02:03 PM
Dark Reading
Dark Reading
Products and Releases

Imperva, ArcSight Partner To Integrate Database Monitoring Intelligence With Security Information And Event Management

SecureSphere achieves certified interoperability with ArcSight SIEM Platform under the ArcSight EnterpriseView Partner Program

REDWOOD SHORES, Calif., December 9, 2008 - Imperva, the leader in application data security, today announced that SecureSphere v6.0.6 has achieved certification from ArcSight for its interoperability with the ArcSight SIEM (Security Information and Event Management) Platform. SecureSphere's industry leading database monitoring and protection capabilities, when coupled with the ArcSight SIEM Platform, provide an enterprise-wide view of security threats, risk management analytics, and global reports.

To help organizations centralize security management, incident response, and compliance, SecureSphere can feed database security alerts and audit logs to the ArcSight SIEM Platform. As part of the alliance, the companies will present a free webinar on December 17 on the benefits of integrating database monitoring and event data with SIEM. Details and registration information are available at: http://www.imperva.com/go/siem/.

SecureSphere Adds Deep Database Visibility to ArcSight Imperva's award-winning SecureSphere gateways provide full visibility and granular control over the usage of enterprise business data from the database, through the application, to the accountable end user. Using the ArcSight-developed Common Event Format (CEF) standard, SecureSphere can deliver continuing database security event, alert and audit data to the ArcSight SIEM Platform. Through this integration, SecureSphere enhances ArcSight SIEM with the following database intelligence which can be presented and correlated in a centralized dashboard for enterprise views of security data:

. Cross platform: Automated database audit logs for Oracle, Microsoft-SQL Server, IBM DB2, Sybase, and Informix environments. . Enterprise Applications: A detailed, independent record of database application activity of any kind with specific emphasis on packaged applications like Oracle E-Business Suite, SAP, and PeopleSoft. . Administrator Actions: Local audit logs (e.g. console, telnet, ssh, IPC, and shared memory) of all activity performed by database administrators. . User Activity Tracking: Audit trails that link database activity to users connected through application servers over pooled connections. . Row Level Monitoring: Alerts on suspicious changes to the values of specific records or subsets of table rows.

"Imperva and ArcSight have mutual customers around the world that have requested the ability to pump the deep database security information gathered by SecureSphere into the ArcSight Platform," said Rohit Gupta vice president of business development for Imperva. "The integration of SecureSphere and the ArcSight SIEM Platform provides organizations with a global view of database events and audit logs which they can view side-by-side with other security information to holistically manage risk and simplify compliance with regulatory mandates."

"Imperva's certified CEF integration allows enterprises to provide visibility and control over the use of sensitive information," said Jeff Scheel, senior vice president of business development, ArcSight. "ArcSight customers now can easily correlate SecureSphere's end-to-end analysis of application and database activity with related events across other infrastructure layers to provide simple and efficient security, policy control and event response."

About Imperva

Imperva, the leader in application data security, delivers activity monitoring, real-time protection, and risk management solutions for business applications and data. Imperva's practical solutions provide full visibility into sensitive data, database and application access, enabling granular control and maintenance of critical data. Over 4500 of the world's leading enterprises and government organizations in over 35 countries rely on Imperva's automated, scalable and business-relevant solutions to prevent data theft, data abuse and ensure data integrity. For more information, visit www.imperva.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.