A security architect’s POV on a mature data-centric security program, Part 3

In part one of this series, you learned about the challenges associated with accessing, and searching long-term retained database activity logs and identifying sensitive customer data to comply with stricter compliance regulations ...

A security architect’s POV on a mature data-centric security program, Part 1

| | CISO, DAM, Data Security, Digest
In this three-part series, you’ll hear first-hand from security architects on the front lines about what it takes to move organizations from a compliance-centric to a mature data-centric database security model. You’ll ...
Database Activity Monitoring: Configuring a Cluster in Four Easy Steps

Database Activity Monitoring: Configuring a Cluster in Four Easy Steps

Imperva SecureSphere Database Activity Monitoring (DAM) offers multiple deployment modes, including managing your gateways in a cluster. There are four steps to configuring a gateway cluster and we’ll be discussing them in ...