Imperva protects websites, applications, and databases wherever you deploy them. NCSi engineers leverage the Imperva suite because it is an effective tool in securing your data from attack. Here’s why Imperva is in our quiver of tools:
CIS Security Control Support
Imperva’s solutions address 11 of the 20 CIS controls according to our NCSi Security Controls attack plan. This plan is available for you to download. The specific controls Imperva addresses are:
Center for Internet Security (CIS) Critical Security Controls V6.1
#1 Inventory of Authorized and Unauthorized Devices
#2 Inventory of Authorized and Unauthorized Software
#3 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
#5 Controlled Use of Administrative Privileges
#6 Maintenance, Monitoring, and Analysis of Audit Logs
#9 Limitation and Control of Network Ports, Protocols, and Services
#12 Boundary Defense
#13 Data Protection
#14 Controlled Access Based on the Need to Know
#16 Account Monitoring and Control
#18 Application Software Security
How Imperva Works
Imperva organizes its security offerings into seven categories. Let’s look at each one.
Always-on DDoS protection enables automatic detection and mitigation of attacks, blocking low & slow and volumetric attacks against websites, applications, and infrastructure. This protection also improves your website performance through load balancing and the use of a global CDN (content delivery network.)
Application Security and Threat Intelligence
Applications are protected from hackers and previously unknown weaknesses through dynamic application behavior profiling and virtual application patching. Integrated Threat Intelligence stops logical and technical attacks. Flexibility in application management allows you to deploy Imperva application security in the cloud or on-site.
Compliance audit processes are simplified and sensitive data discovered and protected. Structured and unstructured data throughout the entire organization can be located, classified, and analyzed. Sensitive data can be hidden or masked to guarantee data integrity and confidentiality whether in the cloud or on-site.
Real-time monitoring and blocking enables visibility and access control for data security in SharePoint systems and on file servers. Easily keep track of user activity and access rights to meet file compliance requirements. Keep sophisticated hackers at bay.
Imperva extends your security to the cloud, protecting IaaS (Infrastructure as a Service) and SaaS (Software as a Service) services from cyber attacks. Hybrid deployment — both in the cloud and on-site — is also managed and protected. A cloud-access security broker discovers cloud-based applications, providing superior protection for both apps and database infrastructure on Azure (Microsoft) and AWS (Amazon).
Innovative cyber security software learns a user’s baseline data access behavior and then flags dangerous activity. Risky users are contained to prevent data breaches proactively. User data access is monitored both in the cloud and on-site.
Cyber Security Platform
A highly scalable platform improves operational efficiency and protects applications and data. The platform supports massive traffic loads and offers multi-gigabit throughput. Hot-swappable, redundant components maximize uptime. Scalable web, database, and file security management are unified in one common platform.
NCSi and Imperva – Fighting Cybercrime
Cybercrime feeds off of unsecured data. Keeping your data safe and secure is the business of NCSi and Imperva together. We’ve discussed the broad categories that Imperva uses to make its products’ value easy to understand. There are multiple products in each category, and each product overlaps into other categories. For example:
- Incapsula and SecureSphere: DDoS Protection
- Incapsula, SecureSphere, and ThreatRadar: Application Security, Threat Intelligence
- SecureSphere and CounterBreach: Data Security, Breach Prevention
Contact Us To Get Started With Imperva
To make use of these great Imperva products does take some expertise. NCSi offers that expertise, and combines these tools with all the others in the NCSi engineers’ toolbox to bring your cyber attack threat as close to zero as possible. That’s our goal. We welcome your comments, questions, and suggestions. Contact us for a complimentary data security evaluation.