Date: 02/11/2025
Vendor: Thales
Technology/Topic: Imperva Data Security Fabric (DSF)
URL: https://www.thalestct.com
TEM Presentation Video (milTube)
______________________________________________
Welcome to the Technical Exchange Meeting (TEM)!
Thales Imperva Data Security Fabric is a data security solution that provides complete visibility and understanding into how data is accessed. The goal of cybersecurity in general is to protect data and its availability. Data Security Fabric provides actionable insights into the use of data – whether such access is legitimate and proper or inappropriate and nefarious – allowing security practitioners the ability to mitigate dangerous access.
The Data Security Fabric approach has evolved over the course of 15 years. Initially the solution (known then as Database Activity Monitoring/Firewall) focused on database activity monitoring in compliance with audit requirements (as defined by STIG or in the commercial world by various compliance programs such as SOX, HIPAA, PCI-DSS…). While it could be configured to look for specific events considered risky, the challenge was that the volume of audit information was too wieldy to be useful for a security engineer to effectively monitor. Based on experience with government and commercial customers, Thales Imperva’s own threat research on attacks involving the theft of data, a more sophisticated solution has evolved that brings analytics to bear to produce actionable findings. By going the extra step and understanding a user’s “normal” activity, we can focus on anomalous behavior. What distinguishes Data Security Fabric from general purpose analytics systems such as Splunk and Elastic is that it focuses exclusively on the access of data (which is necessary for legitimate and malicious purposes). Furthermore, we can look at past events going back several years in an ad hoc manner to fully understand a potential security event. The resultant comprehensive narrative description of the detected event gives the security practitioner the ability to quickly react and take appropriate mitigative action. Security Orchestrated Automated Response (SOAR) integrations allow Data Security Fabric to be integrated with ticketing/workflow systems (such as ServiceNow), SIEM (such as Splunk) and other systems for an integrated incident response effort.
Civilian departments within the U.S. Government use Data Security Fabric (and other similar solutions) to meet compliance requirements and provides real data security. Commercial organizations to include Fortune 500 companies in the financial, telecommunications, healthcare, utility, retail commerce, and manufacturing organizations use Data Security Fabric – many times motivated by past breaches or the threat of new breaches.
______________________________________________
To join the DISA TEM mailing list, please contact: disa.tem@mail.mil
______________________________________________
Disclaimer:
— TEMs do not serve as a marketing venue or request for proposal actions.
— TEMs shall not be interpreted as a commitment by the Government to issue a solicitation or ultimately award a contract.
— TEMs do not serve as an endorsement of any presented technologies or capabilities
— Presentations will not be considered as proposals nor will any awards be made as a result of a TEM session.
— TEMs are public open forums – no proprietary or sensitive information should be presented during TEM sessions. Only publicly facing content is permissible in DISA TEM sessions.