This is one of the solutions that we provide to our customers.
We use this solution for application-level security, above layer four protection where the firewall cannot reach.
I have worked with both on-premises and cloud deployments.
This is one of the solutions that we provide to our customers.
We use this solution for application-level security, above layer four protection where the firewall cannot reach.
I have worked with both on-premises and cloud deployments.
The most valuable feature is the out-of-the-box detection engine. It has the ability to detect some of these things without being configured. There are some features that are configured by default, so even without doing much, it can still provide a level of protection.
The visibility provided by this solution can be improved. I often tell my customers that "You can't fight what you can't see". I can recall a time when I did a presentation after a deployment, and it prompted them to put the solution into enforcement mode immediately. Normally, we wait one week with the solution in monitoring mode. However, once they saw the types of vulnerabilities they had, they wanted to take action right away. It gave them a great deal of knowledge, and knowing that they are protected from these types of attacks has boosted their confidence.
This solution has a lot of features, and some of the students were confused when I was discussing them. It would be helpful to have a "recommended deployment", or even a list of basic features that should either be used or turned on by default. If somebody has installed the product several times but is doing the same thing incorrectly, then they get experienced in doing the wrong thing. You should be able to specify which assets you need to be protected, and the solution will tell you the minimum in terms of features that need to be turned on. If you need more advanced protection then the others will become relevant.
Imperva partner training is something that I would be interested in if it ever came my way. There should be partner-specific webinars, meetings, and other training provided to us,
So far, I don't think that we've had any issues with this solution in terms of stability. People discussing this solution have given the same remark.
This solution is used on almost a daily basis.
Scalability of this solution is based on the design. If you get your design right, then you shouldn't have a problem with the scalability.
While we were installing this solution, we had contact with technical support and they were good. I have referenced information that is on their site and it is helpful, as well.
During the initial installation, there was a warning that was not part of the known CVEs. When I checked with support, they told me that this type of problem is blocked out-of-the-box. However, if I wanted to be really sure, they showed me how to create a custom policy, or custom rule, to specifically deal with it.
I have used other solutions, but I usually follow the Gartner reports and their suggestions. My previous solution had not been doing too well.
Also, as I became more familiar with this solution, it became easier for me to identify issues. I had also read research on Imperva blocking denial-of-service attacks, and I like practical evidence of issues such as this. By reading these articles, and about other people's experiences, it is like seeing it for myself. With other solutions, you are not privy to such visibility.
Complexity and cost are two important factors when it came to choosing this solution.
Unless the client has as serious issues and does not want Imperva, this is my first choice.
The initial setup of this solution was not too straightforward. We did have to contact Imperva during the deployment. The length of time for deployment depends on the experience of the people performing the installation, as well as the environment.
My team and I performed the implementation of this solution. To make sure that we were on track, we contacted Imperva support for some clarification. Most of the things that we do, we follow best practices.
Everybody complains about the price of this solution.
This is a security device, and it is used almost every day. It is not just used when there is an issue. Based on what the dashboard or the reports say, you can change policies to meet your security requirements or business needs.
Based on my experience, and what I know this product can do, I would never recommend another solution. I advise most of my customers to go for this.
I would rate this solution a nine out of ten.
We are a solution provider and Imperva is one of the products that we implement for our clients. They use it as an application firewall.
If you are using the appliance as opposed to the virtual deployment, it can stand as the network layer-two and provide real transparency. This is better than the competitors.
Imperva SecureSphere integrates well with other tools.
The user interface could be better.
I have been working with Imperva SecureSphere for about four years.
Imperva solutions are the best in terms of stability.
I have not faced any trouble with scalability because you can easily upgrade the appliance.
I am regularly in contact with Imperva support and I am satisfied with them.
The initial setup is very basic and really easy to do. I wouldn't say that everybody, such as non-technical, people can do the setup and configuration. However, people with a mid-level of experience in application firewalls can do it easily.
The price of this solution is a little bit high compared to competitors.
My advice to anybody who is considering this solution is that if they want a stable product with good scalability then they can choose Imperva. The price is a little bit higher than that of the competitors, which largely impacts whether customers choose Imperva. In fact, if you don't care about budget then Imperva is the only solution for an application firewall.
My only complaint is that the user interface could be better.
I would rate this solution a nine out of ten.
Data masking is the most valuable feature of this solution.
Most of the clients are new to this solution and don't have an in-depth knowledge of the solution. It's not so well-known in Ethiopia. Imperva has only been around for a year.
Licensing should be improved. Most of the clients aren't happy. It's expensive.
Some of the features should be included in the next release is a file integrating monitoring tool. This feature should be improved. Also, it should have a privileged account option. In the solution, if you put it there, that would be a very nice feature so that the clients could get all those solutions in one box. It will be easier for support and for clients.
It's a relatively new product but from the information I got from the Bank of Ethiopia, the stability is okay. They are getting what they are expecting from the product.
Scalability is good especially compared to IBM. It's not so easy to integrate with another solution from another vendor.
The initial setup was complex.
The company has to deeply work on it. Also, with regard to support for the distributor, distributors have a big problem. We got the wrong consigning. It was kept for more than three months in a customs warehouse because of the issue of the problems on the distributor side. That is a big problem.
I would rate it an eight out of ten. Imperva is good because it doesn't also only monitor but it also does acquisition.
The dynamic profiling of websites is the solution's most valuable feature. The security is also good.
It would be useful if the solution used more intelligence in attack protection. For example, firewalls are to be dependent on the configuration, but if they could have some data science around it the solution would be even better. The profiling of the traffic, and making decisions surrounding that should be intelligence-based, instead of being based on the configuration of the firewall itself.
The solution is scalable, however, in terms of scalability, you're required to change the appliance, as it's not like a cloud, which is easier to scale. I would not rate it very well when it comes to scalability, because a model of license-based upgrades would be better. They could give you a bigger box to make it easier to grow if you needed to.
The solution's technical support is good.
The initial setup is straightforward. However, when you move to more advanced configurations, you require more expertise.
We are an integration company, so we are providing this as a solution to other customers. They're mostly enterprise-level clients.
I would recommend the solution. I'd rate it eight out of ten.
Management of policies and rules can be complicated and the physical setup of the product has implications on HA.
I have used SecureSphere for 3-4 years.
Performance of the smaller boxes can be sluggish depending on the load.
We haven’t had any scalability issues.
We did not have a previous solution.
Initial setup was straightforward, but ongoing management of rules and policies are time-consuming and complicated.
Try to use a cloud-based and/or managed solution instead of managing a WAF internally; that should be the first preference.
Before choosing, we also evaluated F5 ASM.
While implementation is not hard, the process and resources for ongoing management should be thought through and agreed to before implementation.
Data marking is the solution's most valuable feature.
The firewall aspect of the solution needs improvement.
The GUI is not as intuitive enough. It should be more user-friendly, especially for end-users.
The initial setup could be simplified. Every time you have to install the solution you have to get in touch with support or somebody that can to do that for you.
The core functionality of the solution has been met. We find it stable enough.
The solution is very scalable. It is one of the most important features. You can also expand resources and features as well.
Customers actually require a lot of support. They want an easier channel that can provide support. The solution should offer a monthly check-in with clients. Other solutions offer this, and it's helpful for the clients, just to make sure everything is running okay.
In general, however, technical support has been good.
The initial setup required a lot of help. It took a month or two to deploy so it wasn't exactly straightforward. However, it was not as difficult as other solutions either.
I handle the on-premises deployment model. We have the latest version of the solution. We also sell the product.
I would rate the solution nine out of ten.