member sign-in
Forgot password? Create new account Close

Database Security


Database security represents a system comprised of systems, procedures and processes intended to protect the databases from unintended activity, whether it refers to authenticated users with unintended usage, malicious attacks or unintended mistakes made by legitimate users or even system processes.

The DMZ firewalls, coupled with network and host IPSes were the traditional solutions to protect the databases., especially against unauthorized access. As the unintended traffic can be proliferated also by legitimate users, additional layers of security have to be in place: access control, auditing, encryption and integrity controls.

Database Activity Monitoring / Database Firewall

Database activity monitoring (DAM) / Database Firewall (DBF) monitors database activity to identify fraudulent, illegal or other undesirable behavior, by using  embedded knowledge about database structures and access to analytics and reporting and enforce policies and ...

Database Encryption

Database encryption is the technology used data protection from databases. Encryption can applied to the contents through native database functions or externally with third party tool. Database encryption can be classified in two basic types: Transparent/External Encryption ...

Database Vulnerability Assessment

Database vulnerability assessments solutions transparently scan the databases for known vulnerabilities and against security standards and compliance. They operate independently of the database management system (DBMS) audit functionality of the database itself. On the other ...


  • Preparing Your Organization for the GDPR

    So far, in Parts 1 and 2 of our GDPR series, we’ve covered who is subject to GDPR requirements and what the specific data security requirements are.  In this post, we’ll look at what the GDPR means for organizations and how to prepare. Even though enforcement doesn’t begin until May 2018, there are some key questions every organization should be asking itself as the enforcement day approaches. What Data Do You Have and Where is it Stored? You need to assess what kinds of data your organization currently has under management.  ...

    read all
  • GDPR Series, Part 1: Does the GDPR Apply to You?

    Generating much interest (and concern) globally is the European Union General Data Protection Regulation (GDPR), the successor to the Data Protection Directive (95/46/EC). Enforcement is slated to begin in May 2018, and those not in compliance can expect very stiff financial penalties. In the meantime, companies should revisit their security and compliance strategies to ensure they’re prepared to meet GDPR requirements. This is the first in a series of four blog posts examining the GDPR, specifically: To whom the GDPR applies The ...

    read all
  • How to Run a Database Vulnerability Scan with Scuba

    You’ve downloaded and installed Scuba, Imperva’s free database vulnerability scanner, which provides more than 2,300 assessment tests for detecting database security vulnerabilities and configuration flaws on popular enterprise databases such as Oracle, Microsoft SQL, SAP Sybase, IBM DB2 and MySQL. Now you want to know if there are any security vulnerabilities in your database(s) and, if there are, what you need to do to remedy the situation. This post walks you through the steps. First, you need to set baseline permissions for your database(s). ...

    read all
  • A CISO’s Take on Phishing Prevention, Layered Security, and Managing Insider Threats

    Where does security sit in the IT organization? What techniques do you use to improve security awareness? How do you handle phishing and suspicious activity from insiders and contractors? Imperva CISO, Shahar Ben Hador, answered these questions and more in a Q&A webinar we held featuring his perspectives on a number of IT and security-related topics. Compiled below are excerpts from six questions and answers we found particularly interesting and thought you might also find valuable. Click here to view the full webinar: “Unedited: Tales, Tips and Technologies ...

    read all
  • Top 3 Reasons to Include Data Masking in Your Data Security Strategy

    What is Data Masking? Also known as data anonymization or pseudonymization, data masking is used to reduce the unnecessary spread and exposure of sensitive data within an organization—protecting it while simultaneously maintaining its usability. Data masking replaces real data with functional fictitious data so that it can be used safely in situations where actual data is not needed. Gartner describes it as a technology that “can dynamically or statistically protect sensitive data by replacing it with fictitious data that looks realistic to prevent ...

    read all