Imperva File Firewall
to Prevent Data Theft with Industry-Leading Imperva Document Security Technology hackers know very well what information they need and where to find them. Key data centers such as file servers store your "most valuable data", such as intellectual property, transaction data or PII. Cyber attacks have become increasingly sophisticated, using a variety of strategies and tools to achieve only one goal: to invade the system. Imperva adds a super protection layer directly around the file to ensure the security of sensitive data and prevent data leakage and the resulting risks, brand loss and related costs. |
Quickly Stop Suspicious Activities prevents files from being easily targeted by internal and external threats. With the help of the file firewall, you can generate notifications for suspicious file access activities or completely block access under certain circumstances, thus responding immediately. With the industry-leading security policy framework, you can be confident that your file data is fully protected. Event details are at your fingertips The sooner you respond to a security incident, the better the effect will be. The investigation can be initiated quickly through immediate access to all documentation activities in the organization. With the help of interactive audit analysis, all the details will be clear at a glance with just a few clicks, thus identifying suspicious behaviors, understanding user rights and documentation issues. Improve efficiency and strengthen control with automatic access audit To ensure data security, it is necessary to continuously review file access permissions. With SecureSphere, you can finally set up a regular workflow to audit file access rights. Helps data owners make access control decisions by including them in the routine review cycle. Learn more about file user rights managementUser file permissions.. Protect Data from Advanced Threats if files are allowed to be exposed to malicious software and targeted attacks, they will bring unbearable losses. With Imperva and FireEye, you don't have to worry about it anymore. Under the sensitive monitoring of leading malware detection systems, files have an additional layer of protection, and you can be sure that your controlled sensitive data is safe and will not be violated by advanced threats.. |
Specifications
Specifications | Description |
---|---|
supported operating systems |
|
supported file systems |
|
Supported directory services |
|
User permission management |
|
File system activity audit |
|
Data classification |
|
Tamper-proof audit trail |
|
deployment mode |
|
management |
|
management |
|
events and reports |
|
related products |