Mage™ Joins Imperva Technology Alliance Program

Mage™ has signed a technology partnership agreement with Imperva to provide a data masking alternative to Imperva’s Data Security Fabric (DSF) built-in capabilities for de-identifying sensitive data.

Traditional perimeter security, native data repository access controls, and data encryption solutions are powerless against data breach threats such as data handling mistakes, malicious insiders, and attack exploits that leverage compromised account credentials. Imperva DSF is the first data-centric solution that enables security and compliance teams to quickly and easily secure sensitive data no matter where it resides with an integrated, proactive approach to visibility, control and compliance automation. Mage™ Static Data Masking works across multiple data platforms and supports flexible deployment mechanisms to integrate seamlessly into the existing enterprise IT framework without the need for any additional architectural changes.

“We are excited to have Mage join our growing technology ecosystem,” says Farzad Tari,  VP, Strategic Partnerships and Corporate Development, Imperva. “Through this technology partnership with Mage, customers can stay on top of privacy regulations while ensuring the security and privacy of data by masking it.”

Rajesh Parthasarathy, CEO of Mage™ added, “This technology partnership between Imperva and Mage™ will be a great enabler for organizations looking for a top-notch solution to tackle their data security needs. As customers are moving to more modern data platforms, we are working with Imperva to offer the best of both of our industry leading technologies. Customers will benefit by gaining access to two world-class solutions in a single, seamlessly integrated data security framework/fabric.”

Imperva is the comprehensive digital security leader whose mission is to help organizations protect their data and all paths to it. With an integrated approach combining edge, application security, and data security, Imperva protects all digital experiences, from business logic to APIs, microservices, and the data layer, and from vulnerable, legacy environments to cloud-first organizations.

Previous ArticleNext Article

Leave a Reply

Your email address will not be published. Required fields are marked *