Imperva SecureSphere Web Application Firewall
November 01, 2011
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Many built-in, advanced features, including full integration with vulnerability scanners.
- Weaknesses: Can be too pricey for some environments.
- Verdict: Very broad feature set and excellent performance, though all of that comes at a price.
The SecureSphere Web Application Firewall from Imperva offers up some interesting functionality. This appliance includes the usual protection for XML and web applications, but also offers integration with web application vulnerability scanners to patch flaws before they can be exploited. This product also can identify and block known malicious IP addresses, anonymous proxy addresses and known phishing URLs.
We found this tool to be quite straightforward to deploy and configure. Initial setup takes just a few minutes and is done by connecting through a terminal session. After the initial configuration is complete, all further management is done through a web-based interface. We found this to be a little overwhelming at first, but we quickly became accustomed to navigating around and setting up policies and rules.
This solution includes a multitude of deployment options that make it flexible for any organization. It can be deployed inline or as a sniffing gateway, a discovery and assessment server, and a high-availability cluster. This, combined with many onboard policies and Imperva's built-in correlation engine, is what makes this product a highly flexible web application firewall.
Documentation includes a short quick-start, as well as an onboard administrator guide. The quick-start guide details not only the initial configuration steps, but also the many deployment options, with clear and easy-to-understand diagrams.
Imperva offers customers many support options that are available by subscription. Customers with agreements gain access to various levels of phone- and email-based technical assistance.
At a price of $31,000, this product may seem quite expensive, but we find it a good value for the money based on its advanced feature set, including some solid integration capabilities.
SC Magazine Articles
- USAA members hit with multiple phishing attacks
- Three zero-days found in iOS, Apple suggests users update their iPhone
- MedSec goes its own way with medical device flaw
- Two-thirds of IT security pros surveyed expect a breach to hit their company, report
- Juniper confirms leaked "NSA exploits" affect its firewalls, no patch released yet
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Don't connect your charging cell to a computer or you may get hacked!
- Six senators urge Obama to prioritize cybercrime at G20 summit
- Creating a buzz: USBee software causes air-gapped computers to leak data via USB connections
- Privacy advocates upset over FAA drone regulations, citizen takes action
- Voter database hack in Illinois by foreign intruder compromises info of 200K
- Fantom and FairWare ransomware discovered