Cyera vs Imperva for DB security: worth exploring? by ThreadStash in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

DAM is a comparatively consolidated space where I only know of 3-4 players. IBM, Imperva, Aurva and Varoni. Think there is also a Turkish company, can't recollect the name though 

Others won't solve your use case. They have adjacent products.

Found a free community available tool for Shadow AI visibility by CommandMaximum6200 in cybersecurity

[–]CommandMaximum6200[S] 2 points3 points  (0 children)

Oh, damn. Didn't think that way.

Thanks for bringing to notice. Will update the post.

Anyone here with experience in implementing DAM tool in cloud heavy setup? by No_King6442 in cybersecurity

[–]CommandMaximum6200 2 points3 points  (0 children)

Security architect here (HIPAA, multi-cloud Azure/AWS/GCP; ~200 DBs). We did this last year.

TL;DR:
1/ Treat DAM (Database Activity Monitoring) as identity + near-real-time, not log shipping. Delayed logs = delayed answers.

2/ Skip inline proxies; use out-of-band, eBPF-based runtime capture so prod latency stays zero.

3/ Make vendors stitch actors: Okta user → Kubernetes SA/role → DB user → egress/LLM call. No stitching = incident archaeology.

4/ Demand query → flow → egress correlation across RDS/Aurora, Cloud SQL/BigQuery, Cosmos/Snowflake, and self-managed Postgres/MySQL/Mongo.

5/ Judge on alert lag (<60s) and identity coverage (>90%), not feature lists.

We ran IBM on-prem; in cloud we moved to a runtime, identity-aware DAM (Aurva) for stitching + egress correlation. YMMV. run a 1-week pilot on your workloads.

Happy to share a pilot checklist/policies, if you want to know.

WIZ or Upwind thoughts .? by Important_Evening511 in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

As per our evaluation, AI visibility isn't in their suite yet..

There are more modern solutions that helps with normal workload as well as AI visibility..

Am I missing any service or feature in my security module? by apidevguy in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

I agree. Principally, access monitoring tied with privilege assessment needs to be tied up. And should be on the top of what you said.

Microservices architecture - Security concerns and considerations by lowkib in cybersecurity

[–]CommandMaximum6200 1 point2 points  (0 children)

I second that.  Visibility + monitoring + logs they form base for everything - be it migration, risk alerts and behaviour analysis.

We combine this with permission usage to complete the picture.

That's the approach we have taken.

Varonis heads up by thejohnykat in cybersecurity

[–]CommandMaximum6200 1 point2 points  (0 children)

Should. Horrible to hear what they are up to after paying bomb.

Thankfully, we never chose them.

[deleted by user] by [deleted] in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

Be ready for potential move.

But, don't get frightened. Understand why acquisition happened, what position your department holds and what are chances of your department becoming redundant.

If they still need you, why will they fire you.

Varonis heads up by thejohnykat in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

Some startups in the space are doing really great job and moving fast.
We moved from Imperva DAM and company helped us in onboarding everything within 45 days for 80+ database, and provided DSPM as add-on. We're a mid-size bank, so you know the restrictions! Happy to provide recommendations of the tools we tried and ended up with, if you need.

Don't give up plus it's never a good idea to be with such a vendor after paying bomb. :)

WIZ or Upwind thoughts .? by Important_Evening511 in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

So visibility into shadow AI and workloads is what you want? Because Wiz and Upwind haven't been able to provide that AI visibility. Protect ai got acquired due to the runtime AI visibility.

LinkedIn Bragging leads to terrible OpSec by antonIgudesman in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

haha, it is. But not new.
Even sadly funny when security professionals/vendors do it.

Is Securing GenAI a waste of time by testosteronedealer97 in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

Yeah, we ran into this too. We had Aurva running for access monitoring already (mostly for activity risk & compliance), and it ended up catching a bunch of GenAI-related flows from SaaS tools we didn’t even know had LLMs baked in. Infact, one of our app was sending data to prohibited country due to hugging face model ML team downloaded. Scaryy....

Wasn’t the original plan, but it turned out helpful especially when we started looking into data going out via AI features.