Imperva SecureSphere Database Activity Monitoring v8.5
November 01, 2011
basic: X2500 appliance with management server (M100): $55,000
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Multiple deployment options, and audit and forensic capabilities.
- Weaknesses: Pricey. Not as simple to use as one would expect in an appliance-based solution.
- Verdict: Delivers a lot of capabilities. We make this our Recommended choice.
SecureSphere Database Activity Monitoring (DAM) v8.5 from Imperva continuously monitors and audits all database operations, including privileged user access and response, to detect and block attacks and data leaks. The product uses a dynamic profiling behavior-based baseline to help determine malicious behavior or variances in use.
The solution is deployed as a set of hardware appliances. We used two, the M100 Management Server and the X2500 database activity monitoring appliance. Imperva also offers a virtual appliance that can be deployed on in-house hardware.
SecureSphere DAM enables continuous monitoring and granular auditing of all database operations in real time, providing organizations with a detailed audit trail that shows the "who, what, when, where and how" of each transaction. The solution captures all database activity, including data definition language (DDL), data manipulation language (DML), and data control language (DCL). In addition, it will record read-only activity (SELECTs), changes made to stored procedures, triggers and database objects, as well as SQL errors and database login activity. Additionally, it looks for various database attacks at the OS, protocol and SQL levels, including SQL injection, buffer overflow denial-of-service attacks and protocol violations.
The user interface is fairly easy to pilot. However, the documentation was lacking in detail relating to management and configuration of the system.
The application was at the high end of the pricing scale, but it delivers quite a number of capabilities. It is a true enterprise-class solution.
Sign up to our newsletters
SC Magazine Articles
- APT operation 'Double Tap' exploits serious Windows OLE bug
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Man gets 18 months in prison for accessing Subway POS devices, loading up gift cards
- The Internet of Things (IoT) will fail if security has no context
- Regin: nation-state possibly behind the stealthy modular spying malware
- Operators disable firewall features to increase network performance, survey finds
- DDoS attacks cost organizations $40,000 per hour, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Syrian Electronic Army redirects Gigya, briefly compromises media sites on Thanksgiving Day
- Study: 'High priority' issues hamper endpoint security solution implementation
- Researchers identify POS malware targeting ticket machines, electronic kiosks
- Pirated Joomla, WordPress, Drupal themes and plugins contain CryptoPHP backdoor
- DDoS attacks grew in size, threats became more complex, Q3 reports say