Skip to main content
TrustRadius
Imperva Web Application Firewall (WAF)

Imperva Web Application Firewall (WAF)

Overview

What is Imperva Web Application Firewall (WAF)?

The Imperva Web Application Firewall (WAF) is based on technology acquired with Incapsula and the former WebSphere WAF.

Read more
Recent Reviews

TrustRadius Insights

This product provides organizations with the necessary tools to secure their web and application servers against targeted and non-targeted …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Imperva Web Application Firewall (WAF)?

The Imperva Web Application Firewall (WAF) is based on technology acquired with Incapsula and the former WebSphere WAF.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

47 people also want pricing

Alternatives Pricing

What is Cloudflare?

Cloudflare, from the company of the same name in San Francisco, provides DDoS and bot mitigation security for business domains, as well as a content delivery network (CDN) and web application firewall (WAF).

Return to navigation

Product Details

What is Imperva Web Application Firewall (WAF)?

Imperva Web Application Firewall (WAF) Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(8)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

This product provides organizations with the necessary tools to secure their web and application servers against targeted and non-targeted web-based attacks. Users have reported that it effectively monitors Ports 443 and 80, preventing unauthorized access and blocking suspicious internet activity. It has been praised for its ability to protect privacy, prevent viruses, and discourage unethical hacking. The product's up-to-date signatures and easy switchability make securing systems hassle-free. Additionally, its cloud-based deployment offers less complexity compared to on-prem solutions, providing a more secure environment for businesses and protecting against cyber attacks. Users have also found it valuable for blocking subdomains, offering easy configuration and implementation with industry-standard access.

One of the key use cases of this product is its effectiveness in addressing web application security challenges by reducing risks and maintaining stakeholder trust. It proactively defends web applications, protects data, and ensures application availability. Users have found that it mitigates the risk of common attacks, provides protection against DDoS attacks, and offers effective remediation. Another important use case is optimizing website traffic to ensure a smooth user experience without slowing down the website. This product helps achieve PCI compliance while minimizing risk by remediating vulnerabilities and ensuring data security. Users have also reported that it simplifies vulnerability closure and web application integration for protection. Overall, customers have found this product to be a valuable solution for securing their web applications and providing application-level security while offering insight into blocked websites and effective problem-solving for internet security issues.

Wide range of features: Users have praised the wide range of features offered by Imperva WAF, with multiple reviewers highlighting this aspect. They appreciate that Imperva WAF provides advanced security measures and enhanced web security capabilities, allowing them to protect their systems effectively.

Easy to learn and implement: Many users find Imperva WAF easy to learn and implement, according to several reviewers. They value the simple portal and minimum prerequisites required for setup. This user-friendly approach makes it convenient for users to start using Imperva WAF without significant barriers or complications.

Cloud-based nature: The cloud-based nature of Imperva WAF is highly valued by users, as mentioned by a number of reviewers. They appreciate the easy access provided by the cloud platform, which eliminates the need for on-premise solutions and reduces operational overheads. This feature allows users to experience hassle-free web security without having to manage physical infrastructure.

Confusing and Difficult User Interface: Several users have expressed frustration with the user interface of the firewall, stating that it can be confusing and difficult to navigate, especially for those who are new to the platform. This has resulted in difficulties performing tasks efficiently.

Limited Policy Configuration Options: Users have voiced their concerns about the lack of customization options available for policy configuration. Some users feel restricted by the limited choices provided and would like more flexibility in configuring their policies.

Complex WAF Configuration and Management: The configuration and management process of the WAF has been described as complex by some users, particularly for those who are less experienced in cybersecurity. They find it challenging to navigate through the various settings and configurations required for effective management of the WAF.

Attribute Ratings

Reviews

(1-2 of 2)
Companies can't remove reviews or game the system. Here's why
Ryan Cash | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
The Imperva WAF acts as our go-between (proxy) for our public-facing websites. They intercept known bad actor IPs, and we can also block certain countries that have shown to be problematic and we don't do business in. More dynamic attacks are also detected and blocked, making this largely a "fire and forget" tool. We rarely even need to log into the tool, except to pull our weekly reports.
  • Block some dynamic attacks such as SQL injection.
  • Block unfriendly accesses based on geographic source.
  • Helps us implement SSL in cases where the original server can't (yet).
  • The UI can use a little work (but is largely decent)
Imperva web application firewall does a great job in giving us control over access to our public web servers. With our regular hosting provider, we couldn't block access based on geography, or really anything. So we had to rely on traditional access controls to protect the data. But with the WAF, we can block countries such as North Korea, or we could stop any SQL Injection attempts, or even do a temporary block of IP in the case of detected brute-forcing.
  • Our on-prem firewall has less work to do, allowing it more cycles for other tasks.
  • We have better web traffic visibility and control over what actors are doing outside our network.
Ultimately, it was the easiest to work with that was still a "known" company (we've been burned too many times by up-and-comers). We needed something that gave us a lot of control but then didn't need its handheld on a daily basis. Imperva gives us a lot of that and we are still able to navigate it with ease.
There are just a couple of points that are hard to find, that probably could be elsewhere. But these are minor; everything else is right where you'd expect it to be.
We haven't needed support from Imperva since implementation. But during that time, their personnel were very quick to respond to questions. Since then, it's been largely doing its thing for us (which is exactly what we'd hoped).
January 29, 2016

Imp-erva is Imp-pressive

Score 9 out of 10
Vetted Review
Verified User
Incentivized
SecureSphere has been purchased mostly due to either a major concern around protecting web applications or adhering to PCI compliance. It provides great insight into web applications outside alerts and can be used not only by the security unit but the applications teams as well.
  • Alert Aggregation - Correlates different violations into perceived correlated attacks.
  • Ease of deployment - as one of the only WAFs that allow bridge mode deployment, this can be deployed with without downtime and no Network Architecture modifications. If the need for proxy is required at a later time, Transparent Reverse Proxy can be deployed within seconds and minimal configuration.
  • Custom Policies - Custom security policies are easy to configure.
  • Reporting - There are a good amount of pre-configured reports available by default.
  • Attack Correlation Validation - This specific policy produces a lot of false positives as well as the SQL injection policies. Of course it is difficult to tell what a legitimate query is on a public facing web app.
  • Profiling - I tend to spend more time than any other feature tuning the Web App Profiles. Plugins are used to help cope with this, but on extremely large web apps we are forced to turn off the profiling feature.
If you are looking for a cheap product to meet the bare minimum requirements for PCI or any other compliance regulations, this is not the product. Also, the WAF portion only inspects on HTTP/HTTPS traffic which can be very limiting into other forms of web apps that utilize other protocols.

The HTTP/HTTPS inspection that it does do is very in depth and well worth the investment.
  • Meet compliance requirements - Check.
  • Better Insight into web application - Absolutely great, checks all the traffic against RFC standards and will alert on common development mistakes that duplicate application traffic or provide attack vectors for potential attackers.
  • Have had several issues blocking a customer without producing alerts, while it happened only one week out of 2 years of working with the devices, it did produce a lot of headaches.
Return to navigation