Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

Imperva and ActiveBase Partner on Data Monitoring and Masking Solution

Data security vendor Imperva and data masking solutions provider ActiveBase, are partnering to offer a comprehensive protection solution for sensitive data.

The partnership, announced this week, will allow joint customers to protect sensitive data from those who don’t need to see it. The solution, for example, will allow personal data to be shielded from IT personnel such as outsourced support teams and protect personal information in training and development environments.

Data security vendor Imperva and data masking solutions provider ActiveBase, are partnering to offer a comprehensive protection solution for sensitive data.

The partnership, announced this week, will allow joint customers to protect sensitive data from those who don’t need to see it. The solution, for example, will allow personal data to be shielded from IT personnel such as outsourced support teams and protect personal information in training and development environments.

Gartner analyst Joseph Feiman, in a recent report, observed that “combining elements of static data masking, IAM and DAM enable the creation of a new capability — Dynamic Data Masking — that aims at real-time data masking, typically in production databases (for example, hiding payment card data from customer service personnel working in call centers).”

“Having ActiveBase dynamically mask sensitive data presented within application screens and development tools across production environments with no changes to applications or databases, combined with Imperva’s database activity monitoring enables us to proactively prevent data leakage and comply with ever growing privacy regulations quickly and transparently,” said Alon Ofek, CISO of Pelephone Communications, a leader in cellular communications.

Imperva and ActiveBase plan to jointly sell and implement the solution.

Related Content: Imperva Launches Hacker Intelligence Initiative

Advertisement. Scroll to continue reading.
Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Audits

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...