Imperva Web Application Firewall (WAF)
Imperva Web Application Firewall (WAF)
Overview
Recent Reviews
Video Reviews
Leaving a video review helps other professionals like you evaluate products. Be the first one in your network to record a review of Imperva Web Application Firewall (WAF), and make your voice heard!
Pricing
View all pricingEntry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting / Integration Services
Would you like us to let the vendor know that you want pricing?
12 people want pricing too
Alternatives Pricing
Features Scorecard
No scorecards have been submitted for this product yet.Start a Scorecard.
Product Details
What is Imperva Web Application Firewall (WAF)?
The Imperva Web Application Firewall (WAF) is based on technology acquired with Incapsula and the former WebSphere WAF.
Imperva Web Application Firewall (WAF) Technical Details
Operating Systems | Unspecified |
---|---|
Mobile Application | No |
Comparisons
View all alternativesCompare with
Reviews and Ratings
 (6)
Reviews
(1-2 of 2)- Popular Filters
Companies can't remove reviews or game the system. Here's why
November 22, 2020
A tad on the pricey side, but still a great value
The Imperva WAF acts as our go-between (proxy) for our public-facing websites. They intercept known bad actor IPs, and we can also block certain countries that have shown to be problematic and we don't do business in. More dynamic attacks are also detected and blocked, making this largely a "fire and forget" tool. We rarely even need to log into the tool, except to pull our weekly reports.
- Block some dynamic attacks such as SQL injection.
- Block unfriendly accesses based on geographic source.
- Helps us implement SSL in cases where the original server can't (yet).
- The UI can use a little work (but is largely decent)
January 29, 2016
Imp-erva is Imp-pressive
SecureSphere has been purchased mostly due to either a major concern around protecting web applications or adhering to PCI compliance. It provides great insight into web applications outside alerts and can be used not only by the security unit but the applications teams as well.
- Alert Aggregation - Correlates different violations into perceived correlated attacks.
- Ease of deployment - as one of the only WAFs that allow bridge mode deployment, this can be deployed with without downtime and no Network Architecture modifications. If the need for proxy is required at a later time, Transparent Reverse Proxy can be deployed within seconds and minimal configuration.
- Custom Policies - Custom security policies are easy to configure.
- Reporting - There are a good amount of pre-configured reports available by default.
- Attack Correlation Validation - This specific policy produces a lot of false positives as well as the SQL injection policies. Of course it is difficult to tell what a legitimate query is on a public facing web app.
- Profiling - I tend to spend more time than any other feature tuning the Web App Profiles. Plugins are used to help cope with this, but on extremely large web apps we are forced to turn off the profiling feature.