Imperva Application Security
Mitigates risk for your organisation with full-function defense-in-depth, protecting not just your websites but all your applications and networks from attack and ensuring they remain available, user-friendly and secure. From best-of-breed web application firewall (WAF) and Runtime Application Security Protection (RASP), to comprehensive DDoS mitigation, and advanced BOT protection.
Features
- Web Application Firewall
- DDoS Protection
- Advanced BOT Protection
- Runtime Application Self Protection
- Attack Analytics
- API Security
- Application-aware CDN & Content Caching
Benefits
- Reduce operational overhead
- Maximise website uptime
- 44 global scrubbing centers
- experienced bot experts
- Improve time to deployment
- combat alert fatigue
- Gain visibility
- Increase website throughput
Pricing
£5,000 a unit a year
Service documents
Request an accessible format
Framework
G-Cloud 12
Service ID
3 0 5 9 9 4 6 4 7 9 1 2 9 6 3
Contact
Blue Cube Security Ltd
Operational Admin Support
Telephone: 0345 0943070
Email: operations@bluecubesecurity.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Hybrid cloud
- Service constraints
- The service can be tied down to a UK POP, however it is more effective when deployed using all our worldwide POP's. That way, we can stop the bad actors coming after your website before they reach the UK.
- System requirements
- Imperva Cloud WAF is activated by a simple DNS change
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Customers cases will be assessed and graded on receipt. The customer can also request an escalation to a case. Imperva operates 24x7 follow the sun support, so response times are the same at weekends.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Web chat is accessed through the Support Portal. The support portal is a public facing website which contains access to our Online Help Desk,Web Chat and documentation such as setup guides, videos and forums.
- Web chat accessibility testing
- Not Known / Not Tracked.
- Onsite support
- Yes, at extra cost
- Support levels
-
Key features of the Imperva Cloud WAF offering include:
• Enterprise-Grade SLA When it comes to service availability, there are no compromises. Backed by a 99.999% uptime and support SLA, our enterprise-grade website security and performance services are used by many of the world’s leading online businesses.
• Premium 24x7 Support
Our support engineers and security experts are available round-the-clock to give you the support you need, when you need it.
• Enterprise-Grade Security Featuring a PCI-certified Web Application Firewall and comprehensive protection against DDoS attacks, Incapsula secures your website from external attacks, maximizes uptime and maintains business continuity.
• API For Provisioning, Management And Events The Imperva Cloud WAF API enables easy integration with streamlined customer provisioning
and account management. Export security events to your log management and SIEM systems and create customized reports for your target audience.
• Customized Setup and Branding Our customization options allow enterprises to easily brand customer-facing pages (for example security messages, error pages, etc.) to reflect your own website’s look
and feel.
• Dedicated Account Management
Dedicated Imperva product and security experts will work with you on complex setup, integration and customization requirements to ensure your security and operational goals are met. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
There is nothing to install or commission, and only a DNS setting change is required to re-direct traffic through Imperva's global network. Indeed, some clients have approached Imperva whilst under attack, and have been up and running in less than 1hr (the record is 15mins). Prospects often ask for a draft implementation plan, and there is the risk of disappointment that Imperva does not respond with a weighty document using MS Project and RASIC charts; and there is often an expectation that such a valuable and important service must surely take weeks or months to plan, configure, implement, etc. However, the reality is genuinely simple and can be summarised is a few sentences, below:
Significant tasks include:
a) 1-2hr planning session to agree roll-out plan and confirm any non-standard configuration settings.
b) Client provides a list of the website names to be on-boarded
c) Availability of client representative with knowledge and authority to make DNS changes for target website[s], and to manage SSL certificates.
d) 2hr/half-day session to familiarise client with management console/GUI
e) 1-2hr hand-holding session during switch-over of live websites to the Imperva Cloud WAF platform. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- We do not hold any client data.
- End-of-contract process
- The customer changes their DNS setting
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Via Smartphone
- Service interface
- Yes
- Description of service interface
-
Imperva Cloud WAF provides customers and partners with the ability to manage accounts and sites via an API.
Overview
The API has the following characteristics:
Requests are HTTP POST.
Parameters are specified in the request body in HTML form style. For example:
param1=value1&param2=value2
All requests are in SSL.
Response content is provided as a JSON document.
UTF-8 encoding is always used. - Accessibility standards
- None or don’t know
- Description of accessibility
-
View the list of your websites configured on Imperva Cloud WAF, or add a new site. The Websites page is displayed when you log in to your account in the Incapsula Management Console.
To add a new site, click the Add Site button and follow the onscreen instructions.
The following details are displayed for each website. The statistics are generated daily and cover the last 7 days, except for bandwidth, which covers the last 30 days.
Name
Bandwidth
Human Visits
Bot Visits
Threats
Creation Date
Status
Fully configured:
Partially configured:
Not configured:
Disabled: - Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
-
Imperva Cloud WAF provides customers and partners with the ability to manage accounts and sites via an API. The API has the following characteristics:
• Requests are HTTP POST
• Parameters are specified in the request body in HTML form style, e.g:
param1=value1¶m2=value2
• All requests are in SSL
• Response content is provided as a JSON document
• UTF-8 encoding is always used - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Application delivery Rules are a fundamental part of modern application delivery platforms/services, whether it’s a CDN or a load balancer (ADC).
These rules are used to control and manipulate requests or responses according to predefined behaviors.
What can be done.
Switch content and redirect users based on layer 7 attributes, such as URL patterns, cookies, HTTP headers, and client classification attributes Improve user experience and SEO ranking by rewriting relative and dynamic URLs to clean customer-facing URLs
Offload connections and reduce round trip times between your web server and other backend servers
Leverage Incapsula client classification to identify bad bots and redirect them to a special site or server with fake content
Define rules based on client behavior, using customizable rate thresholds for various parameters
Implement backend logic without changing application code
Extend role-based control to non-technical users
Scaling
- Independence of resources
- Our global network consists of 44+ data centers with over 6 Tbps capacity designed purely to protect your websites
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Metrics include:
Website Traffic
Human visits
Bot visits
Threats
Bandwidth
Status
Application attacks
Countries
Hits per second
Bits per second
Daily Hits
Threat type
Attack Countries - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Splunk, Trend , Sophos, Qualys, Netscout, Imperva, CyberArk, Fortinet, AWS
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- EU-US Privacy Shield agreement locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
- We do not hold customer data.
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Productized SIEM Integration
Provides centralized management of Incapsula data within existing security systems and workflows (SIEM systems)
Includes a log collector, and pre-made dashboards for easy implementation
Supported systems include: Splunk, McAfee, Qradar, and ArcSight - Data export formats
- Other
- Other data export formats
- SIEM API
- Data import formats
- Other
- Other data import formats
- N/A
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
UPTIME COMMITMENT
Imperva commits to a NI annual uptime of 99.999% and a PI annual uptime of 99.95%. In the event of a NI Outage longer than five
minutes or a PI Outage longer than four hours, Client will be eligible to receive Credits.
MITIGATION COMMITMENT
DDoS Mitigation will take place within 3 seconds after Client has completed DDoS Activation. For customers that have purchased
the Infrastructure Protection Service and the Infrastructure Monitoring Service and have selected the option to allow Incapsula to
automatically route traffic through the Incapsula network, DDoS Mitigation will take place within five minutes after the Infrastructure
Monitoring Service has detected a DDoS attack on the customer infrastructure.
OUTAGE EVENTS AND CREDITS
To submit a claim for Credits, Client must open a support ticket in Incapsula’s technical support ticketing system no more than seven calendar days after the time in which the Outage occurred and provide
detailed descriptions of the Outage, the duration of the Outage, network traceroutes, the site(s) affected and any attempts made by
Client to resolve the Outage. The support ticket must include the words “service credit request” in the ticket or email subject line. - Approach to resilience
- Available on request.
- Outage reporting
- Public Dashboard & Email
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- Available upon request.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Comsec Group Ltd
- PCI DSS accreditation date
- 22/1/2020
- What the PCI DSS doesn’t cover
- All covered.
- Other security certifications
- Yes
- Any other security certifications
-
- Progressing FEDRAMP
- PCI, SOC and ISO 27001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
- Available upon request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Available on request.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
As opposed to other cloud service providers who only provide a service but use 3rd party technologies Imperva developed all the technologies it’s using from scratch and only uses standard servers and routers (no 3rd party technologies). This allows much more flexibility and rapid reaction to new threats and attack vectors (we do not have to wait for updates and patches – we do them ourselves instantaneously).
In order to fight today’s sophisticated and constantly changing attack patterns we have Imperva’s 24x7 SOC - manned with security experts that can handle any attack in real time. - Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Available upon request.
- Incident management type
- Undisclosed
- Incident management approach
- Available upon request.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £5,000 a unit a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
-
Full service scope is available.
Timescales subject to client requirement.
Please make request via our website:
http://www.bluecubesecurity.com/contact-usgcloud/ - Link to free trial
- http://www.bluecubesecurity.com/contact-usgcloud/