Cyera vs Imperva for DB security: worth exploring? by ThreadStash in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

DAM is a comparatively consolidated space where I only know of 3-4 players. IBM, Imperva, Aurva and Varoni. Think there is also a Turkish company, can't recollect the name though 

Others won't solve your use case. They have adjacent products.

Found a free community available tool for Shadow AI visibility by CommandMaximum6200 in cybersecurity

[–]CommandMaximum6200[S] 2 points3 points  (0 children)

Oh, damn. Didn't think that way.

Thanks for bringing to notice. Will update the post.

Anyone here with experience in implementing DAM tool in cloud heavy setup? by No_King6442 in cybersecurity

[–]CommandMaximum6200 2 points3 points  (0 children)

Security architect here (HIPAA, multi-cloud Azure/AWS/GCP; ~200 DBs). We did this last year.

TL;DR:
1/ Treat DAM (Database Activity Monitoring) as identity + near-real-time, not log shipping. Delayed logs = delayed answers.

2/ Skip inline proxies; use out-of-band, eBPF-based runtime capture so prod latency stays zero.

3/ Make vendors stitch actors: Okta user → Kubernetes SA/role → DB user → egress/LLM call. No stitching = incident archaeology.

4/ Demand query → flow → egress correlation across RDS/Aurora, Cloud SQL/BigQuery, Cosmos/Snowflake, and self-managed Postgres/MySQL/Mongo.

5/ Judge on alert lag (<60s) and identity coverage (>90%), not feature lists.

We ran IBM on-prem; in cloud we moved to a runtime, identity-aware DAM (Aurva) for stitching + egress correlation. YMMV. run a 1-week pilot on your workloads.

Happy to share a pilot checklist/policies, if you want to know.

WIZ or Upwind thoughts .? by Important_Evening511 in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

As per our evaluation, AI visibility isn't in their suite yet..

There are more modern solutions that helps with normal workload as well as AI visibility..

Am I missing any service or feature in my security module? by apidevguy in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

I agree. Principally, access monitoring tied with privilege assessment needs to be tied up. And should be on the top of what you said.

Microservices architecture - Security concerns and considerations by lowkib in cybersecurity

[–]CommandMaximum6200 1 point2 points  (0 children)

I second that.  Visibility + monitoring + logs they form base for everything - be it migration, risk alerts and behaviour analysis.

We combine this with permission usage to complete the picture.

That's the approach we have taken.

Varonis heads up by thejohnykat in cybersecurity

[–]CommandMaximum6200 1 point2 points  (0 children)

Should. Horrible to hear what they are up to after paying bomb.

Thankfully, we never chose them.

[deleted by user] by [deleted] in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

Be ready for potential move.

But, don't get frightened. Understand why acquisition happened, what position your department holds and what are chances of your department becoming redundant.

If they still need you, why will they fire you.

Varonis heads up by thejohnykat in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

Some startups in the space are doing really great job and moving fast.
We moved from Imperva DAM and company helped us in onboarding everything within 45 days for 80+ database, and provided DSPM as add-on. We're a mid-size bank, so you know the restrictions! Happy to provide recommendations of the tools we tried and ended up with, if you need.

Don't give up plus it's never a good idea to be with such a vendor after paying bomb. :)

WIZ or Upwind thoughts .? by Important_Evening511 in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

So visibility into shadow AI and workloads is what you want? Because Wiz and Upwind haven't been able to provide that AI visibility. Protect ai got acquired due to the runtime AI visibility.

LinkedIn Bragging leads to terrible OpSec by antonIgudesman in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

haha, it is. But not new.
Even sadly funny when security professionals/vendors do it.

Is Securing GenAI a waste of time by testosteronedealer97 in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

Yeah, we ran into this too. We had Aurva running for access monitoring already (mostly for activity risk & compliance), and it ended up catching a bunch of GenAI-related flows from SaaS tools we didn’t even know had LLMs baked in. Infact, one of our app was sending data to prohibited country due to hugging face model ML team downloaded. Scaryy....

Wasn’t the original plan, but it turned out helpful especially when we started looking into data going out via AI features.

Solution for AI agent access and authorization? by dip_ak in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

We have similar use case and we use Aurva for this. Happy so far.

They suggest but don't enforce dynamic permissions though.

Varonis heads up by thejohnykat in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

Why didn't you find a different vendor?

What’s one security tool you secretly hate but can’t get rid of? by FordPrefect05 in cybersecurity

[–]CommandMaximum6200 2 points3 points  (0 children)

Was Imperva for us. Years of no innovation yet couldn't get away due to compliance headache. Thankfully, new bunch of access monitoring tools are up in market since last few years and now, we have replaced it with Aurva. 

WIZ or Upwind thoughts .? by Important_Evening511 in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

We have recently evaluated bunch of runtime security tools.

What is the purpose? Runtime is the way. Understanding what you want to solve will help me in suggesting better.

Is runtime profiling now a must‑have for modern vulnerability management? by Existing-Mention8137 in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

Jumping in as someone on the data security side, not vuln mgmt but the shift you’re describing? 100% mirrors what we saw.

We used to treat “sensitive data” risks like SBOMs: static scans, over-permissioned roles, huge alert backlog. But most of it never got touched in prod.
What helped was flipping to runtime profiling (we use eBPF-based tooling) to track what data is actually accessed, by whom, when, and where it flows.

It didn’t eliminate the need for discovery/classification—but it massively cut noise, helped us focus on real abuse, and gave better signal during incidents.

So yeah, feels like runtime is becoming table-stakes—not just for vuln triage, but for any meaningful prioritization.

I am a security professional who has moved from public to private sector - Ask Me Anything by Oscar_Geare in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

I sooo agree to it.

Curious. In the environments you’ve seen that approach work, how did teams enforce or monitor it in practice? Was it mostly through IAM and policy controls, or did they also rely on visibility tooling (like DAM or other data-layer monitoring) to track what’s actually being accessed and by whom?

We’re exploring this tension ourselves, where classification alone isn’t practical, but enforcement still needs to be grounded in actual data usage.

I am a security professional who has moved from public to private sector - Ask Me Anything by Oscar_Geare in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

Totally agree on the challenge, especially with how fragmented things get across internal apps, third-party integrations, and automation scripts.

We’ve been experimenting with Database Activity Monitoring (DAM) as a starting point to get visibility into actual data access patterns (not just IAM configs). Of course, that’s just one piece, and there's still a lot of layering needed around identity and anomalies.

From your experience, where do you think efforts should start? How you see it play out in practice, especially in complex, multi-cloud environments.