SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
SOLUTION
BRIEF
Imperva and Vormetric
SOLUTION BRIEF
2
Integration Benefits
•	 Robust Security: Ensures
privileged users inside
and outside of the
database do not have
access to sensitive data.
•	 Transparent: Requires no
changes to applications,
databases, or storage
environments. Has a near
zero performance impact
and does not disrupt
business operations.
•	 Manageable: Minimizes
costs and maximizes
ROI by protecting and
auditing heterogeneous
database environments.
•	 Quick: Deploys rapidly,
without disturbing
existing environments.
Database Activity Monitoring
and Encryption Provide a Layered
Defense to Protect Databases
Real-time database activity monitoring and encryption are essential ingredients for
preventing data theft, maintaining data integrity, and meeting privacy and security
mandates required by customers, regulators, and lawmakers. Imperva and Vormetric have
teamed together to deliver a solution that encrypts sensitive data and continuously audits
and monitors database and database file access by privileged and non-privileged users.
Deploy Robust, Layered Defenses
Imperva and Vormetric enable a comprehensive solution that helps organizations
protect databases through a combination of database activity monitoring and encryption
capabilities. Imperva SecureSphere provides full auditing and visibility into database
usage across heterogeneous database platforms, while Vormetric Encryption secures
and controls access to database information from users who work at the operating
system and storage tiers. With this combination, organizations can monitor and control
users both inside and outside of the database.
Meet Regulatory Compliance
Enterprises often struggle to attain compliance with industry regulations such as PCI
DSS, SOX, HIPAA/HITECH, and with national or regional data privacy laws such as the
EU Data Protection laws. These regulations, mandates, and privacy directives require
activity audit and security controls to protect databases in scope. Imperva SecureSphere
and Vormetric Encryption help meet these requirements with data discovery and
classification, vulnerability assessments, encryption, database auditing and security,
privileged user monitoring, and access rights analysis capabilities.
Protect the Cloud and Virtual Environments
The popularity of virtualized environments and private clouds pose new challenges for
securing data. Some of these challenges include mixed trust levels, the potential for
weakened separation of duties enforcement, and data governance. Enterprises who
want to leverage these environments need the assurance that they can meet compliance
requirements and minimize the risk of a data breach. To identify, prioritize, and mitigate
risks across a varied infrastructure, organizations require a layer of security positioned
close to the data. Imperva SecureSphere and Vormetric Encryption can be deployed to
protect heterogeneous data centers across physical, virtual, and cloud environments.
Together, Imperva and Vormetric deliver a comprehensive
security solution that meets compliance requirements, prevents
data theft, strengthens data privacy, and minimizes the
cost of securing heterogeneous enterprise data centers in
on-premise, virtual and cloud environments.
SOLUTION BRIEF
imperva.com
© 2012, Imperva, Inc. All rights reserved. Imperva, the Imperva logo, SecureSphere, Incapsula and Skyfence are
trademarks of Imperva, Inc. and its subsidiaries. All other brand or product names are trademarks or registered
trademarks of their respective holders. IMPV-SB-Imperva-Vormetric-0116-v1
Drivers for Database Security
•	 Compliance—PCI DSS, HIPAA/HITECH, State Data Breach Laws, National Data
Protection Laws
•	 Security mandates
•	 Contractual obligations
Typical Database Threats
•	 Unauthorized Database Access
—— Accessing data that is off-limits
—— Attempts to exploit a vulnerability
•	 Unusual Database Access
—— High velocity & high volume queries
—— Atypical table access; from different locations, IP’s, applications, etc.
•	 Unauthorized System Access
—— Database files; backups, log files, ETL data, etc.
—— Unauthorized Insiders
—— Unauthorized Outsiders (hackers)
About Vormetric
Vormetric Encryption provides data protection, access control, and transparent
encryption of structured (database) and unstructured data in physical, virtual and cloud
environments. Vormetric Encryption provides integrated encryption key management
while Vormetric Key Management manages keys for internal database Transparent Data
Encryption. Vormetric secures against external threats (hackers with user credentials) and
manages data access for internal users (IT admins, etc).
About Imperva
Imperva is a pioneer and leader of a new category of business security solution that
protects critical applications and data from theft, insider abuse, and fraud; and also
streamlines regulatory compliance. We provide a comprehensive solution for monitoring
and controlling all data usage and business transactions across the data center, from
storage in a database or on a file server to consumption through applications.
	 Imperva and Vormetric
protect databases through
a unique combination of
database monitoring and
encryption applied to all tiers
of the database stack.
Application Tier
Data Tier
Server Tier
Storage Tier
Data
Security
Layers of
Defense
Network
Security
Layers of
Defense
Firewall
IDS/IPS
Content Filtering
DLP
IAM
Internet
Applications
Database
Operating System
Data

Mais conteúdo relacionado

Mais procurados

Database Security Management
Database Security Management Database Security Management
Database Security Management
Ahsin Yousaf
 

Mais procurados (19)

Database Security Management
Database Security Management Database Security Management
Database Security Management
 
Database Security
Database SecurityDatabase Security
Database Security
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
 
Database security
Database securityDatabase security
Database security
 
Sensitive Data Exposure
Sensitive Data ExposureSensitive Data Exposure
Sensitive Data Exposure
 
Data Security
Data SecurityData Security
Data Security
 
Data security
Data securityData security
Data security
 
Database security
Database security Database security
Database security
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | Seclore
 
Database security
Database securityDatabase security
Database security
 
Database Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database SecurityDatabase Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database Security
 
eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?
 
Database Security
Database SecurityDatabase Security
Database Security
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Seclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity LabelsSeclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity Labels
 
DLP Solutions Protection | Seclore
DLP Solutions Protection |  SecloreDLP Solutions Protection |  Seclore
DLP Solutions Protection | Seclore
 

Semelhante a Brochure Imperva Vormetric

Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
MongoDB
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Bloombase
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
stefanjung
 
2015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #22015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #2
Harriet Schneider
 

Semelhante a Brochure Imperva Vormetric (20)

Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Dstca
DstcaDstca
Dstca
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Data security
Data securityData security
Data security
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
Database security
Database securityDatabase security
Database security
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Database security in database management.pptx
Database security in database management.pptxDatabase security in database management.pptx
Database security in database management.pptx
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
2015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #22015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #2
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 

Mais de Michelle Guerrero Montalvo

Mais de Michelle Guerrero Montalvo (7)

Curriculum Secure Soft Ecuador 2018
Curriculum Secure Soft Ecuador 2018Curriculum Secure Soft Ecuador 2018
Curriculum Secure Soft Ecuador 2018
 
Sonic Wall Product Line Brochure
Sonic Wall Product Line BrochureSonic Wall Product Line Brochure
Sonic Wall Product Line Brochure
 
Presentation NetScaler SD-WAN - David Gallo
Presentation NetScaler SD-WAN - David GalloPresentation NetScaler SD-WAN - David Gallo
Presentation NetScaler SD-WAN - David Gallo
 
NetScaler ADC - Customer Overview
NetScaler ADC - Customer OverviewNetScaler ADC - Customer Overview
NetScaler ADC - Customer Overview
 
Presentation NetScaler SD-WAN
Presentation NetScaler SD-WANPresentation NetScaler SD-WAN
Presentation NetScaler SD-WAN
 
Seguridad en la era Cloud (Pablo Barriga)
Seguridad en la era Cloud (Pablo Barriga)Seguridad en la era Cloud (Pablo Barriga)
Seguridad en la era Cloud (Pablo Barriga)
 
Presentación Secure Soft
Presentación Secure SoftPresentación Secure Soft
Presentación Secure Soft
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Brochure Imperva Vormetric

  • 2. SOLUTION BRIEF 2 Integration Benefits • Robust Security: Ensures privileged users inside and outside of the database do not have access to sensitive data. • Transparent: Requires no changes to applications, databases, or storage environments. Has a near zero performance impact and does not disrupt business operations. • Manageable: Minimizes costs and maximizes ROI by protecting and auditing heterogeneous database environments. • Quick: Deploys rapidly, without disturbing existing environments. Database Activity Monitoring and Encryption Provide a Layered Defense to Protect Databases Real-time database activity monitoring and encryption are essential ingredients for preventing data theft, maintaining data integrity, and meeting privacy and security mandates required by customers, regulators, and lawmakers. Imperva and Vormetric have teamed together to deliver a solution that encrypts sensitive data and continuously audits and monitors database and database file access by privileged and non-privileged users. Deploy Robust, Layered Defenses Imperva and Vormetric enable a comprehensive solution that helps organizations protect databases through a combination of database activity monitoring and encryption capabilities. Imperva SecureSphere provides full auditing and visibility into database usage across heterogeneous database platforms, while Vormetric Encryption secures and controls access to database information from users who work at the operating system and storage tiers. With this combination, organizations can monitor and control users both inside and outside of the database. Meet Regulatory Compliance Enterprises often struggle to attain compliance with industry regulations such as PCI DSS, SOX, HIPAA/HITECH, and with national or regional data privacy laws such as the EU Data Protection laws. These regulations, mandates, and privacy directives require activity audit and security controls to protect databases in scope. Imperva SecureSphere and Vormetric Encryption help meet these requirements with data discovery and classification, vulnerability assessments, encryption, database auditing and security, privileged user monitoring, and access rights analysis capabilities. Protect the Cloud and Virtual Environments The popularity of virtualized environments and private clouds pose new challenges for securing data. Some of these challenges include mixed trust levels, the potential for weakened separation of duties enforcement, and data governance. Enterprises who want to leverage these environments need the assurance that they can meet compliance requirements and minimize the risk of a data breach. To identify, prioritize, and mitigate risks across a varied infrastructure, organizations require a layer of security positioned close to the data. Imperva SecureSphere and Vormetric Encryption can be deployed to protect heterogeneous data centers across physical, virtual, and cloud environments. Together, Imperva and Vormetric deliver a comprehensive security solution that meets compliance requirements, prevents data theft, strengthens data privacy, and minimizes the cost of securing heterogeneous enterprise data centers in on-premise, virtual and cloud environments.
  • 3. SOLUTION BRIEF imperva.com © 2012, Imperva, Inc. All rights reserved. Imperva, the Imperva logo, SecureSphere, Incapsula and Skyfence are trademarks of Imperva, Inc. and its subsidiaries. All other brand or product names are trademarks or registered trademarks of their respective holders. IMPV-SB-Imperva-Vormetric-0116-v1 Drivers for Database Security • Compliance—PCI DSS, HIPAA/HITECH, State Data Breach Laws, National Data Protection Laws • Security mandates • Contractual obligations Typical Database Threats • Unauthorized Database Access —— Accessing data that is off-limits —— Attempts to exploit a vulnerability • Unusual Database Access —— High velocity & high volume queries —— Atypical table access; from different locations, IP’s, applications, etc. • Unauthorized System Access —— Database files; backups, log files, ETL data, etc. —— Unauthorized Insiders —— Unauthorized Outsiders (hackers) About Vormetric Vormetric Encryption provides data protection, access control, and transparent encryption of structured (database) and unstructured data in physical, virtual and cloud environments. Vormetric Encryption provides integrated encryption key management while Vormetric Key Management manages keys for internal database Transparent Data Encryption. Vormetric secures against external threats (hackers with user credentials) and manages data access for internal users (IT admins, etc). About Imperva Imperva is a pioneer and leader of a new category of business security solution that protects critical applications and data from theft, insider abuse, and fraud; and also streamlines regulatory compliance. We provide a comprehensive solution for monitoring and controlling all data usage and business transactions across the data center, from storage in a database or on a file server to consumption through applications. Imperva and Vormetric protect databases through a unique combination of database monitoring and encryption applied to all tiers of the database stack. Application Tier Data Tier Server Tier Storage Tier Data Security Layers of Defense Network Security Layers of Defense Firewall IDS/IPS Content Filtering DLP IAM Internet Applications Database Operating System Data