Blue Cube Security Ltd

Imperva Application Security

Mitigates risk for your organisation with full-function defense-in-depth, protecting not just your websites but all your applications and networks from attack and ensuring they remain available, user-friendly and secure. From best-of-breed web application firewall (WAF) and Runtime Application Security Protection (RASP), to comprehensive DDoS mitigation, and advanced BOT protection.


  • Web Application Firewall
  • DDoS Protection
  • Advanced BOT Protection
  • Runtime Application Self Protection
  • Attack Analytics
  • API Security
  • Application-aware CDN & Content Caching


  • Reduce operational overhead
  • Maximise website uptime
  • 44 global scrubbing centers
  • experienced bot experts
  • Improve time to deployment
  • combat alert fatigue
  • Gain visibility
  • Increase website throughput


£5,000 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

3 0 5 9 9 4 6 4 7 9 1 2 9 6 3


Blue Cube Security Ltd Operational Admin Support
Telephone: 0345 0943070

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Hybrid cloud
Service constraints
The service can be tied down to a UK POP, however it is more effective when deployed using all our worldwide POP's. That way, we can stop the bad actors coming after your website before they reach the UK.
System requirements
Imperva Cloud WAF is activated by a simple DNS change

User support

Email or online ticketing support
Email or online ticketing
Support response times
Customers cases will be assessed and graded on receipt. The customer can also request an escalation to a case. Imperva operates 24x7 follow the sun support, so response times are the same at weekends.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Web chat is accessed through the Support Portal. The support portal is a public facing website which contains access to our Online Help Desk,Web Chat and documentation such as setup guides, videos and forums.
Web chat accessibility testing
Not Known / Not Tracked.
Onsite support
Yes, at extra cost
Support levels
Key features of the Imperva Cloud WAF offering include:

• Enterprise-Grade SLA When it comes to service availability, there are no compromises. Backed by a 99.999% uptime and support SLA, our enterprise-grade website security and performance services are used by many of the world’s leading online businesses.

• Premium 24x7 Support
Our support engineers and security experts are available round-the-clock to give you the support you need, when you need it.

• Enterprise-Grade Security Featuring a PCI-certified Web Application Firewall and comprehensive protection against DDoS attacks, Incapsula secures your website from external attacks, maximizes uptime and maintains business continuity.

• API For Provisioning, Management And Events The Imperva Cloud WAF API enables easy integration with streamlined customer provisioning
and account management. Export security events to your log management and SIEM systems and create customized reports for your target audience.

• Customized Setup and Branding Our customization options allow enterprises to easily brand customer-facing pages (for example security messages, error pages, etc.) to reflect your own website’s look
and feel.

• Dedicated Account Management
Dedicated Imperva product and security experts will work with you on complex setup, integration and customization requirements to ensure your security and operational goals are met.
Support available to third parties

Onboarding and offboarding

Getting started
There is nothing to install or commission, and only a DNS setting change is required to re-direct traffic through Imperva's global network. Indeed, some clients have approached Imperva whilst under attack, and have been up and running in less than 1hr (the record is 15mins). Prospects often ask for a draft implementation plan, and there is the risk of disappointment that Imperva does not respond with a weighty document using MS Project and RASIC charts; and there is often an expectation that such a valuable and important service must surely take weeks or months to plan, configure, implement, etc. However, the reality is genuinely simple and can be summarised is a few sentences, below:

Significant tasks include:

a) 1-2hr planning session to agree roll-out plan and confirm any non-standard configuration settings.

b) Client provides a list of the website names to be on-boarded

c) Availability of client representative with knowledge and authority to make DNS changes for target website[s], and to manage SSL certificates.

d) 2hr/half-day session to familiarise client with management console/GUI

e) 1-2hr hand-holding session during switch-over of live websites to the Imperva Cloud WAF platform.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
We do not hold any client data.
End-of-contract process
The customer changes their DNS setting

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Via Smartphone
Service interface
Description of service interface
Imperva Cloud WAF provides customers and partners with the ability to manage accounts and sites via an API.

The API has the following characteristics:

Requests are HTTP POST.
Parameters are specified in the request body in HTML form style. For example:


All requests are in SSL.

Response content is provided as a JSON document.

UTF-8 encoding is always used.
Accessibility standards
None or don’t know
Description of accessibility
View the list of your websites configured on Imperva Cloud WAF, or add a new site. The Websites page is displayed when you log in to your account in the Incapsula Management Console.
To add a new site, click the Add Site button and follow the onscreen instructions.
The following details are displayed for each website. The statistics are generated daily and cover the last 7 days, except for bandwidth, which covers the last 30 days.
Human Visits
Bot Visits
Creation Date
Fully configured:
Partially configured:
Not configured:
Accessibility testing
What users can and can't do using the API
Imperva Cloud WAF provides customers and partners with the ability to manage accounts and sites via an API. The API has the following characteristics:

• Requests are HTTP POST
• Parameters are specified in the request body in HTML form style, e.g:
• All requests are in SSL
• Response content is provided as a JSON document
• UTF-8 encoding is always used
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Application delivery Rules are a fundamental part of modern application delivery platforms/services, whether it’s a CDN or a load balancer (ADC).

These rules are used to control and manipulate requests or responses according to predefined behaviors.

What can be done.

Switch content and redirect users based on layer 7 attributes, such as URL patterns, cookies, HTTP headers, and client classification attributes Improve user experience and SEO ranking by rewriting relative and dynamic URLs to clean customer-facing URLs

Offload connections and reduce round trip times between your web server and other backend servers

Leverage Incapsula client classification to identify bad bots and redirect them to a special site or server with fake content

Define rules based on client behavior, using customizable rate thresholds for various parameters

Implement backend logic without changing application code

Extend role-based control to non-technical users


Independence of resources
Our global network consists of 44+ data centers with over 6 Tbps capacity designed purely to protect your websites


Service usage metrics
Metrics types
Metrics include:

Website Traffic
Human visits
Bot visits
Application attacks
Hits per second
Bits per second
Daily Hits
Threat type
Attack Countries
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra support
Organisation whose services are being resold
Splunk, Trend , Sophos, Qualys, Netscout, Imperva, CyberArk, Fortinet, AWS

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Protecting data at rest
Other data at rest protection approach
We do not hold customer data.
Data sanitisation process
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Productized SIEM Integration

Provides centralized management of Incapsula data within existing security systems and workflows (SIEM systems)
Includes a log collector, and pre-made dashboards for easy implementation

Supported systems include: Splunk, McAfee, Qradar, and ArcSight
Data export formats
Other data export formats
Data import formats
Other data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability

Imperva commits to a NI annual uptime of 99.999% and a PI annual uptime of 99.95%. In the event of a NI Outage longer than five
minutes or a PI Outage longer than four hours, Client will be eligible to receive Credits.

DDoS Mitigation will take place within 3 seconds after Client has completed DDoS Activation. For customers that have purchased
the Infrastructure Protection Service and the Infrastructure Monitoring Service and have selected the option to allow Incapsula to
automatically route traffic through the Incapsula network, DDoS Mitigation will take place within five minutes after the Infrastructure
Monitoring Service has detected a DDoS attack on the customer infrastructure.

To submit a claim for Credits, Client must open a support ticket in Incapsula’s technical support ticketing system no more than seven calendar days after the time in which the Outage occurred and provide
detailed descriptions of the Outage, the duration of the Outage, network traceroutes, the site(s) affected and any attempts made by
Client to resolve the Outage. The support ticket must include the words “service credit request” in the ticket or email subject line.
Approach to resilience
Available on request.
Outage reporting
Public Dashboard & Email

Identity and authentication

User authentication needed
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
Available upon request.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Who accredited the PCI DSS certification
Comsec Group Ltd
PCI DSS accreditation date
What the PCI DSS doesn’t cover
All covered.
Other security certifications
Any other security certifications
  • Progressing FEDRAMP
  • PCI, SOC and ISO 27001

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
CSA CCM version 3.0
Information security policies and processes
Available upon request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Available on request.
Vulnerability management type
Vulnerability management approach
As opposed to other cloud service providers who only provide a service but use 3rd party technologies Imperva developed all the technologies it’s using from scratch and only uses standard servers and routers (no 3rd party technologies). This allows much more flexibility and rapid reaction to new threats and attack vectors (we do not have to wait for updates and patches – we do them ourselves instantaneously).

In order to fight today’s sophisticated and constantly changing attack patterns we have Imperva’s 24x7 SOC - manned with security experts that can handle any attack in real time.
Protective monitoring type
Protective monitoring approach
Available upon request.
Incident management type
Incident management approach
Available upon request.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£5,000 a unit a year
Discount for educational organisations
Free trial available
Description of free trial
Full service scope is available.

Timescales subject to client requirement.

Please make request via our website:
Link to free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.