DAM
A security architect’s POV on a mature data-centric security program, Part 3
In part one of this series, you learned about the challenges associated with accessing, and searching long-term retained database activity logs and identifying sensitive customer data to comply with stricter compliance regulations ...
A security architect’s POV on a mature data-centric security program, Part 1
In this three-part series, you’ll hear first-hand from security architects on the front lines about what it takes to move organizations from a compliance-centric to a mature data-centric database security model. You’ll ...

Database Activity Monitoring: Configuring a Cluster in Four Easy Steps
Imperva SecureSphere Database Activity Monitoring (DAM) offers multiple deployment modes, including managing your gateways in a cluster. There are four steps to configuring a gateway cluster and we’ll be discussing them in ...