Imperva The Leader in Application Data Security and Compliance Eran Cohen EMEA Sale Engineer

Slides:



Advertisements
Similar presentations
Manage your technology for optimal return on investment (ROI) The Tivoli ® Configuration & Operations management solution from IBM.
Advertisements

BalaBit Shell Control Box
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
SQL Ledger A Free ERP in the Enterprise MOIS 549 Dr. Dina Rateb Ahmed A. Assamman.
Privileged Identity Management Enterprise Password Vault
Solutions & Services to ‘Multiply your Business Performance’ 2013.
ManageEngine IT360 Product Overview A Comprehensive Business Service Management Solution.
C ONFIDENTIAL July COM and LineSider bring OverDrive to Managed Service Providers.
Unified Logs and Reporting for Hybrid Centralized Management
MyCloudIT Removes the Complexity of Moving Cloud Customers’ Entire IT Infrastructures to Microsoft Azure – Including the Desktop MICROSOFT AZURE ISV: MYCLOUDIT.
Viewpoint Consulting – Committed to your success.
SE 464: Industrial Information systems Systems Engineering Department Industrial Information System LAB 02: Introduction to SAP.
Greg Pierce| Concerto Cloud Services Which Cloud is Right for Microsoft CRM?
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
January 2007 (v1.0) The Rushmore Group, LLC1 SAP Overview The Rushmore Group, LLC.
® IBM Software Group © IBM Corporation IBM Information Server Service Oriented Architecture WebSphere Information Services Director (WISD)
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
SOA Landscape Recommendations By >. Who we are  Team Members  Company History  Current & Past Client Projects  Note: have fun here. Make up your history.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
BMC Software confidential. BMC Performance Manager Will Brown.
Application Data Security Stallion Winter Seminar 2009 Otepää, March 06th 2009.
IBM Software Group - IBM Systems Group © 2006 IBM Corporation IBM Software Group | IBM Systems Grouppage 1 Team Collaboration Software Selling Strategy.
BUSINESS DRIVEN TECHNOLOGY
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Imperva Total Application Security Idan Soen, CISSP Security Engineer SecureSphere – The First Dynamic Profiling Firewall Idan Soen, CISSP Security Engineer.
Leveraging Oracle Data for Web- Based Reporting Northern California Oracle Users Group May 2001.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
April, 2008 Better Together! Integrated GP & CRM AN INDEPENDENT MEMBER OF BAKER TILLY INTERNATIONAL 505 AFFILIATE OFFICES WORLDWIDE.
Chapter 6 of the Executive Guide manual Technology.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Microsoft TechForge 2009 SQL Server 2008 Unplugged Microsoft’s Data Platform Vinod Kumar Technology Evangelist – DB and BI
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
Building Tomorrow’s Corporate Portal David C. Hastings Director, Solutions Management
Security Business Partner Guide Value Propositions
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
ERP For Payments Presented by: Greg Midtbo Oracle Corporation Industry Vice President Financial Services.
The Cloud: Risks, Rewards and Realities Global customer base, major footprint in Fortune 500 Global presence with dual headquarters in the US & offices.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
Network security Product Group 2 McAfee Network Security Platform.
Actualog Social PIM Helps Companies to Manage and Share Product Information Using Secure, Scalable Ease of Microsoft Azure MICROSOFT AZURE ISV PROFILE:
Company Confidential Leverage Your E-Business Suite as Part of Your Sales Performance Management Strategy January 17, 2008.
== Enovatio Delivers a Scalable Project Management Solution Minus Large Upfront Infrastructure Costs, Thanks to the Powerful Microsoft Azure Platform MICROSOFT.
SQL Server 2008 R2 Manageability. Challenges facing database administrators today: Scaling management to multiple data centers Proactively monitoring.
VeriShield Protect Revolutionary technology that simplifies PCI DSS compliance with no system upgrades Now available on V x Solutions!
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
Building a Sound Security and Compliance Environment for Dynamics AX Frank Vukovits Dennis Christiansen Fastpath, Inc.
©2014 Cleo. All rights reserved. Company confidential. Managing Chaos: Andy Moir Director, Product Marketing 2 Data Movement in 2015.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
Task Performance Group Provides Cutting-Edge E-Commerce B2B EDI Integration Using MegaXML SaaS Solution on Microsoft Azure Cloud Platform MICROSOFT AZURE.
Partner Toolbox Cloud Infrastructure & Management
Real-time protection for web sites and web apps against ATTACKS
Partner Toolbox Cloud Application Development
Hosted on Azure, LoginRadius’ Customer Identity
Speaker’s Name, SAP Month 00, 2017
Vertex & EnterpriseOne
Trend Micro Control Manager 5.0
DeFacto Planning on the Powerful Microsoft Azure Platform Puts the Power of Intelligent and Timely Planning at Any Business Manager’s Fingertips Partner.
Smart Team Making a Beautiful software
Imperva The Leader in Application Data Security and Compliance Eran Cohen EMEA Sale Engineer
GRC - A Strategic Approach
Microsoft Virtual Academy
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Imperva The Leader in Application Data Security and Compliance Eran Cohen EMEA Sale Engineer

2 Agenda Corporate Overview Application Data Security and Compliance Why is it so difficult? Introduction to Imperva Solutions Universal User Tracking Why Customers Select Imperva

3 Imperva Mission To deliver the industry’s most robust and widely deployed solution for addressing application data security and compliance issues.

4 Leader in application data security and compliance –The market leader in Web Application Firewalls –Market leader in Database Audit, Monitoring and Security –Most impressive data security and compliance customer base in the industry Founded in 2002 Global Company –US headquarters in California; International headquarters in Israel –Local presence in all major global markets: USA, UK, France, Germany, Japan, China, Taiwan, Israel 50 active channel partners world-wide 300+ customers, will double customer base in ’07 Seasoned management team, led by President and CEO Shlomo Kramer, one of 3 founders of Check Point Imperva Overview

5 Finance Media / Telco Healthcare Insurance Credit Card Our Customers by Key Industry Segments

6 Healthcare Insurance Credit Card Government Technology Other eRetail / Retail Our Customers by Key Industry Segments

7 What is the Challenge ? Controlling Unauthorized Activity Business Users Administrators Developers Internal Users Customers Partners Internet Users External Users Application Data Privilege Abuse Vulnerability Exploit Privilege Abuse Privilege abuse – Unauthorized Activity inside the Business ProcessPrivilege abuse – Unauthorized Activity inside the Business Process –Internal user usage of data outside their job function Technical staff accessing data in the infrastructure they supportTechnical staff accessing data in the infrastructure they support –External users performing activity outside authorized use of application Vulnerability exploits - Unauthorized Activity outside the Business ProcessVulnerability exploits - Unauthorized Activity outside the Business Process –Internal or external user exploiting vulnerabilities in the application or infrastructure to gain unauthorized access to data Privilege abuse – Unauthorized Activity inside the Business ProcessPrivilege abuse – Unauthorized Activity inside the Business Process –Internal user usage of data outside their job function Technical staff accessing data in the infrastructure they supportTechnical staff accessing data in the infrastructure they support –External users performing activity outside authorized use of application Vulnerability exploits - Unauthorized Activity outside the Business ProcessVulnerability exploits - Unauthorized Activity outside the Business Process –Internal or external user exploiting vulnerabilities in the application or infrastructure to gain unauthorized access to data

8 The Data Governance Paradox Option 2: Fail Audits –Significant Implications SOX – Companies that fail audit can’t report earnings –Loss of credibility, public trust and business –Worst case scenario is de- listing –Executives of companies that report fraudulently are personally liable and face jail-time PCI – Fines of up to $500,000 per failed audit Option 1: Manually Pass Audits –Expensive Consulting, verification and audit investment is high Medium business spend 2.55% of revenues on SOX compliance –Disruptive Often requires detailed analysis and major revamp of critical business processes Takes up significant amount of on-going personnel time (40% for some organizations) 90% of organizations fail audits

9 Web/Web Services Custom Applications Business Applications Protecting & Governing Data: What’s Entailed? Direct Access via Database Protocols –DBAs via query tools –Internal users via Fat client applications (e.g., Visual Basic) Three-tier applications –Internal users via Business applications SAP, E-Business Suite, Peoplesoft Custom 3-tier applications Web applications –Internal & External users via browser interfaces Both packaged and custom applications Application Interfaces –Applications via Web Services Interfaces Browser DBA SQL Data Thin Client 3 Tier App Thick Client 2 Tier App Thin Client 3 Tier App Application Interface

10 Why is this so tough? Business Applications are Big and Complex So are Regulatory Mandates Profitability of data theft tempts internal users Many potential solutions burdens IT ERP CRM ? ? ? Custom Legacy Apps Internet Facing Apps Other Data Stores Internal User

11 Introducing SecureSphere Industry’s only complete solution for security and compliance of enterprise data. Activity monitoring, audit and security for business applications and databases. Offers full visibility into data usage –From end user through application and into database –Hybrid network and host-based architecture Visibility and controls for all data access points >300 customers, 1000’s of sites and 10,000’s of applications protected “Database monitoring and auditing is one of the most promising new categories of data security, and one with particular appeal to internal and external auditors.” Rich Mogull, Research Vice President, Gartner

12 Easing Regulatory and Security Compliance Meet Business and Technical Needs Complete Data Governance and Protection Assess the IT environment Set Controls and Policies Monitor Activity and Enforce the Rules Measure against regulatory requirements and security policies Seamless Deployment, Unrivaled Operational Efficiency No Impact on Database Server No Impact on Applications or Network No On-going Tuning Hierarchical Object Oriented definition of Users, Roles, Applications Task Oriented Workflow Covers all WEB traffic and WEB Services Covers all major databases – Oracle, SQL Server, Sybase,IBM DB2 (including z/OS) and Informix

13 MX Management Server –Centralized operations –Role-based Administration –Hierarchical management for large organizations Web Application Firewall (WAF) –Automated, efficient application security –Starting point for some enterprises Most customers expand to DSG in second phase Database Security Gateway (DSG) –Adds preventative controls to DMG Active security enforcement DBA Monitor Agents –Provides full visibility into local activity on database servers –Complementary to Database Appliances Database Monitoring Gateway (DMG) –Full DB Audit and security lifecycle Assessment Policies Monitoring Measurement –Full visibility to the end (application) user –Full compliance policy and reporting suite Imperva SecureSphere Product Line Web Application Firewall –Protect applications –Protect Web services Database Monitoring Gateway –Audit database activity –Assess DB against best practices Database Security Gateway –Protect database –Assess database and audit activity Management Server Unified, scalable management DB Monitor Agent Local Privileged Activity Monitoring

14 Imperva Application Defense Center Application Data Security and Compliance Experts –Researches latest threats and compliance best practices Applications (SAP, Oracle EBS, PHP, Perl, OWA & others) Databases (Oracle, DB2, SQL-Server & others) Compliance mandates (SOX, PCI, HIPAA & others) –Provides weekly & on demand updates via ADC Insight Services

15 Universal User Tracking Imperva SecureSphere provides the most: Accurate Effective Flexible set of user identification mechanisms to identify the user responsible for each instance of database access

16 Application User Tracking Web Application User Tracking: –Identifies and tracks individual web users and their interactions with web applications Web to Database User Tracking: –Tracks each web application user’s activities from their interactions with the web application through each of their interactions with the database SQL Connection User Tracking: –Links each end user’s identity to the SQL commands the user makes to a database in cases of connection pooling

17 Why Customers Chose Imperva Business Relevant Reporting Highly customizable reporting for specific business applications & regulatory mandates. Automation & Accuracy Ability to model change to applications, usage patterns and data structures over time. Integrated End-to-end Coverage Full coverage for all paths to the data. A unified view of access that simplifies management and provides full information to satisfy auditors and forensic investigators Performance & Scalability Capacity, availability and ease of management that meets the deployment requirements of complex global companies World Class Customer Service Imperva customers enjoy 24 X 7 X 365 access to a global team of engineers with deep technical expertise and real-world deployment experience.

Thank You Imperva, Inc.