Imperva Data Security

Problems that solves

Insufficient risk management

Risk of data loss or damage

Risk of attacks by hackers

Malware infection via Internet, email, storage devices

Risk or Leaks of confidential information

Unauthorized access to corporate IT systems and data


Ensure Security and Business Continuity

Manage Risks

Imperva Data Security

IMPERVA Data Security - Reduce risk, protect sensitive data from threats and prove compliance.


Imperva Data Security discovers databases on the network, classifies sensitive data and detects database vulnerabilities. Discover databases by scanning specific network segments on-demand or at scheduled intervals. Once databases are discovered, Imperva Data Security classifies the data stored in the database using dictionary and pattern-matching classification methods. Conduct vulnerability assessments with over 1,500 pre-defined vulnerability tests, based on CIS and DISA STIG benchmarks. Data Risk Analytics
  • Distills billions of audit events into a manageable number of security insights
  • Provides granular risk context into how data is being used by whom with machine learning and behavior analytics
  • Explains incidents in plain language to accelerate investigation and reduce risk
Data Monitoring and Protection
  • Stops threats in real-time with pre-built or custom security policies that block unauthorized activity
  • Automatically captures detailed audit trail showing who accessed what data, when and what was done to the data for compliance and forensics
  • Enables consistent oversight across a wide range of environments - databases, big data, clouds, mainframes and more
Data Discovery and Classification
  • Automates discovery of databases on-premises or in the cloud
  • Identifies sensitive, regulated data for compliance mandates (e.g. PCI, HIPAA, GDPR)
  • Examines database content and metadata for pre-defined and custom data types
Database Vulnerability Assessments
  • Identifies vulnerabilities and misconfigurations for databases on-premises or in the cloud
  • Leverages over 1,500 pre-defined assessments, based on CIS and DISA STIG benchmarks
Data Masking
  • Replaces sensitive data with fictional, but realistic values using multiple transformation techniques
  • Maintains data utility with referential integrity and statistical accuracy
  • Delivers enterprise-class scalability and performance by masking large volumes of data quickly and easily
  • Supports a broad range of data stores
File Security
  • Uses policy-based monitoring and deception technology
  • Detects ransomware-infected users and blocks them from connecting to file shares in real-time
  • Pinpoints risky file access activity by leveraging data risk analytics
  • Blocks or quarantines risky users

User features

Roles of Interested Employees

Chief Executive Officer

Chief Information Officer

Chief Technical Officer

Chief IT Security Officer

Organizational Features

Data Warehouse

GDPR Compliance

IT Security Department in company

Сonfidential data

Internet access is available for employees