OVERVIEW

Keep on Top of File Access Activity, Streamline Your Processes, Cut Costs

You can avoid compliance-related penalties by making sure your sensitive business data is protected, no matter where it’s stored. As organizations have tightened their controls on databases, auditors have been shifting focus to files. Accounting for file data that’s spread across the company doesn’t need to be an overwhelming task. With Imperva, you can save time and meet compliance requirements by easily keeping track of user activity and access rights—and show auditors you’re on top of protecting your data.

SPECIFICATIONS

File Activity Monitor Specifications

SPECIFICATION DESCRIPTION
Operating Systems Supported
  • Windows 2003, 2008 and 2012
  • RedHat 5.X
  • Solaris 10
File Systems Supported
  • CIFS file storage systems
  • NFS file storage systems
  • NAS devices
Directory Services Supported
  • Microsoft Active Directory users and groups
User Rights Management
  • Audit user access rights to files and lists via file systems permissions
  • Validate excessive rights on sensitive data
  • Identify dormant accounts
  • Identify files accessible by global groups
  • Track changes to user rights
  • Revoke rights and group membership
  • Recommend data owners
File System Activity Audit
  • User name
  • Domain
  • Object name
  • Groups
  • Operation (add/remove/delete)
  • Object type
  • Attribute
  • Before and after value
  • Source and Destination IP
Data Classification
  • Metadata and content-based via integration with third party Data Loss Prevention (DLP) vendorssuch as RSA, Websense, McAfee, and Symantec
  • Manual designation
Tamper-Proof Audit Trail
  • Audit trail stored in a tamper-proof repository
  • Optional encryption or digitally signing of audit data
  • Role based access controls to view audit data (read-only)
  • Real-time visibility of audit data
Deployment Modes
  • Network: Non-inline sniffer, transparent bridge
  • Host: Lightweight agents (local or global mode)
Management
  • Web User Interface (HTTP/HTTPS)
  • Command Line Interface (SSH/Console)
Administration
  • MX Server for centralized management
Events and Reporting
  • SNMP
  • Syslog
  • Integration with leading SIEM vendors
  • Email to data owners and other stakeholders
  • Custom followed action
  • SecureSphere task workflow
  • Integrated graphical reporting
  • Real-time dashboard
Related Products
  • File Firewall
  • User Rights Management for Files
  • Directory Services Monitor

Key Capabilities

 

AN EASIER WAY TO MEET COMPLIANCE REQUIREMENTS
File Activity Monitor simplifies the compliance process by allowing you to continuously audit file storage systems and keep a detailed record of every file access across the company, including the actions of privileged users. Show that you have tight controls in place with flexible reports that summarize your audit data.

SAVE TIME AND IMPROVE RESULTS WITH AUTOMATED ACCESS RIGHTS REVIEWS

Make sure you’re in compliance by assigning and establishing file access rights on a need-to-know basis. With SecureSphere, you can streamline the complicated access rights review process and create a repeatable workflow. Let data owners decide who should have access to files by directly involving them in rights reviews. Learn more about User Rights Management for Files.

IMPROVE IT’S PRODUCTIVITY AND CUT COSTS

Boost the productivity of your IT staff by automating those manual tasks critical to managing file data. With File Activity Monitor, your IT organization can efficiently identify data owners, manage file access permissions, track file activity, implement ethical walls, and investigate unusual activity.

KNOW WHEN THERE’S TROUBLE—IMMEDIATELY

Timing is everything. File Activity Monitor notifies you as soon as unusual file access behavior occurs. Rest assured that your most critical files are being continuously monitored by Imperva’s sophisticated, policy-based file security technology. And you can take security to the next level by blocking suspicious file access with File Firewall.

SAVE MONEY BY UNCOVERING UNUSED DATA

You can cut costs quickly by reclaiming storage space that’s taken up by unused file data. With SecureSphere, you can determine exactly which data is and isn’t being used and then efficiently archive or delete unused data.