SlideShare a Scribd company logo
SOLUTION
BRIEF
Imperva and Vormetric
SOLUTION BRIEF
2
Integration Benefits
•	 Robust Security: Ensures
privileged users inside
and outside of the
database do not have
access to sensitive data.
•	 Transparent: Requires no
changes to applications,
databases, or storage
environments. Has a near
zero performance impact
and does not disrupt
business operations.
•	 Manageable: Minimizes
costs and maximizes
ROI by protecting and
auditing heterogeneous
database environments.
•	 Quick: Deploys rapidly,
without disturbing
existing environments.
Database Activity Monitoring
and Encryption Provide a Layered
Defense to Protect Databases
Real-time database activity monitoring and encryption are essential ingredients for
preventing data theft, maintaining data integrity, and meeting privacy and security
mandates required by customers, regulators, and lawmakers. Imperva and Vormetric have
teamed together to deliver a solution that encrypts sensitive data and continuously audits
and monitors database and database file access by privileged and non-privileged users.
Deploy Robust, Layered Defenses
Imperva and Vormetric enable a comprehensive solution that helps organizations
protect databases through a combination of database activity monitoring and encryption
capabilities. Imperva SecureSphere provides full auditing and visibility into database
usage across heterogeneous database platforms, while Vormetric Encryption secures
and controls access to database information from users who work at the operating
system and storage tiers. With this combination, organizations can monitor and control
users both inside and outside of the database.
Meet Regulatory Compliance
Enterprises often struggle to attain compliance with industry regulations such as PCI
DSS, SOX, HIPAA/HITECH, and with national or regional data privacy laws such as the
EU Data Protection laws. These regulations, mandates, and privacy directives require
activity audit and security controls to protect databases in scope. Imperva SecureSphere
and Vormetric Encryption help meet these requirements with data discovery and
classification, vulnerability assessments, encryption, database auditing and security,
privileged user monitoring, and access rights analysis capabilities.
Protect the Cloud and Virtual Environments
The popularity of virtualized environments and private clouds pose new challenges for
securing data. Some of these challenges include mixed trust levels, the potential for
weakened separation of duties enforcement, and data governance. Enterprises who
want to leverage these environments need the assurance that they can meet compliance
requirements and minimize the risk of a data breach. To identify, prioritize, and mitigate
risks across a varied infrastructure, organizations require a layer of security positioned
close to the data. Imperva SecureSphere and Vormetric Encryption can be deployed to
protect heterogeneous data centers across physical, virtual, and cloud environments.
Together, Imperva and Vormetric deliver a comprehensive
security solution that meets compliance requirements, prevents
data theft, strengthens data privacy, and minimizes the
cost of securing heterogeneous enterprise data centers in
on-premise, virtual and cloud environments.
SOLUTION BRIEF
imperva.com
© 2012, Imperva, Inc. All rights reserved. Imperva, the Imperva logo, SecureSphere, Incapsula and Skyfence are
trademarks of Imperva, Inc. and its subsidiaries. All other brand or product names are trademarks or registered
trademarks of their respective holders. IMPV-SB-Imperva-Vormetric-0116-v1
Drivers for Database Security
•	 Compliance—PCI DSS, HIPAA/HITECH, State Data Breach Laws, National Data
Protection Laws
•	 Security mandates
•	 Contractual obligations
Typical Database Threats
•	 Unauthorized Database Access
—— Accessing data that is off-limits
—— Attempts to exploit a vulnerability
•	 Unusual Database Access
—— High velocity & high volume queries
—— Atypical table access; from different locations, IP’s, applications, etc.
•	 Unauthorized System Access
—— Database files; backups, log files, ETL data, etc.
—— Unauthorized Insiders
—— Unauthorized Outsiders (hackers)
About Vormetric
Vormetric Encryption provides data protection, access control, and transparent
encryption of structured (database) and unstructured data in physical, virtual and cloud
environments. Vormetric Encryption provides integrated encryption key management
while Vormetric Key Management manages keys for internal database Transparent Data
Encryption. Vormetric secures against external threats (hackers with user credentials) and
manages data access for internal users (IT admins, etc).
About Imperva
Imperva is a pioneer and leader of a new category of business security solution that
protects critical applications and data from theft, insider abuse, and fraud; and also
streamlines regulatory compliance. We provide a comprehensive solution for monitoring
and controlling all data usage and business transactions across the data center, from
storage in a database or on a file server to consumption through applications.
	 Imperva and Vormetric
protect databases through
a unique combination of
database monitoring and
encryption applied to all tiers
of the database stack.
Application Tier
Data Tier
Server Tier
Storage Tier
Data
Security
Layers of
Defense
Network
Security
Layers of
Defense
Firewall
IDS/IPS
Content Filtering
DLP
IAM
Internet
Applications
Database
Operating System
Data

More Related Content

What's hot

Database Security Management
Database Security Management Database Security Management
Database Security Management
Ahsin Yousaf
 
Database Security
Database SecurityDatabase Security
Database Security
RabiaIftikhar10
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
Richard Blech
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
SaranSwathi1
 
Database security
Database securityDatabase security
Database security
Zubair Rahim
 
Sensitive Data Exposure
Sensitive Data ExposureSensitive Data Exposure
Sensitive Data Exposure
abodiford
 
Data Security
Data SecurityData Security
Data Security
Mark Waltzer
 
Data security
Data securityData security
Data security
ForeSolutions
 
Database security
Database security Database security
Database security
Shivnandan Singh
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
Freeform Dynamics
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | Seclore
Seclore
 
Database security
Database securityDatabase security
Database security
afzaalkhalid1
 
Database Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database SecurityDatabase Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database Security
Raj vardhan
 
eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?
Mario Drobics
 
Database Security
Database SecurityDatabase Security
Database Security
Ferdous Pathan
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
Seclore
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
Shahbaz Khan
 
Seclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity LabelsSeclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity Labels
Seclore
 
DLP Solutions Protection | Seclore
DLP Solutions Protection |  SecloreDLP Solutions Protection |  Seclore
DLP Solutions Protection | Seclore
Seclore
 

What's hot (19)

Database Security Management
Database Security Management Database Security Management
Database Security Management
 
Database Security
Database SecurityDatabase Security
Database Security
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
 
Database security
Database securityDatabase security
Database security
 
Sensitive Data Exposure
Sensitive Data ExposureSensitive Data Exposure
Sensitive Data Exposure
 
Data Security
Data SecurityData Security
Data Security
 
Data security
Data securityData security
Data security
 
Database security
Database security Database security
Database security
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | Seclore
 
Database security
Database securityDatabase security
Database security
 
Database Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database SecurityDatabase Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database Security
 
eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?
 
Database Security
Database SecurityDatabase Security
Database Security
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Seclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity LabelsSeclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity Labels
 
DLP Solutions Protection | Seclore
DLP Solutions Protection |  SecloreDLP Solutions Protection |  Seclore
DLP Solutions Protection | Seclore
 

Similar to Brochure Imperva Vormetric

Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
 
Dstca
DstcaDstca
Dstca
ajay vj
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
yasirkhokhar7
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Bloombase
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
LindaWatson19
 
Data security
Data securityData security
Data security
AbdulBasit938
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentationstefanjung
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
Abbie Hosta
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
Emmanuel Oshogwe Akpeokhai
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
alexguzman510050
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Commit Software Sh.p.k.
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
IBM Security
 
Database security in database management.pptx
Database security in database management.pptxDatabase security in database management.pptx
Database security in database management.pptx
FarhanaMariyam1
 
2015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #22015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #2Harriet Schneider
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
ALI ANWAR, OCP®
 

Similar to Brochure Imperva Vormetric (20)

Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Dstca
DstcaDstca
Dstca
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Data security
Data securityData security
Data security
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
Database security
Database securityDatabase security
Database security
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Database security in database management.pptx
Database security in database management.pptxDatabase security in database management.pptx
Database security in database management.pptx
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
2015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #22015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #2
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 

More from Michelle Guerrero Montalvo

Curriculum Secure Soft Ecuador 2018
Curriculum Secure Soft Ecuador 2018Curriculum Secure Soft Ecuador 2018
Curriculum Secure Soft Ecuador 2018
Michelle Guerrero Montalvo
 
Sonic Wall Product Line Brochure
Sonic Wall Product Line BrochureSonic Wall Product Line Brochure
Sonic Wall Product Line Brochure
Michelle Guerrero Montalvo
 
Presentation NetScaler SD-WAN - David Gallo
Presentation NetScaler SD-WAN - David GalloPresentation NetScaler SD-WAN - David Gallo
Presentation NetScaler SD-WAN - David Gallo
Michelle Guerrero Montalvo
 
NetScaler ADC - Customer Overview
NetScaler ADC - Customer OverviewNetScaler ADC - Customer Overview
NetScaler ADC - Customer Overview
Michelle Guerrero Montalvo
 
Presentation NetScaler SD-WAN
Presentation NetScaler SD-WANPresentation NetScaler SD-WAN
Presentation NetScaler SD-WAN
Michelle Guerrero Montalvo
 
Seguridad en la era Cloud (Pablo Barriga)
Seguridad en la era Cloud (Pablo Barriga)Seguridad en la era Cloud (Pablo Barriga)
Seguridad en la era Cloud (Pablo Barriga)
Michelle Guerrero Montalvo
 
Presentación Secure Soft
Presentación Secure SoftPresentación Secure Soft
Presentación Secure Soft
Michelle Guerrero Montalvo
 

More from Michelle Guerrero Montalvo (7)

Curriculum Secure Soft Ecuador 2018
Curriculum Secure Soft Ecuador 2018Curriculum Secure Soft Ecuador 2018
Curriculum Secure Soft Ecuador 2018
 
Sonic Wall Product Line Brochure
Sonic Wall Product Line BrochureSonic Wall Product Line Brochure
Sonic Wall Product Line Brochure
 
Presentation NetScaler SD-WAN - David Gallo
Presentation NetScaler SD-WAN - David GalloPresentation NetScaler SD-WAN - David Gallo
Presentation NetScaler SD-WAN - David Gallo
 
NetScaler ADC - Customer Overview
NetScaler ADC - Customer OverviewNetScaler ADC - Customer Overview
NetScaler ADC - Customer Overview
 
Presentation NetScaler SD-WAN
Presentation NetScaler SD-WANPresentation NetScaler SD-WAN
Presentation NetScaler SD-WAN
 
Seguridad en la era Cloud (Pablo Barriga)
Seguridad en la era Cloud (Pablo Barriga)Seguridad en la era Cloud (Pablo Barriga)
Seguridad en la era Cloud (Pablo Barriga)
 
Presentación Secure Soft
Presentación Secure SoftPresentación Secure Soft
Presentación Secure Soft
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Brochure Imperva Vormetric

  • 2. SOLUTION BRIEF 2 Integration Benefits • Robust Security: Ensures privileged users inside and outside of the database do not have access to sensitive data. • Transparent: Requires no changes to applications, databases, or storage environments. Has a near zero performance impact and does not disrupt business operations. • Manageable: Minimizes costs and maximizes ROI by protecting and auditing heterogeneous database environments. • Quick: Deploys rapidly, without disturbing existing environments. Database Activity Monitoring and Encryption Provide a Layered Defense to Protect Databases Real-time database activity monitoring and encryption are essential ingredients for preventing data theft, maintaining data integrity, and meeting privacy and security mandates required by customers, regulators, and lawmakers. Imperva and Vormetric have teamed together to deliver a solution that encrypts sensitive data and continuously audits and monitors database and database file access by privileged and non-privileged users. Deploy Robust, Layered Defenses Imperva and Vormetric enable a comprehensive solution that helps organizations protect databases through a combination of database activity monitoring and encryption capabilities. Imperva SecureSphere provides full auditing and visibility into database usage across heterogeneous database platforms, while Vormetric Encryption secures and controls access to database information from users who work at the operating system and storage tiers. With this combination, organizations can monitor and control users both inside and outside of the database. Meet Regulatory Compliance Enterprises often struggle to attain compliance with industry regulations such as PCI DSS, SOX, HIPAA/HITECH, and with national or regional data privacy laws such as the EU Data Protection laws. These regulations, mandates, and privacy directives require activity audit and security controls to protect databases in scope. Imperva SecureSphere and Vormetric Encryption help meet these requirements with data discovery and classification, vulnerability assessments, encryption, database auditing and security, privileged user monitoring, and access rights analysis capabilities. Protect the Cloud and Virtual Environments The popularity of virtualized environments and private clouds pose new challenges for securing data. Some of these challenges include mixed trust levels, the potential for weakened separation of duties enforcement, and data governance. Enterprises who want to leverage these environments need the assurance that they can meet compliance requirements and minimize the risk of a data breach. To identify, prioritize, and mitigate risks across a varied infrastructure, organizations require a layer of security positioned close to the data. Imperva SecureSphere and Vormetric Encryption can be deployed to protect heterogeneous data centers across physical, virtual, and cloud environments. Together, Imperva and Vormetric deliver a comprehensive security solution that meets compliance requirements, prevents data theft, strengthens data privacy, and minimizes the cost of securing heterogeneous enterprise data centers in on-premise, virtual and cloud environments.
  • 3. SOLUTION BRIEF imperva.com © 2012, Imperva, Inc. All rights reserved. Imperva, the Imperva logo, SecureSphere, Incapsula and Skyfence are trademarks of Imperva, Inc. and its subsidiaries. All other brand or product names are trademarks or registered trademarks of their respective holders. IMPV-SB-Imperva-Vormetric-0116-v1 Drivers for Database Security • Compliance—PCI DSS, HIPAA/HITECH, State Data Breach Laws, National Data Protection Laws • Security mandates • Contractual obligations Typical Database Threats • Unauthorized Database Access —— Accessing data that is off-limits —— Attempts to exploit a vulnerability • Unusual Database Access —— High velocity & high volume queries —— Atypical table access; from different locations, IP’s, applications, etc. • Unauthorized System Access —— Database files; backups, log files, ETL data, etc. —— Unauthorized Insiders —— Unauthorized Outsiders (hackers) About Vormetric Vormetric Encryption provides data protection, access control, and transparent encryption of structured (database) and unstructured data in physical, virtual and cloud environments. Vormetric Encryption provides integrated encryption key management while Vormetric Key Management manages keys for internal database Transparent Data Encryption. Vormetric secures against external threats (hackers with user credentials) and manages data access for internal users (IT admins, etc). About Imperva Imperva is a pioneer and leader of a new category of business security solution that protects critical applications and data from theft, insider abuse, and fraud; and also streamlines regulatory compliance. We provide a comprehensive solution for monitoring and controlling all data usage and business transactions across the data center, from storage in a database or on a file server to consumption through applications. Imperva and Vormetric protect databases through a unique combination of database monitoring and encryption applied to all tiers of the database stack. Application Tier Data Tier Server Tier Storage Tier Data Security Layers of Defense Network Security Layers of Defense Firewall IDS/IPS Content Filtering DLP IAM Internet Applications Database Operating System Data