TrustRadius: an HG Insights company

Imperva Web Application Firewall (WAF)

Score7.5 out of 10

14 Reviews and Ratings

What is Imperva Web Application Firewall (WAF)?

The Imperva Web Application Firewall (WAF) is based on technology acquired with Incapsula and the former WebSphere WAF.

Categories & Use Cases

A tad on the pricey side, but still a great value

Pros

  • Block some dynamic attacks such as SQL injection.
  • Block unfriendly accesses based on geographic source.
  • Helps us implement SSL in cases where the original server can't (yet).

Cons

  • The UI can use a little work (but is largely decent)

Return on Investment

  • Our on-prem firewall has less work to do, allowing it more cycles for other tasks.
  • We have better web traffic visibility and control over what actors are doing outside our network.

Alternatives Considered

Cloudflare

Usability

Other Software Used

VMware Carbon Black App Control (formerly Cb Protection), CrowdStrike Falcon Endpoint Protection, Exabeam Security Management Platform, Mimecast Secure Email Gateway

Imp-erva is Imp-pressive

Pros

  • Alert Aggregation - Correlates different violations into perceived correlated attacks.
  • Ease of deployment - as one of the only WAFs that allow bridge mode deployment, this can be deployed with without downtime and no Network Architecture modifications. If the need for proxy is required at a later time, Transparent Reverse Proxy can be deployed within seconds and minimal configuration.
  • Custom Policies - Custom security policies are easy to configure.
  • Reporting - There are a good amount of pre-configured reports available by default.

Cons

  • Attack Correlation Validation - This specific policy produces a lot of false positives as well as the SQL injection policies. Of course it is difficult to tell what a legitimate query is on a public facing web app.
  • Profiling - I tend to spend more time than any other feature tuning the Web App Profiles. Plugins are used to help cope with this, but on extremely large web apps we are forced to turn off the profiling feature.

Return on Investment

  • Meet compliance requirements - Check.
  • Better Insight into web application - Absolutely great, checks all the traffic against RFC standards and will alert on common development mistakes that duplicate application traffic or provide attack vectors for potential attackers.
  • Have had several issues blocking a customer without producing alerts, while it happened only one week out of 2 years of working with the devices, it did produce a lot of headaches.

Other Software Used

ForeScout CounterACT, Juniper SRX, VMware ESXi