SR Cloud Solutions Ltd

Imperva SecureSphere Cloud WAF

SecureSphere Web Application Firewall (WAF) for AWS & Azure provides the industry’s leading WAF technology to protect web apps. It combines multiple defences to accurately pinpoint and block attacks without blocking your citizens and partners.

Features

  • Directly protects applications in AWS
  • Streamlines deployments; extends scalability by leveraging native features in Azure
  • Directly protects applications in Azure
  • Hybrid licensing allows dynamic licensing on-prem, Azure and AWS
  • SecureSphere is deployed within your VPC to provide ironclad protection.
  • Accuracy of Detection: Dynamic Profiling and Correlated Attack Validation

Benefits

  • Directly protects applications in AWS & Azure
  • Optional blocking of unauthorized activity
  • Auto scales security with application
  • Accelerates deployment with AWS CloudFormation templates
  • Flexibility to deploy where you want, when you want
  • Detailed reporting
  • Highest accuracy of detection and lowest false positives/negatives.

Pricing

£1,000 an instance a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jamie@srcloudsolutions.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

7 0 6 8 5 8 5 0 5 1 8 0 3 6 9

Contact

SR Cloud Solutions Ltd Jamie Ritchie
Telephone: 02036039960
Email: jamie@srcloudsolutions.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Service an extension to FlexProtect for applications is a licensing model that allows flexible deployment across Azure, AWS, google cloud and hybrid on-prem.
Cloud deployment model
Hybrid cloud
Service constraints
MINIMUM REQUIREMENTS FOR EACH SECURESPHERE FOR AWS INSTANCE Minimum AWS Instance Type M3 Extra Large
System requirements
  • AWS Instance Type M3 Extra Large
  • https://www.imperva.com/resources/datasheets/Imperva-DS-SECURESPHERE-APPLIANCE-Web092118.pdf

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times Imperva will use commercially reasonable efforts to respond to cases within the response times set forth below. These response times are targets only, not guarantees. Imperva does not guarantee resolution times or delivery dates. These response times are subject to change depending on the nature and complexity of the case. Severity Response Time Update interval 1 "Critical" Less than 1 hour at least once a day 2 "High" 2 hour at least every other day 3 "Medium" 4 hours at least once a week 4 "Low" 8 hours as appropriate.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
STANDARD 8am to 6pm local time on work days ENHANCED 24x7x365 ENHANCED + DSE 24x7x365 DSE - is a designated support engineer
Support available to third parties
Yes

Onboarding and offboarding

Getting started
All of these are available as well as professional services and a managed service operation.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
The data is held by our customers either on-prem or in the cloud. Imperva does not process or hold customer data.
End-of-contract process
The license is subscription based that can be renewed or turned off. Any support contracts are terminated.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
There is no difference as the WAF is checking for attacks at the server side.
Service interface
Yes
Description of service interface
Available through a web browser
Accessibility standards
None or don’t know
Description of accessibility
Documents that are web pages; documents that are embedded in web pages and that are used in the rendering or that are intended to be rendered together with the web page in which they are embedded; software that is a web page; software that is embedded in web pages and that is used in the rendering or that is intended to be rendered together with the web page in which it is embedded.
Accessibility testing
Not known
API
Yes
What users can and can't do using the API
SecureSphere includes a REST API for developers who want to access the SecureSphere server directly. SecureSphere REST APIs provide access to resources (data entities) using URL paths. To use a REST API , your application makes an HTTP request and parses the response. SecureSphere API is protected via an Encrypted Session utilizing SSL. SecureSphere has two extension APIs : a policy plug-in API and a generic API . Customers can upload plug-ins that will extend the policy and profile infrastructure. These plug-ins are typically developed by Imperva but are meant to provide flexible framework that are then customized by customers. The generic API can run any script, executable or OS command as an action policy for an alert.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
SecureSphere has two extension APIs : a policy plug-in API and a generic API . Customers can upload plug-ins that will extend the policy and profile infrastructure. These plug-ins are typically developed by Imperva but are meant to provide a flexible framework that is then customized by customers. The generic API can run any script, executable or OS command as an action policy for an alert.

Scaling

Independence of resources
Resource management is handled by AWS and/or Azure.

Analytics

Service usage metrics
No

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Imperva

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
Not applicable
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
The solution includes a proprietary engine for archiving and restoring audit data. The archived files can only be read through the system. SecureSphere can generate an archive file that can be exported to external systems via NFS, FTP, and CIFS. It is also possible to export audit data and audit reports to external systems through ODBC connections, CVS and PDF formats.
Data export formats
  • CSV
  • Other
Other data export formats
PDF
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
This is not applicable
Data protection within supplier network
Other
Other protection within supplier network
This is not applicable

Availability and resilience

Guaranteed availability
Please reference service definition document attached
Approach to resilience
Not Applicable. Offering SaaS on Azure and AWS only. Dependent on client public cloud HA infrastructure design and setup.
Outage reporting
Public dashboard, API and Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
The audit logs are encrypted and accessible by authorised SecureSphere administrators or those users/roles specifically granted access privileges. In addition, SecureSphere solution is Common Criteria certified and will be compliant with federal STIG requirements that also require that access to the logs is restricted to authorised users and that they aren't tampered with by non-authorised users.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
The Standards Institution of Israel
ISO/IEC 27001 accreditation date
11/01/2018
What the ISO/IEC 27001 doesn’t cover
ISO/IEC 27001 covers all information security (ISMS) related policies, systems and procedures.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
Comsec Consulting
PCI DSS accreditation date
14/01/2018
What the PCI DSS doesn’t cover
Payment Card Industry Data Security Standard (PCI DSS) covers technical and operational system components included in or connected to cardholder data.
Other security certifications
Yes
Any other security certifications
  • SOC 2
  • NIST800-53

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
Imperva have a dedicated information security, governance risk and compliance team that works on evaluating and assessing their environment. This includes both products and internal controls. PII compliance, HIPAA, Sarbanes are just some.
Information security policies and processes
The Information Security Management System (ISMS) is the foundation for information security within Imperva. There is an annual security audit performed by a third-party security organisation which reviews control objectives, controls, policies, processes and procedures for information security. Audits are performed in our three major offices on a rotational annual basis.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Available on request
Vulnerability management type
Undisclosed
Vulnerability management approach
Imperva has a vendor risk assessment process, ensuring major risks posed by a vendor are mitigated and acknowledged. In addition, Imperva security research team identifies outstanding vulnerabilities, and those vulnerabilities are analysed to check if they impact Imperva's products and if Imperva's product offers a mitigation against the associated threats/attacks.
Protective monitoring type
Undisclosed
Protective monitoring approach
Undisclosed. Available upon request
Incident management type
Undisclosed
Incident management approach
Available upon request

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£1,000 an instance a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Full product available for trial based on agreed success criteria.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jamie@srcloudsolutions.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.