Imperva Data Security

Imperva Data Security
Formerly SecureSphere for Data

About TrustRadius Scoring
Score 9.0 out of 100
Imperva Data Security

Overview

Recent Reviews

Reviewer Pros & Cons

View all pros & cons

Video Reviews

Leaving a video review helps other professionals like you evaluate products. Be the first one in your network to record a review of Imperva Data Security, and make your voice heard!

Pricing

View all pricing
N/A
Unavailable

What is Imperva Data Security?

Imperva Data Security (formerly SecureSphere for Data) is an enterprise application and file security suite, combining database and file security management and monitoring under its database.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting / Integration Services

Would you like us to let the vendor know that you want pricing?

5 people want pricing too

Alternatives Pricing

What is Cyral?

Cyral is a cloud-native Security-as-Code solution to protect the modern data layer. It allows engineering teams to observe, secure, and manage data endpoints in a cloud via a sidecar.

Features Scorecard

No scorecards have been submitted for this product yet..

Product Details

What is Imperva Data Security?

Imperva Data Security (formerly SecureSphere for Data) is an enterprise application and file security suite, combining database and file security management and monitoring under its database.

Imperva Data Security Video

Cloud Data Security | Imperva.

Imperva Data Security Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Comparisons

View all alternatives

Compare with

Reviews and Ratings

 (7)

Reviews

(1-2 of 2)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Review Source
We are using the product across the entire organization for all of our SQL database servers. We use it primarily as a compliance tool for reporting and HiTrust certification. Our organization standards mandate that any new SQL database being configured has the Imperva Data Security agent installed on the system. We also ensure that our systems are configured with failover so that we do not lose any audit data.
  • The options available for auditing are outstanding.
  • The system has very good reliability and tuning options for the agents on the servers.
  • The data gathered is fantastic and presented in a format that is easily readable for auditors.
  • For on prem usage our servers have had no issues. The Linux is extremely resilient and we have no issues with the boxes.
  • Navigation of the menus can get confusing pretty quickly. Since there are so many, it is extremely easy to get lost. Almost too many options and data.
  • Configuring the agents can be very difficult if you are new to it. Having to save after every single change made to an agent during a configuration can be very tedious. Also having to make sure certain options are checked off in two separate places for a single option is very annoying.
  • Navigation of the menus is not always intuitive and not very obvious that the option you are looking change is located in that menu.
Compliance to audits and HiTrust certification. It is key in ensuring that our audits are completed in a timely manner with no repeats of data requests and that we also are HiTrust certified at our organization. Personally while the data obfuscation is available I am not sure I would fully trust that the data is completely sanitized if need be. It's not against the Imperva product but more of issue of data being used.
March 06, 2017

Imperva Review

Jennifer Greulich, GSED, GSEC | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Review Source
This is currently used as a database monitor to monitor activity in all of our critical databases. We monitor transactions, log activity, user activity, and all edits, adds, drops, inserts, etc.
  • Alerts when suspicious activity is detected
  • Records all database transactions for analysis
  • Determines activities in stored procedures
  • Alerts require a lot of tuning to get actionable intelligence
  • Certain common encryption ciphers are incompatible with Imperva and have to be disabled at the server level
  • Technical support is sometimes a little hard to work with
Imperva is great to monitor when new users access a database and will monitor when there are unauthorized users or activity is occurring. Imperva is not well suited to interpret whether an activity is unauthorized or not. The administrator has to be familiar with what the organization determines as good or bad traffic.