIDENTIAL -
14
ADC Insights
Database Monitoring
Gateway
Database Monitor
Agent
Management
Server (MX)
Web
Database
Internet
Database
Security Gateway
Web Application
Firewall
• Non-Inline Deployment
• Reverse Proxy Deployment
• Inline Bridge Deployment
Flexible Deployment Options
 Transparent Inline Bridge
 Supports full enforcement
 High performance, low latency
 Fail-open interfaces
 Transparent & Reverse Proxy
 High performance for
content modification
 URL rewriting, cookie signing,
SSL termination
 Non-inline Deployment
 Primarily for monitoring, zero network latency
Switch
SecureSphere
Data Center
SecureSphere
Unified, Scalable Management
Centralized administration
 Manages all devices from a single console
 Integrated auditing and reporting
 Easy deployment of new appliances
 Appliances auto-configured by MX server
 Task-oriented workflows
Hierarchical policy management
Granular role-based access control
Web browser interface
MX Management
Server
SecureSphere Appliances
Browser
Interface
Introducing SecureSphere
 Only complete solution for
enterprise data that includes:
 Data activity monitoring
 Real-time data protection
 Full visibility and granular control of data usage
 From end user through application and into database
 Full stack protection
 Unmatched ease-of-use and ease-of-deployment
SecureSphere Product Line
Gateway Models G4 G8/Crossbeam G16 FTL
Throughput 500MB/Sec 1GB/Sec 2GB/Sec
Max TPS (HTTP/SQL) 16k/50k 24k/100k 36k/200k
Recommended Web Servers 50 100 200
Form Factor 1U
FTL Model: 2U
1U
FTL Model: 2U
2U
Deployment mode Bridge, Router, Proxy
or Monitor
Bridge, Router, Proxy
or Monitor
Bridge, Router, Proxy
or Monitor
Max Inline Bridge Segments 2 2 2
Max Routing Interfaces 5 5 5
Management Interfaces 1 1 1
High Availability Fail Open, IMPVHA,
VRRP
Fail Open, IMPVHA,
VRRP
Fail Open, IMPVHA,
VRRP
Fault Tolerance Available Available Yes
Demo
Imperva, Inc.
950 Tower Lane, Suite 1550, Foster City, CA 94404
Sales: +1-866-926-4678 www.imperva.com
Demo-Setup
SuperVeda (IIS + MS-SQL)
SecureSphere
(single-box)
DB-Agent
Browser
SQL-Tools
mgmt
data

More Related Content

Similar to 1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda

00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3
Eoin Keary
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
RightScale
 
Emerging IT Trends and Innovation Concepts.pptx
Emerging IT Trends and Innovation Concepts.pptxEmerging IT Trends and Innovation Concepts.pptx
Emerging IT Trends and Innovation Concepts.pptx
Roshni814224
 
Seguridad en sql server 2016 y 2017
Seguridad en sql server 2016 y 2017Seguridad en sql server 2016 y 2017
Seguridad en sql server 2016 y 2017
Maximiliano Accotto
 
Seguridad en sql server 2016 y 2017
Seguridad en sql server 2016 y 2017Seguridad en sql server 2016 y 2017
Seguridad en sql server 2016 y 2017
Maximiliano Accotto
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
Anton Lishchuk
 
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
CloudPassage
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
PROIDEA
 
Web Api services using IBM Datapower
Web Api services using IBM DatapowerWeb Api services using IBM Datapower
Web Api services using IBM Datapower
Sigortam.net
 
SAP Application Access with Instasafe Zero Trust
SAP Application Access with Instasafe Zero TrustSAP Application Access with Instasafe Zero Trust
SAP Application Access with Instasafe Zero Trust
InstaSafe Technologies
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
Sophos Benelux
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
أحلام انصارى
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
Precisely
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
CloudPassage
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform Service
Soumitra Bhattacharyya
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
Cisco Canada
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
RogerChaucaZea
 
Managed security services
Managed security servicesManaged security services
Managed security services
manoharparakh
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
DeServ - Tecnologia e Servços
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
David Patterson
 

Similar to 1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda (20)

00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
 
Emerging IT Trends and Innovation Concepts.pptx
Emerging IT Trends and Innovation Concepts.pptxEmerging IT Trends and Innovation Concepts.pptx
Emerging IT Trends and Innovation Concepts.pptx
 
Seguridad en sql server 2016 y 2017
Seguridad en sql server 2016 y 2017Seguridad en sql server 2016 y 2017
Seguridad en sql server 2016 y 2017
 
Seguridad en sql server 2016 y 2017
Seguridad en sql server 2016 y 2017Seguridad en sql server 2016 y 2017
Seguridad en sql server 2016 y 2017
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Web Api services using IBM Datapower
Web Api services using IBM DatapowerWeb Api services using IBM Datapower
Web Api services using IBM Datapower
 
SAP Application Access with Instasafe Zero Trust
SAP Application Access with Instasafe Zero TrustSAP Application Access with Instasafe Zero Trust
SAP Application Access with Instasafe Zero Trust
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform Service
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
Managed security services
Managed security servicesManaged security services
Managed security services
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 

Recently uploaded

Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
aragme
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
ecamare2
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
Easily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYCEasily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYC
Any kyc Account
 
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
Aleksey Savkin
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
MJ Global
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
sssourabhsharma
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
my Pandit
 
Pitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deckPitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deck
HajeJanKamps
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
Lacey Max
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
jeffkluth1
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
my Pandit
 

Recently uploaded (20)

Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
Easily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYCEasily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYC
 
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
 
Pitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deckPitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deck
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
 

1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda

  • 1. The Leader in Application Data Security and Compliance Thomas Drews, SE CEEU
  • 2. - CONFIDENTIAL - 3 Security and Compliance Requirements  Full Visibility  Who is accessing your data?  Who has accessed your data?  Granular Controls  Who is attacking your data and how?  Is your data leaking outside the organization?  How do you protect your data? Imperva delivers the industry’s most robust and widely deployed solution for addressing the entire application data security and compliance lifecycle.
  • 3. Web/Web services Applications Monitoring & Protecting Data Browser DBA Thick Client 2 Tier App Thin Client 3 Tier App Application Interface SQL Data
  • 4. - CONFIDENTIAL - 5 Imperva Overview  Founded in 2002  The leader in Application Data Security and Compliance  Global company with int’l revenue consisting of 40%+  North American HQ in California; International HQ in Israel  Local presence in all major markets (EMEA, APAC, Japan)  Customers in 30 countries  Strong global network of channel partners  600+ customers and over 4500 organizations protected  Shlomo Kramer, CEO & President  One of 3 founders of Check Point
  • 5. - CONFIDENTIAL - 6 SecureSphere Dominates Awards Imperva Wins eWEEK Excellence Award “Imperva SecureSphere’s … in-line protection for both Web applications and communications with back-end databases is simply unmatched.” Editor’s Choice for Database Extrusion Prevention “Right from the start, the Imperva SecureSphere Database Security Gateway impressed us with its plethora of features…dynamic user profiling is almost reason enough to choose it. Editor’s Choice for Web Application Firewalls “From beginning to end, Imperva SecureSphere is our kind of WAF.” “Imperva's SecureSphere Database Security Gateway is a win on both counts. It did a fine job learning our user behavior, and numerous signatures let it handily block known attacks.” Imperva Wins 2007 Readers’ Choice Award from Security Magazine “SecureSphere scored well in every criteria: granularity of access controls and integration with existing infrastructure, scalability and management…”
  • 6. - CONFIDENTIAL - 7 Set Policies/Controls • Set policies automatically and quickly • Keep up with changes • Configurable policies and controls based on situation Monitor and Enforce • Ensure separation of duties • Ensure end user accountability • Capture full details • Provide security at all layers • Alert/block in real-time Measure • Built in compliance reports • Roll-up & drill down of data • Security event analysis Assess • Test database configuration according to standards • Evaluate inherent risks • Discover who uses the data and what do they do? Achieving Data Security & Compliance IMPERVA ADDRESSES THE ENTIRE LIFE CYCLE
  • 7. Protection Approaches (WAF)  „Postive“ Security  Protection from unknown threats and vulnerabilities  PROFILING of Applications  „Negative“ Security  Protection from known threats and vulnerabilities  Protocol Validation  Signatures
  • 8. Efficient Deployment and Operations No Impact to IT, Easily Managed, Low TCO
  • 9. Imperva SecureSphere Product Line - CONFIDENTIAL - 14 ADC Insights Database Monitoring Gateway Database Monitor Agent Management Server (MX) Web Database Internet Database Security Gateway Web Application Firewall
  • 10. • Non-Inline Deployment • Reverse Proxy Deployment • Inline Bridge Deployment Flexible Deployment Options  Transparent Inline Bridge  Supports full enforcement  High performance, low latency  Fail-open interfaces  Transparent & Reverse Proxy  High performance for content modification  URL rewriting, cookie signing, SSL termination  Non-inline Deployment  Primarily for monitoring, zero network latency Switch SecureSphere Data Center SecureSphere
  • 11. Unified, Scalable Management Centralized administration  Manages all devices from a single console  Integrated auditing and reporting  Easy deployment of new appliances  Appliances auto-configured by MX server  Task-oriented workflows Hierarchical policy management Granular role-based access control Web browser interface MX Management Server SecureSphere Appliances Browser Interface
  • 12. Introducing SecureSphere  Only complete solution for enterprise data that includes:  Data activity monitoring  Real-time data protection  Full visibility and granular control of data usage  From end user through application and into database  Full stack protection  Unmatched ease-of-use and ease-of-deployment
  • 13. SecureSphere Product Line Gateway Models G4 G8/Crossbeam G16 FTL Throughput 500MB/Sec 1GB/Sec 2GB/Sec Max TPS (HTTP/SQL) 16k/50k 24k/100k 36k/200k Recommended Web Servers 50 100 200 Form Factor 1U FTL Model: 2U 1U FTL Model: 2U 2U Deployment mode Bridge, Router, Proxy or Monitor Bridge, Router, Proxy or Monitor Bridge, Router, Proxy or Monitor Max Inline Bridge Segments 2 2 2 Max Routing Interfaces 5 5 5 Management Interfaces 1 1 1 High Availability Fail Open, IMPVHA, VRRP Fail Open, IMPVHA, VRRP Fail Open, IMPVHA, VRRP Fault Tolerance Available Available Yes
  • 14. Demo Imperva, Inc. 950 Tower Lane, Suite 1550, Foster City, CA 94404 Sales: +1-866-926-4678 www.imperva.com
  • 15. Demo-Setup SuperVeda (IIS + MS-SQL) SecureSphere (single-box) DB-Agent Browser SQL-Tools mgmt data