My team and I deploy this solution for customers. In Israel, I'm the team leader of the whole Application Security Division.
CTO- Consulting Services at 2bsecure
Provides valuable security when it is properly implemented and maintained
Pros and Cons
- "The most valuable feature of this solution is the database security policy."
- "Technical support for this solution needs improvement."
What is our primary use case?
What is most valuable?
The most valuable feature of this solution is the database security policy.
What needs improvement?
Technical support for this solution needs improvement.
For how long have I used the solution?
Eight to ten years.
Buyer's Guide
Imperva SecureSphere Database Security
June 2025

Learn what your peers think about Imperva SecureSphere Database Security. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
What do I think about the stability of the solution?
The stability of this solution depends on the version of the operating system, itself. Often, when a new version of the OS comes out, it is not stable by nature. Once the new patch comes out then it is fixed.
What do I think about the scalability of the solution?
The scalability is dependent on the deployment surface. If you plan for scalability then you will have it. If you are going to a single, or one box solution, then you don't have scalability.
How are customer service and support?
Technical support for this solution is insufficient. If you have a professional then you can handle it, but if you are a regular customer then it is difficult.
Which solution did I use previously and why did I switch?
We have different solutions in our portfolio, including IBM Guardium and McAfee Sentrigo.
How was the initial setup?
The initial setup of this solution is complex. However, I understand the complexity.
The length of the time it takes for deployment depends on the customer and their environment. It can take up to three months.
What about the implementation team?
We have a team that handles the implementation and deployment of this solution for our customers. I am the team leader.
What other advice do I have?
My advice for anybody implementing this solution is to know what you are doing before deploying. You need to learn the security concept of this product. You need to know what you want to protect, and then learn how to protect it. You cannot just deploy this solution and leave it like that. You need to know how to maintain this product.
Things are being constantly improved in this solution, but there is no such thing as perfect.
I would rate this solution eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
IT Security at rmrf-tech
Provides us with the tools we need to defend against Botnets and DDoS attacks
Pros and Cons
- "The functionality is very useable and easy to understand."
- "It would be better to update the solution by using a GUI that guides me, rather than through a CLI."
What is our primary use case?
I am using Imperva in different projects for application defense.
How has it helped my organization?
This solution provides analytics using rules in the application. For example, it can report who most often uses certain queries.
What is most valuable?
The most valuable feature is the protection from Botnets. The DDoS attack is one of the things that it protects against.
The functionality is very useable and easy to understand. It is also easy to update if you follow the instructions.
What needs improvement?
It would be better to update the solution by using a GUI that guides me, rather than through a CLI. It would be best if it were simply updated automatically from an admin page.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
I think that the stability is fine, although sometimes the server is down.
What do I think about the scalability of the solution?
It is easy to scale. I use only universal appliances and I know exactly how they work.
Three people use this solution on a single server for a few services.
How are customer service and technical support?
We have contacted technical support a few times, and the experience was ok.
Which solution did I use previously and why did I switch?
We did not use another solution prior to this one.
How was the initial setup?
The initial setup for this solution is very easy. Just start it up, log in, and the instructions are there. It is launched from an FTP server and takes four or five hours.
What about the implementation team?
We handled the implementation in-house.
What was our ROI?
It is difficult to say because it has stopped some attacks, but I have nothing to compare against when the solution was not being used. It can protect against attacks, but I cannot say how much money it has saved.
What's my experience with pricing, setup cost, and licensing?
Licensing fees are on a yearly basis, and it is a good value for the money.
Which other solutions did I evaluate?
I was not involved in the selection of the solution.
What other advice do I have?
There are many functions in this solution that I do not use at this time.
This is a fine product, and one of the best. We needed it for DDoS protection and for Botnet protection, and all of this works fine.
I would rate this solution an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
Buyer's Guide
Imperva SecureSphere Database Security
June 2025

Learn what your peers think about Imperva SecureSphere Database Security. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
Software Developer at a university with 1,001-5,000 employees
Good Integration between components helps us to meet the needs of our customers
Pros and Cons
- "It has a lot of different components that cover the needs of our customers."
- "Integration with other databases or third-party products would be useful."
What is our primary use case?
I use this solution to discover missing data, and to find weaknesses or miscalculations in my database standards.
How has it helped my organization?
One example of how this has improved my organization is with respect to security. We previously had a default passcode in place, and this is discouraged by our password policy. I was able to find this problem and solve it.
What is most valuable?
The best feature of this solution is the integration between components. It has a lot of different components that cover the needs of our customers.
What needs improvement?
The pricing for support could be improved.
Integration with other databases or third-party products would be useful.
For how long have I used the solution?
One year.
What do I think about the stability of the solution?
It is a stable solution.
What do I think about the scalability of the solution?
I think that the product is scalable.
There are five users for this solution.
How are customer service and technical support?
I have no experience with their technical support.
Which solution did I use previously and why did I switch?
I did use other tools for a short span of time.
How was the initial setup?
The initial setup for this solution is straightforward.
I am not using the entire solution, so the deployment time was very short. There were five people involved in the installation.
What's my experience with pricing, setup cost, and licensing?
The cost of support for this solution is very expensive.
There are no costs in addition to the standard licensing fees.
Which other solutions did I evaluate?
I looked at several websites and read reviews. All of them said that Imperva is the best product in this area.
What other advice do I have?
My advice is to do a POC before implementing this solution.
I would rate this solution an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Program Manager at a energy/utilities company with 10,001+ employees
Policies and alerts allow us to detect malicious activity in critical databases
Pros and Cons
- "The tool happens to be very intelligent when it comes to processing policies and sounding alerts. It allows us to implement policies and measure actions against them, raising alerts accordingly."
- "The only challenge I see is that SecureSphere is deployed on servers or databases which are held on physical infrastructure. However, there are databases which are hosted on cloud platforms and Imperva has a separate tool altogether for that, not SecureSphere."
What is our primary use case?
The primary use case is specific to database security through log auditing, to identify the actions performed by various users. That gets logged. Then policies are used to see whether any action performed by a database user is below a threshold or above a threshold; whether there should there be an alert because of it.
It is used by specific teams within our organization to monitor activity, to see whether there is any malicious activity or a user who's not supposed to be performing a certain action.
How has it helped my organization?
It helps us look into who's doing what, particularly on databases related to critical applications. That's the way we see it as useful. We've been using it for four or five years now, and it has been bringing in the value that we expected it to.
What is most valuable?
The tool happens to be very intelligent when it comes to processing policies and sounding alerts. It allows us to implement policies and measure actions against them, raising alerts accordingly. That is the best feature.
What needs improvement?
Comparing it with other products in the market, we definitely see that Imperva SecureSphere is head-to-head with the likes of McAfee, IBM Guardium, and others. It's definitely good. The only challenge I see is that SecureSphere is deployed on servers or databases which are held on physical infrastructure. However, there are databases which are hosted on cloud platforms and Imperva has a separate tool altogether for that, not SecureSphere. If an organization is monitoring databases which are on physical as well as virtual infrastructure, running two different tools can become a problem. If that could be merged together it would be an improvement.
Having read about Imperva, I couldn't get much detail as to what their roadmap is for the future, whether they would want to merge them or not. But as a customer, if I can have one tool for various landscapes, like the databases hosted on a physical landscape as well as the virtual ones, that makes it a lot easier.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
The stability has been good. In our case, we've been using it through one of our suppliers so we don't directly manage it. It's our supplier who manages it for us. The supplier happens to manage the infrastructure on which the database application or databases are hosted as well.
We don't deal with it but, getting the reports that we have been getting from our supplier, it looks pretty good as far as stability is concerned. We haven't experienced many issues. Even if there were any, it would be our supplier's responsibility to make sure that they got resolved very quickly, so they rarely come to our notice.
What do I think about the scalability of the solution?
When it comes to scalability, as I noted, there are two different tools, one for physical infrastructure and another for virtual infrastructure.
If I want to scale it up from a physical to a virtual platform, that's certainly not a feature at this point of time. That can be a drawback. You have to look for a separate tool from the same vendor because you already have an existing tool from that vendor which is doing well. And you cannot have tools from two different vendors running on two different platforms.
How are customer service and technical support?
We have not used technical support. Our supplier manages the tool, so we don't get in touch with Imperva if there are any issues. Our supplier does that for us.
What other advice do I have?
My advice is to go to IT CentralStation and download the report on database security tools.
In general, it's all about the policies that you put into the tool to get the output. The tool itself is pretty smart. As someone who is designing the policies or the outputs or the queries, it is like putting a query into a SQL database to get the results. The better or more optimized the query is, the better output you will receive, and so it goes with this solution.
When selecting a vendor, pricing, of course, is the most important thing to look at. Then, you look at the scalability options, at how good the tool is, that it suffices your functionality requirements, and that it provides interoperability.
I rate Imperva at eight out of ten across the various areas that I just mentioned, be it interoperability, scalability, cost, or ease of installation and setup. Measuring it on each of these aspects is how I came up with my rating.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Operator at Halliburton
Allows people to secure data, while seamlessly allowing the distribution of that data in an effortless manner.
Pros and Cons
- "I like Imperva SecureSphere platform forms. Imperva SecureSphere is the foundation for SecureSphere data, file and web application solutions."
- "SecureSphere activity log can be used with Imperva CounterBreach in an effort to protect enterprise data from theft and loss caused."
What is most valuable?
I like Imperva SecureSphere platform forms. Imperva SecureSphere is the foundation for SecureSphere data, file and web application solutions. Imperva SecureSphere is designed to work together, however can be independently deployed.
How has it helped my organization?
Imperva SecureSphere allows people to secure data, while seamlessly allowing the distribution of that data in an effortless manner.
What needs improvement?
SecureSphere activity log can be used with Imperva CounterBreach in an effort to protect enterprise data from theft and loss caused. Since such is core to its function, I would like to see future versions to integrate such options.
For how long have I used the solution?
Imperva SecureSphere allows the company to adhere to data compliance requirements, and at the same time to effectively protect data from theft.
What was my experience with deployment of the solution?
No.
What do I think about the stability of the solution?
No. After using Imperva SecureSphere the first few days, implementing it was second nature.
What do I think about the scalability of the solution?
No.
How are customer service and technical support?
Customer Service:
Very good customer service was responsive to needs to get Imperva SecureSphere operational.
Technical Support:Imperva SecureSphere did not require very much tech support, but with the few issues we had, they were cured very quickly by tech support.
Which solution did I use previously and why did I switch?
No.
How was the initial setup?
Setting up Imperva SecureSphere was very simple, and configuration was easy.
What about the implementation team?
We used in-house.
What was our ROI?
It was well worth implementing Imperva SecureSphere and found the rate of productivity increased by using it.
What's my experience with pricing, setup cost, and licensing?
Compare other similar products and definitely use the free trial. I truly enjoyed using it, and recommend Imperva SecureSphere to any one who has similar needs.
Which other solutions did I evaluate?
No we did not.
What other advice do I have?
Imperva SecureSphere provides great options to secure data and would not hesitate to use it.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network And Security System Administrator at a international affairs institute with 1,001-5,000 employees
Monitors and protects internet banking applications. Provides the option of deployment architectures.
What is most valuable?
- Flexibility
- Provides the option of deployment architectures
How has it helped my organization?
- Easy monitoring
- Protection of internet banking applications
I was working for Crescendo International, which is a small company in Romania. My primary role was in network solution integration. I was the only person in the country with experience of three deployments of Imperva products at two major banks.
What needs improvement?
- The upgrade procedure is not clear
- There is no easy rollback
- There is no possibility to select different ways for two different types of cipher suit negotiation in two arm deployments. Most of the banks now use ECDHE for PFSC.
- No SNI support
For how long have I used the solution?
We have been using the solution for two years.
What do I think about the stability of the solution?
There were many stability issues with the upgrade procedure. The technical support team didn't know how to handle them.
What do I think about the scalability of the solution?
We encountered some stability issues.
How are customer service and technical support?
The level of technical support is bad.
Which solution did I use previously and why did I switch?
We did not use a previous solution.
How was the initial setup?
The initial setup was straightforward.
What's my experience with pricing, setup cost, and licensing?
Please be more transparent about licensing on subscriptions such as for ThreatRadar.
Which other solutions did I evaluate?
We evaluated F5 Networks.
What other advice do I have?
We recommend implementing it.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Completely agree re licencing & technical support, hence technical support is improving a bit ;)
What version do you use? We had big stability issues with 9.5 and a bit of 10.5, once upgraded to 11.5 we haven't encountered any big issues yet, apart from random small bugs.
Regional Sales Engineer at a tech company with 1,001-5,000 employees
Offers flexible deployment modes and custom policy creation.
What is most valuable?
- Flexible deployment modes
- Custom policy creation
- Complex vision of web apps
- DB security
- Intuitive logs
How has it helped my organization?
We have seen our security risk decreased due to customization and meeting all the security needs for every application.
What needs improvement?
I would like to see more parameters configurable for the kernel reverse proxy.
For how long have I used the solution?
I have used this product for eight years, on both sides; from deployment to customers and administration of the existing infrastructure.
What do I think about the stability of the solution?
The stabillity issues we encountered were fluently fixed.
What do I think about the scalability of the solution?
We did not encounter any scalability issues.
How are customer service and technical support?
Technical support was very professional and elastic.
Which solution did I use previously and why did I switch?
We used to deploy a different solution. We switched due to the valuable features mentioned.
How was the initial setup?
Initial setup was straighforward.
What's my experience with pricing, setup cost, and licensing?
It is a good idea to invest in threat detection licenses.
Which other solutions did I evaluate?
We evaluated:
- WAF: F5 and Radware
- DAM: IBM Guardium
What other advice do I have?
For DAM, I recommend that you invest proper resources in the business part of the project. It is very important to set expectations properly.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Solution Architect at a financial services firm with 10,001+ employees
Facilities data enrichment and process automation. It manages cluster capacity.
What is most valuable?
The most valuable features are:
- DAM Module
- Third-party data source integration: Feeds automation
- Data enrichment: Provides better data quality and session handling
- API: Used for process automation
How has it helped my organization?
The solution has improved our organization as follows:
- Better agent performance compared to v9.5
- Gateways are much more stable
- Gateway cluster improves resource utilization and provides better resiliency
- Offers the option to manage cluster capacity without touching the agent configuration
What needs improvement?
BUGs, BUGs, BUGs. The product is under high development and the amount of bugs is bit disappointing. The product has lots of limitations which are not clearly documented. You can only find out the limitations by engaging the support
By using this product you can have only one type of date and time format which is US format. I’m EU citizen and I prefer different date format, same for time format. I would prefer 24Hour clock instead of AM/PM.
For how long have I used the solution?
We have been used this solution for over three years.
What do I think about the stability of the solution?
There were stability issues in v9.5. There are no major stability issues in v10.5.
Stability is dependent on the infrastructure. If you use hypervisor, then you need to make sure to use resources and I/O settings that are optimal for SecureSphere. Otherwise, you will end up with stability and performance issues.
What do I think about the scalability of the solution?
There are some scalability issues. There was a hardcoded limitation in the number of MXs you can connect to SOM. In addition, the bigger the infrastructure, the bigger challenge there is to create a single audit report file.
How are customer service and technical support?
The technical support is OK. But they have big potential to do things better.
Which solution did I use previously and why did I switch?
We had a previous solution. We switched because the new requirements couldn’t be accomplished with the old solution.
How was the initial setup?
The installation was quite complex. We had to integrated lots of external systems in order to make it work right.
What other advice do I have?
Give it a try. Write down your requirements as detailed as possible, and perform a PoC using this list. If you find gaps that require additional development, it could take some time until you actually get it.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Imperva SecureSphere Database Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Database SecurityPopular Comparisons
IBM Security Guardium Data Protection
Oracle Audit Vault
DataSunrise Database Security
Trustwave DbProtect
IDERA SQL Secure
Buyer's Guide
Download our free Imperva SecureSphere Database Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- IBM Guardium vs Imperva SecureSphere Database Security
- DDoS AMP attacks - should we go with Imperva SecureSphere?
- What is the performance parameter of Imperva X10K versus BIG-IP i2600?
- How does IBM Guardium Data Protection compare with Imperva SecureSphere Database Security?
- What are the differences between IBM Guardium and Imperva?
- When evaluating Database Security, what aspect do you think is the most important to look for?
- IBM Guardium vs Imperva SecureSphere Database Security
- What is the difference between "data protection in transit" vs "data protection at rest"?
- Audit Vault vs. InfoSphere Guardium?
- Database security tools comparison report?
Indeed, that would be the best of both worlds! Security breaches are too common to not follow basic guidelines to secure data. Best, Darren Chaker