ULTRIS LIMITED

Imperva SecureSphere Cloud DAM

SecureSphere Data Activity Monitoring and Database Firewall provides enterprise-class protection, audit analysis, automated processes and reports running natively on AWS and Azure. SecureSphere data protection solutions protect databases from attack, reduce risk and streamlines compliance by enabling organizations to leverage common infrastructure, both in AWS, Azure and on-prem.

Features

  • Directly protects data in AWS
  • Streamlines deployments; extends scalability by leveraging native features in Azure
  • Directly protects data in Azure
  • Hybrid licensing allows dynamic licensing on-prem, Azure and AWS
  • SecureSphere is deployed within your VPC to provide ironclad protection.

Benefits

  • Directly protects data in AWS monitoring database activity in real-time
  • Optional blocking of unauthorized activity
  • Streamlines compliance mandates with granular activity logging
  • Auto scales security with application
  • Accelerates deployment with AWS CloudFormation templates
  • Flexibility to deploy where you want, when you want
  • Detailed reporting
  • Monitors database activity in real-time,

Pricing

£1000 to £100000 per instance per year

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 10

783501462676702

ULTRIS LIMITED

ALAN M CARROLL

07919 338903

alan.carroll@ultris.com

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to FlexProtect is a licensing model that allows flexible deployment across Azure, AWS, google cloud and on hybrid on-prem.
Cloud deployment model Hybrid cloud
Service constraints MINIMUM REQUIREMENTS FOR EACH SECURESPHERE FOR AWS INSTANCE
Minimum AWS Instance Type M3 Extra Large
System requirements As above

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Directly with Imperva.
Imperva offers three levels of technical support – Standard, Enhanced, and Premium – that affords you the flexibility to select the plan that best meets your needs. All three programs include a formal escalation procedure that ensures effective resolution to all your issues and questions.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels STANDARD 8am to 6pm local time on work days ENHANCED 24x7x365
ENHANCED + DSE 24x7x365

DSE - is a designated support engineer
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started All of these are available as well as professional services and a managed service operation.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction The data is held by our customers either on-prem or in the cloud. Imperva does not process or hold customer data.
End-of-contract process The license is a subscription that can be renewed or turned off.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility Approved users have access to the admin console via a web browser.
Accessibility testing None
API Yes
What users can and can't do using the API SecureSphere includes a REST API for developers who want to access the SecureSphere server directly. SecureSphere REST APIs provide access to resources (data entities) using URL paths. To use a REST API , your application makes an HTTP request and parses the response.
SecureSphere API is protected via an Encrypted Session utilizing SSL.

SecureSphere has two extension APIs : a policy plug-in API and a generic API . Customers can upload plug-ins that will extend the policy and profile infrastructure. These plug-ins are typically developed by Imperva but are meant to provide flexible framework that are then customized by customers. The generic API can run any script, executable or OS command as an action policy for an alert.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation SecureSphere has two extension APIs : a policy plug-in API and a generic API . Customers can upload plug-ins that will extend the policy and profile infrastructure. These plug-ins are typically developed by Imperva but are meant to provide a flexible framework that is then customized by customers. The generic API can run any script, executable or OS command as an action policy for an alert.

Scaling

Scaling
Independence of resources Resource management is handled by AWS and/or Azure.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Reseller (no extras)
Organisation whose services are being resold Imperva Securesphere

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Other
Other data at rest protection approach Not applicable
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach The solution includes a proprietary engine for archiving and restoring audit data. The archived files can only be read through the system. SecureSphere can generate an archive file that can be exported to external systems via NFS, FTP, and CIFS. It is also possible to export audit data and audit reports to external systems through ODBC connections, CVS and PDF formats.
Data export formats
  • CSV
  • Other
Other data export formats PDF
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Other
Other protection between networks This is not applicable
Data protection within supplier network Other
Other protection within supplier network This is not applicable

Availability and resilience

Availability and resilience
Guaranteed availability Please reference the SLA's in our Imperva Customer Support Guide. (Attached)
Approach to resilience Not Applicable. Offering SAAS on Azure and AWS
Outage reporting All of the above

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels The audit logs are encrypted and accessible by authorized SecureSphere administrators or those users/roles specifically granted access privileges. In addition, SecureSphere solution is Common Criteria certified and will be compliant with federal STIG requirements that also require that access to the logs is restricted to authorized users and that they aren't tampered with by non-authorized users.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 The Standards Institution of Israel
ISO/IEC 27001 accreditation date 11/01/2018
What the ISO/IEC 27001 doesn’t cover .
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification Yes
Who accredited the PCI DSS certification Comsec Consulting
PCI DSS accreditation date 14/01/2018
What the PCI DSS doesn’t cover .
Other security certifications Yes
Any other security certifications
  • SOC 2
  • NIST800-53

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards We have a dedicated information security, governance risk and compliance team that works on evaluating and assessing our environment. This includes both products and internal controls.

PII compliance, HIPAA, Sarbanes are just some.
Information security policies and processes The Information Security Management System (ISMS) is the foundation for information security within Imperva. There is an annual security audit performed by a third-party security organization which reviews control objectives, controls, policies, processes and procedures for information security. Audits are performed in our three major offices on a rotational annual basis.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Available upon request
Vulnerability management type Undisclosed
Vulnerability management approach Imperva has a Vendor risk assessment process, ensuring major risks posed by a vendor are mitigated and acknowledged. In addition, Imperva security research team identifies outstanding vulnerabilities, and those vulnerabilities are analysed to check 1- if they impact Imperva's products and 2- if Imperva's product offers a mitigation against the associated threats/attacks.
Protective monitoring type Undisclosed
Protective monitoring approach Undisclosed. Available upon request.
Incident management type Undisclosed
Incident management approach Available upon request

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £1000 to £100000 per instance per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Full product available for trial based on agreed success criteria.

Documents

Documents
Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑