OVERVIEW

Prevent Data Theft with Imperva’s Industry-Leading File Security Technology

file firewall

Hackers know what they want and where to find it. Critical data centers such as file servers are targets for your “crown jewels,” like intellectual property, deal data, or PII. Cyber-attacks have become increasingly sophisticated, leveraging multiple tactics and tools, all with one goal: getting in. Imperva adds a tough layer of protection directly around your files so that sensitive data is secure—to prevent breaches, along with the resulting exposure, brand damage, and costs that they bring.


SPECIFICATIONS

File Firewall Specifications

SPECIFICATION DESCRIPTION
Operating Systems Supported
  • Windows 2003, 2008 and 2012
  • RedHat 5.X
  • Solaris 10
File Systems Supported
  • Windows file storage systems
  • UNIX/Linux file storage systems
  • NAS devices
Directory Services Supported
  • Microsoft Active Directory users and groups
User Rights Management
  • Audit user access rights to files and lists via file systems permissions
  • Validate excessive rights on sensitive data
  • Identify dormant accounts
  • Identify files accessible by global groups
  • Track changes to user rights
  • Revoke rights and group membership
  • Recommend data owners
File System Activity Audit
  • User name
  • Domain
  • Object name
  • Groups
  • Operation (add/remove/delete)
  • Object type
  • Attribute
  • Before and after value
  • Source and Destination IP
Data Classification
  • Metadata and content-based via integration with third party Data Loss Prevention (DLP) vendorssuch as RSA, Websense, McAfee, and Symantec
  • Manual designation
Tamper-Proof Audit Trail
  • Audit trail stored in a tamper-proof repository
  • Optional encryption or digitally signing of audit data
  • Role based access controls to view audit data (read-only)
  • Real-time visibility of audit data
Deployment Modes
  • Network: Non-inline sniffer, transparent bridge
  • Host: Lightweight agents (local or global mode)
Management
  • Web User Interface (HTTP/HTTPS)
  • Command Line Interface (SSH/Console)
Administration
  • MX Server for centralized management
Events and Reporting
  • SNMP
  • Syslog
  • Integration with leading SIEM vendors
  • Email to data owners and other stakeholders
  • Custom followed action
  • SecureSphere task workflow
  • Integrated graphical reporting
  • Real-time dashboard
Related Products
  • User Rights Management for Files
  • Directory Services Monitor

Key Capabilities

QUICKLY PUT A STOP TO SUSPICIOUS ACTIVITY

Prevent your files from becoming an easy target for internal and external threats. With File Firewall, you can immediately respond to suspicious file access activity by generating notifications, or in certain situations, blocking access completely. With the industry’s leading security policy framework, you can trust that your file data is fully protected.

INCIDENT DETAILS AT YOUR FINGERTIPS

When it comes to security incident response, the sooner the better. Begin investigations right away with immediate access to a record of all file activity across your organization. Uncover all the details in just a few clicks with interactive audit analytics that help you identify suspicious behavior, understand user permissions, and document problems.

BOOST EFFICIENCY AND TIGHTEN CONTROLS WITH AUTOMATED ACCESS RIGHTS REVIEWS

To keep data secure, it’s important to continually review file access permissions. With SecureSphere, you can finally put a regular workflow in place for reviewing file access rights. Allow data owners to make access control decisions by including them in your routine review cycles. Learn more about User Rights Management for Files.

PROTECT YOUR DATA FROM ADVANCED THREATS

You can’t afford to leave your files exposed to malware and targeted attacks. With Imperva and FireEye, you don’t need to worry. Be confident that your sensitive and regulated data is safe from advanced threats with an added layer of protection around your files, triggered by a leading malware detection system. Learn more about Imperva and FireEye.