Imperva File Firewall



to Prevent Data Theft with Industry-Leading Imperva Document Security Technology

hackers know very well what information they need and where to find them. Key data centers such as file servers store your "most valuable data", such as intellectual property, transaction data or PII. Cyber attacks have become increasingly sophisticated, using a variety of strategies and tools to achieve only one goal: to invade the system. Imperva adds a super protection layer directly around the file to ensure the security of sensitive data and prevent data leakage and the resulting risks, brand loss and related costs.


Quickly Stop Suspicious Activities

prevents files from being easily targeted by internal and external threats. With the help of the file firewall, you can generate notifications for suspicious file access activities or completely block access under certain circumstances, thus responding immediately. With the industry-leading security policy framework, you can be confident that your file data is fully protected.

Event details are at your fingertips

The sooner you respond to a security incident, the better the effect will be. The investigation can be initiated quickly through immediate access to all documentation activities in the organization. With the help of interactive audit analysis, all the details will be clear at a glance with just a few clicks, thus identifying suspicious behaviors, understanding user rights and documentation issues.

Improve efficiency and strengthen control with automatic access audit

To ensure data security, it is necessary to continuously review file access permissions. With SecureSphere, you can finally set up a regular workflow to audit file access rights. Helps data owners make access control decisions by including them in the routine review cycle. Learn more about file user rights managementUser file permissions..

Protect Data from Advanced Threats

if files are allowed to be exposed to malicious software and targeted attacks, they will bring unbearable losses. With Imperva and FireEye, you don't have to worry about it anymore. Under the sensitive monitoring of leading malware detection systems, files have an additional layer of protection, and you can be sure that your controlled sensitive data is safe and will not be violated by advanced threats..


Specifications


SpecificationsDescription
supported operating systems
  • Windows 2003, 2008 and 2012

  • RedHat 5.X

  • Solaris 10

supported file systems
  • Windows file storage system

  • UNIXLinux file storage system

  • NAS devices

Supported directory services
  • Microsoft Active Directory users and groups

User permission management
  • Use the permission to audit the user's access to files and lists.

  • Verify that sensitive data is used in an unauthorized way.

  • Identify hibernation accounts

  • Identify files that can be accessed by global groups

  • Track user permission changes

  • Revoke permissions and group membership

  • The recommended data owner

File system activity audit
  • Username

  • domain

  • object name

  • group

  • (Add, Remove, and Delete)

  • object type

  • attribute

  • values before and after

  • Source and destination IP addresses

Data classification
Tamper-proof audit trail
  • Audit trails are stored in a tamper-proof repository.

  • You can choose to encrypt audit data or set a digital signature.

  • View audit data through role-based access control (read-only)

  • Real-time audit data

deployment mode
  • network: non-inline monitoring and transparent bridging

  • host: lightweight proxy (local or global mode)

management
  • Web user interface (HTTP/HTTPS)

  • The command line interface (SSH/console)

management
  • Implement centralized management through MX Server

events and reports
  • SNMP

  • Syslog

  • and LeadingSIEM supplierintegration

  • email data owners and other stakeholders

  • Conformed operations

  • SecureSphere task workflow

  • Integrated Graphics Report

  • Real-time dashboard

related products