Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Imperva brings Discovery and Assessment Services to Australia

New service aims to help enterprises greatly mitigate the risk of a serious data breach
  • 09 December, 2009 17:13

<p>SYDNEY, December 9. Imperva, the Data Security leader, today announced the availability of Imperva’s Discovery and Assessment Services (DAS) in Australia.</p>
<p>This service helps companies to overcome a major obstacle towards achieving rock-solid data security—finding and cataloguing all potentially sensitive data inside an organisation’s IT environment so data can be protected.</p>
<p>With this service, “organisations will be able to find where all their valuable data is stored so they can protect it,” said Stree Naidu, VP of Asia Pacific &amp; Japan at Imperva. Not knowing where data resides is a major problem that leads to data breaches. According to a 2008 Verizon Data Breach Investigation Report across 500 cases, in 90 per cent of the breaches the compromised system was unknown to the organisation and/or the organisation didn’t realise the type of data it contained.</p>
<p>The DAS offering consists of four essential features:</p>
<p>• Mapping databases on the network: Applications and databases are scattered throughout the network. Accurately mapping where databases are located is the first step in assessing governance and compliance risk. Imperva’s rigorous scanning process will map all databases on the network and surface ‘rogue’ databases.</p>
<p>• Identifying where sensitive data lives: Locating sensitive data, such as credit card and social security numbers, as well as other personally identifiable information, can be a daunting task for IT organisations. Imperva’s automated classification process will highlight well-known and custom sensitive data types, and track their location down to the database object, row and column.</p>
<p>• Vulnerability assessment: Comprehensive assessment of platform, software, and configuration vulnerabilities helps assess the risk to databases that host sensitive data. The assessment results in a set of detailed reports documenting vulnerabilities that may put databases at risk. The reports further provide specific recommendations for mitigating or eliminating these vulnerabilities.</p>
<p>• Data risk analysis: The combined analysis of identified vulnerabilities and sensitive data enables educated decision making. In the final phase of the engagement, Imperva’s team will provide a complete report of the risk associated with each data asset based on data sensitivity and the level of platform and database exposure. Risk-centric prioritisation is the guideline for managing risk reduction efforts.</p>
<p>“These essential technologies and services will ensure that no government or private enterprise need worry about finding and protecting their important, confidential data. By employing DAS, companies will greatly mitigate their odds of a significant breach,” said Naidu.</p>
<p>About Imperva
Imperva, the Data Security leader, enables a complete security lifecycle for business databases and the applications that use them. Over 4,500 of the world’s leading enterprises, government organisations, and managed service providers rely on Imperva to prevent sensitive data theft, protect against data breaches, secure applications, and ensure data confidentiality. The award-winning Imperva SecureSphere is the only solution that delivers full activity monitoring from the database to the accountable application user and is recognised for its overall ease of management and deployment. For more information, visit</p>
<p>Media queries</p>
<p>Grenadine Lau
Phone: +65.6749 4482
Mobile: +65.9666 1886
<p>David Frost
PR Deadlines Pty Ltd, for Imperva
Phone: +61.2.4341 5021
Mobile: +61 (0) 408 408 210

Most Popular

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Media Release

More media release