

Imperva Data Security Fabric and Securiti are major contenders in the data security market. Imperva holds an advantage with robust security and compliance features, while Securiti excels in data privacy and user-friendly design.
Features: Imperva is known for effective threat alerts, database activity monitoring, and a web application firewall, offering real-time insights and historic data review. Its granular policy settings and automated rule application enhance deployment efficiency. Securiti focuses on data privacy, with automated data discovery and classification, consent management, and compliance tracking. It also provides detailed data lineage tools and manages third-party risks, essential for legal compliance and operational resilience.
Room for Improvement: Imperva can improve its complex user interface and reduce the learning curve for deployment. Its support is sometimes criticized for not being prompt, particularly in complex setups. Securiti needs better automation in classifying user data, as manual review is often required. Enhancements in AI integration and more accessible support resources could benefit users.
Ease of Deployment and Customer Service: Imperva supports on-premises and hybrid cloud deployments but struggles with user-friendliness and consistent support service. Securiti, on the other hand, offers strong public cloud support and seamless integration, appreciated for its user-friendly interfaces. However, although its customer service is moderate, there is scope for improvement in support personalization.
Pricing and ROI: Imperva's pricing is high and complex, challenging for small to medium enterprises, even with satisfactory ROI. The need for clearer cost visibility is highlighted. Securiti's pricing is more flexible and affordable, appealing to a broader audience while still ensuring substantial ROI.
My thoughts on the pricing, setup cost, and licensing of the Imperva SecureSphere Database Security are that it could be more competitive.
With more automation in the SOC and the implementation of the next generation SOC, the headcount required for around-the-clock monitoring of ever increasing IT assets has gone down drastically.
Securiti reduced my manual effort by thirty to forty percent, although my goal is to achieve a hundred percent reduction.
Local vendors provide on-ground support, and if issues cannot be resolved, a support ticket is raised to the OEM via a portal.
Regarding customer support, I would like to see improvements in response time.
The team in Asia-Pacific has been particularly supportive and generous with partners, providing comprehensive assistance and material.
On average, I would rate the technical support four out of ten.
We've got a dedicated engineer, and when we get someone, we get the answer.
The solution works well for large organizations and enterprise levels if appropriately sized during the setup.
The scalability of the Imperva SecureSphere Database Security in accommodating the organization's growth and database security needs is excellent.
I would rate it ten out of ten for scalability.
The tools allow for quick building and testing, reducing overall deployment time.
Securiti's scalability is impressive; it is capable of handling a large workload for a bank having 25,000 plus branches and a customer base of around 400 million customers.
It is important to manage it correctly by performing health checks with the vendor.
I rate the stability of Imperva SecureSphere Database Security as nine because there are ongoing integration processes between Imperva and Thales.
We manage the environment well, and the clients manage it, so it's not crashing.
Overall, its stability compares well to other products.
The top executive or the C-level executives want to understand the impact of implementing the various cyber security solutions in terms of the reduction, tangible reduction in the business risk.
The archiving functionalities should be enhanced to allow easy conversion of archived logs into CSV or Excel formats for data analysis.
We cannot be competitive by price alone, though in terms of quality, Imperva SecureSphere Database Security is the best compared to Russian import products and building products such as Garda, which attempt to copy Imperva's data activity monitoring and database firewall functionality.
It would be beneficial if Securiti had a feature similar to data mesh, allowing users to directly access remote data through the Securiti UI.
It's hard to estimate the cost. They should help with the cost estimation.
Despite them having connectors and ongoing product improvements, there are challenges with data lineage and updating relationships modules that don't match OneTrust's capabilities.
The price is high, but it is not as high as competitors like IBM, Guardian, and Oracle.
Vovalage was more affordable than Securiti.
It's hard to estimate the cost.
Two years ago, it was much cheaper, but now it is more expensive.
The Imperva SecureSphere Database Security has significantly aided my organization in forensic investigations and compliance audits.
Imperva SecureSphere Database Security provides one of the best solutions to analyze data, maintain GDPR compliance, and help investigate any incidents.
If something malicious occurs, I can set a policy to block it, review the action, and decide whether to release it if it's found not to be malicious.
A specific feature I find effective is the sensitive data intelligence (SDA) module, which is very useful for automating compliance processes.
I find the zero trust network, zero trust architecture, ZTA, most valuable and unique in Securiti.
Their data discovery is a fantastic product. It is AI-enabled for automatic tagging and classifiers.
| Product | Market Share (%) |
|---|---|
| Securiti | 2.9% |
| Imperva Data Security Fabric | 2.0% |
| Other | 95.1% |

| Company Size | Count |
|---|---|
| Small Business | 26 |
| Midsize Enterprise | 9 |
| Large Enterprise | 32 |
| Company Size | Count |
|---|---|
| Small Business | 2 |
| Midsize Enterprise | 1 |
| Large Enterprise | 5 |
Imperva Data Security Fabric provides cutting-edge database security, featuring capabilities like activity monitoring, web application firewalls, and real-time alerting for comprehensive data protection.
Imperva Data Security Fabric focuses on securing databases through advanced monitoring, logging, and user behavior analysis. With features designed for ease of configuration, it effectively blocks unauthorized access and maintains detailed audit logs. Integration with other systems and automated reporting enhance vulnerability assessments and compliance efforts. Imperva's data discovery, classification, and masking capabilities strengthen security by managing user rights and uncovering vulnerabilities, making it ideal for protecting sensitive data and supporting forensic and compliance needs.
What are the key features of Imperva Data Security Fabric?Imperva Data Security Fabric is widely used across industries like finance and government, focusing on database security, activity monitoring, and user behavior analysis. It is essential for detecting unauthorized access and preventing data breaches while ensuring compliance. Financial institutions and government agencies leverage its capabilities to maintain data integrity and monitor database activities, implementing firewalls and vulnerability assessments that secure on-premises and cloud environments.
Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls and orchestration across hybrid multicloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance.
Securiti has been recognized with numerous industry and analyst awards, including "Most Innovative Startup" by RSA, "Top 25 Machine Learning Startups" by Forbes, "Most Innovative AI Companies" by CB Insights, "Cool Vendor in Data Security" by Gartner, and "Privacy Management Wave Leader" by Forrester.
For more information, please visit Securiti.ai and follow us on LinkedIn and Twitter.
We monitor all Data Security Posture Management (DSPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.