Blue Cube Security Ltd

Imperva Application Security

Mitigates risk for your organisation with full-function defense-in-depth, protecting not just your websites but all your applications and networks from attack and ensuring they remain available, user-friendly and secure. From best-of-breed web application firewall (WAF) and Runtime Application Security Protection (RASP), to comprehensive DDoS mitigation, and advanced BOT protection.

Features

  • Web Application Firewall
  • DDoS Protection
  • Advanced BOT Protection
  • Runtime Application Self Protection
  • Attack Analytics
  • API Security
  • Application-aware CDN & Content Caching

Benefits

  • Reduce operational overhead
  • Maximise website uptime
  • 44 global scrubbing centers
  • experienced bot experts
  • Improve time to deployment
  • combat alert fatigue
  • Gain visibility
  • Increase website throughput

Pricing

£5,000 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at operations@bluecubesecurity.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

3 0 5 9 9 4 6 4 7 9 1 2 9 6 3

Contact

Blue Cube Security Ltd Operational Admin Support
Telephone: 0345 0943070
Email: operations@bluecubesecurity.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Hybrid cloud
Service constraints
The service can be tied down to a UK POP, however it is more effective when deployed using all our worldwide POP's. That way, we can stop the bad actors coming after your website before they reach the UK.
System requirements
Imperva Cloud WAF is activated by a simple DNS change

User support

Email or online ticketing support
Email or online ticketing
Support response times
Customers cases will be assessed and graded on receipt. The customer can also request an escalation to a case. Imperva operates 24x7 follow the sun support, so response times are the same at weekends.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Web chat is accessed through the Support Portal. The support portal is a public facing website which contains access to our Online Help Desk,Web Chat and documentation such as setup guides, videos and forums.
Web chat accessibility testing
Not Known / Not Tracked.
Onsite support
Yes, at extra cost
Support levels
Key features of the Imperva Cloud WAF offering include:

• Enterprise-Grade SLA When it comes to service availability, there are no compromises. Backed by a 99.999% uptime and support SLA, our enterprise-grade website security and performance services are used by many of the world’s leading online businesses.

• Premium 24x7 Support
Our support engineers and security experts are available round-the-clock to give you the support you need, when you need it.

• Enterprise-Grade Security Featuring a PCI-certified Web Application Firewall and comprehensive protection against DDoS attacks, Incapsula secures your website from external attacks, maximizes uptime and maintains business continuity.

• API For Provisioning, Management And Events The Imperva Cloud WAF API enables easy integration with streamlined customer provisioning
and account management. Export security events to your log management and SIEM systems and create customized reports for your target audience.

• Customized Setup and Branding Our customization options allow enterprises to easily brand customer-facing pages (for example security messages, error pages, etc.) to reflect your own website’s look
and feel.

• Dedicated Account Management
Dedicated Imperva product and security experts will work with you on complex setup, integration and customization requirements to ensure your security and operational goals are met.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
There is nothing to install or commission, and only a DNS setting change is required to re-direct traffic through Imperva's global network. Indeed, some clients have approached Imperva whilst under attack, and have been up and running in less than 1hr (the record is 15mins). Prospects often ask for a draft implementation plan, and there is the risk of disappointment that Imperva does not respond with a weighty document using MS Project and RASIC charts; and there is often an expectation that such a valuable and important service must surely take weeks or months to plan, configure, implement, etc. However, the reality is genuinely simple and can be summarised is a few sentences, below:

Significant tasks include:

a) 1-2hr planning session to agree roll-out plan and confirm any non-standard configuration settings.

b) Client provides a list of the website names to be on-boarded

c) Availability of client representative with knowledge and authority to make DNS changes for target website[s], and to manage SSL certificates.

d) 2hr/half-day session to familiarise client with management console/GUI

e) 1-2hr hand-holding session during switch-over of live websites to the Imperva Cloud WAF platform.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
We do not hold any client data.
End-of-contract process
The customer changes their DNS setting

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Via Smartphone
Service interface
Yes
Description of service interface
Imperva Cloud WAF provides customers and partners with the ability to manage accounts and sites via an API.

Overview
The API has the following characteristics:

Requests are HTTP POST.
Parameters are specified in the request body in HTML form style. For example:

param1=value1&param2=value2

All requests are in SSL.

Response content is provided as a JSON document.

UTF-8 encoding is always used.
Accessibility standards
None or don’t know
Description of accessibility
View the list of your websites configured on Imperva Cloud WAF, or add a new site. The Websites page is displayed when you log in to your account in the Incapsula Management Console.
To add a new site, click the Add Site button and follow the onscreen instructions.
The following details are displayed for each website. The statistics are generated daily and cover the last 7 days, except for bandwidth, which covers the last 30 days.
Name
Bandwidth
Human Visits
Bot Visits
Threats
Creation Date
Status
Fully configured:
Partially configured:
Not configured:
Disabled:
Accessibility testing
N/A
API
Yes
What users can and can't do using the API
Imperva Cloud WAF provides customers and partners with the ability to manage accounts and sites via an API. The API has the following characteristics:

• Requests are HTTP POST
• Parameters are specified in the request body in HTML form style, e.g:
param1=value1&param2=value2
• All requests are in SSL
• Response content is provided as a JSON document
• UTF-8 encoding is always used
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Application delivery Rules are a fundamental part of modern application delivery platforms/services, whether it’s a CDN or a load balancer (ADC).

These rules are used to control and manipulate requests or responses according to predefined behaviors.

What can be done.

Switch content and redirect users based on layer 7 attributes, such as URL patterns, cookies, HTTP headers, and client classification attributes Improve user experience and SEO ranking by rewriting relative and dynamic URLs to clean customer-facing URLs

Offload connections and reduce round trip times between your web server and other backend servers

Leverage Incapsula client classification to identify bad bots and redirect them to a special site or server with fake content

Define rules based on client behavior, using customizable rate thresholds for various parameters

Implement backend logic without changing application code

Extend role-based control to non-technical users

Scaling

Independence of resources
Our global network consists of 44+ data centers with over 6 Tbps capacity designed purely to protect your websites

Analytics

Service usage metrics
Yes
Metrics types
Metrics include:

Website Traffic
Human visits
Bot visits
Threats
Bandwidth
Status
Application attacks
Countries
Hits per second
Bits per second
Daily Hits
Threat type
Attack Countries
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Splunk, Trend , Sophos, Qualys, Netscout, Imperva, CyberArk, Fortinet, AWS

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
Other
Other data at rest protection approach
We do not hold customer data.
Data sanitisation process
No
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Productized SIEM Integration

Provides centralized management of Incapsula data within existing security systems and workflows (SIEM systems)
Includes a log collector, and pre-made dashboards for easy implementation

Supported systems include: Splunk, McAfee, Qradar, and ArcSight
Data export formats
Other
Other data export formats
SIEM API
Data import formats
Other
Other data import formats
N/A

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
UPTIME COMMITMENT

Imperva commits to a NI annual uptime of 99.999% and a PI annual uptime of 99.95%. In the event of a NI Outage longer than five
minutes or a PI Outage longer than four hours, Client will be eligible to receive Credits.

MITIGATION COMMITMENT
DDoS Mitigation will take place within 3 seconds after Client has completed DDoS Activation. For customers that have purchased
the Infrastructure Protection Service and the Infrastructure Monitoring Service and have selected the option to allow Incapsula to
automatically route traffic through the Incapsula network, DDoS Mitigation will take place within five minutes after the Infrastructure
Monitoring Service has detected a DDoS attack on the customer infrastructure.

OUTAGE EVENTS AND CREDITS
To submit a claim for Credits, Client must open a support ticket in Incapsula’s technical support ticketing system no more than seven calendar days after the time in which the Outage occurred and provide
detailed descriptions of the Outage, the duration of the Outage, network traceroutes, the site(s) affected and any attempts made by
Client to resolve the Outage. The support ticket must include the words “service credit request” in the ticket or email subject line.
Approach to resilience
Available on request.
Outage reporting
Public Dashboard & Email

Identity and authentication

User authentication needed
Yes
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
Available upon request.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
Comsec Group Ltd
PCI DSS accreditation date
22/1/2020
What the PCI DSS doesn’t cover
All covered.
Other security certifications
Yes
Any other security certifications
  • Progressing FEDRAMP
  • PCI, SOC and ISO 27001

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
CSA CCM version 3.0
Information security policies and processes
Available upon request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Available on request.
Vulnerability management type
Undisclosed
Vulnerability management approach
As opposed to other cloud service providers who only provide a service but use 3rd party technologies Imperva developed all the technologies it’s using from scratch and only uses standard servers and routers (no 3rd party technologies). This allows much more flexibility and rapid reaction to new threats and attack vectors (we do not have to wait for updates and patches – we do them ourselves instantaneously).

In order to fight today’s sophisticated and constantly changing attack patterns we have Imperva’s 24x7 SOC - manned with security experts that can handle any attack in real time.
Protective monitoring type
Undisclosed
Protective monitoring approach
Available upon request.
Incident management type
Undisclosed
Incident management approach
Available upon request.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£5,000 a unit a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Full service scope is available.

Timescales subject to client requirement.

Please make request via our website:

http://www.bluecubesecurity.com/contact-usgcloud/
Link to free trial
http://www.bluecubesecurity.com/contact-usgcloud/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at operations@bluecubesecurity.com. Tell them what format you need. It will help if you say what assistive technology you use.