Try our new research platform with insights from 80,000+ expert users
it_user746931 - PeerSpot reviewer
Senior IT Security Specialist at National Water Company
Real User
Assesses the vulnerability of the database while it is running
Pros and Cons
  • "A solution which does what other name brand products do for a lower cost."
  • "The interface is not user-friendly."

What is our primary use case?

The primary use for our company is to enable the auditing on the DB level. The main target is to track the activities happening and by whom on critical tables. Based on that requirement, we purchased this database auditing solution because it was specific to Oracle for auditing purposes.

How has it helped my organization?

It addresses our needs and our clients' needs for Oracle DB reporting.

What is most valuable?

The features which are most valuable are from the security perspective. We do not have other specific tools for vulnerability assessment. The package allows user activity monitoring. The second thing is for assessing the vulnerability of the database while it is running. 

What needs improvement?

The GUI needs to be improved and made more user-friendly. This solution is a little complicated compared with other solutions for database auditing because of the GUI interface. It will be much more competitive if the interface meets the standards of the other vendors in the market.

For example, the price of the IBM Guardium is very high, but it's user-friendly. On the other hand, the Imperva GUI is complicated. It is harder for us to generate reports. That's why we face some hurdles in operations.

For security, the main point is to report on any violation of compliance. The administrator is required to generate reports. The GUI is set by the operator and not the admin of the device. Every time they need to make changes, it requires a lot of configuration to generate a new report. For any urgent report, the administrator has to be involved. It should not be necessary.

The agent should be installed at the box itself instead of going on the bridging system and doing the installation. Whenever any dependency is required, the activity becomes harder. If the dependency is not required then the activity can be handled from the box itself. It should be very easy to execute the administration and operations of the device. Comparing to Cisco devices, which are very user-friendly, other product manufacturers can take a lesson and make an effort to make the operational and administrative tasks easy.

It should be possible to execute by the team without writing custom lock sources. 

Buyer's Guide
Imperva SecureSphere Database Security
May 2025
Learn what your peers think about Imperva SecureSphere Database Security. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,604 professionals have used our research since 2012.

For how long have I used the solution?

We have been using this solution for about seven months.

What do I think about the stability of the solution?

Everything is working fine, so it is stable.

What do I think about the scalability of the solution?

As we are able to change our licensing to expand resources and features, it is scalable. We have not yet actually implemented the scalability.

How are customer service and support?

Till now we have not had any open cases with the technical support, so I cannot comment on that.

Which solution did I use previously and why did I switch?

Before Imperva, we used IBM Guardium. We switched because of the price. With IBM Guardium we were charged for features we never needed to use. We were using it only for auditing purposes. That is the same thing we are using Imperva for. As we did not have any need for the other features in Guardium we were paying extra for nothing. Some of the higher level features we now use in Imperva were available in Guardium, but we didn't use them at that time. 

How was the initial setup?

The initial setup was straightforward. At first, we were unable to find the application user tracking and our main target was to track specific user privileges, activity and who was making changes inside the database from the console. It was a minor setback.

There are two types of deployment. The first one is for the solution to integrate the database which took about three days. For the usage, identifying the queries and creating rules, it took longer. The whole was complete within 15 days or 20 days, I think.

We have three operators and two administrators. The administrator role is to make the policies, install the agent, do the integration with the gateway and enable the auditing on the specific tables and the specific columns.

The operator generates reports on users and activity based on the areas we need to monitor. If a user is doing any activity outside of the normal time, the operator's responsibility is to report users to the DVR admin and the security feed.

One guy was enough for the deployment. We have only integrated one database, so in our environment is simple.

Another thing I want to highlight is that you can adjust the permissions from anywhere.

What about the implementation team?

The deployment was done by the Imperva partner.

What was our ROI?

The immediate return is that we are saving money by having a lower cost for the same functionality. The new solution has satisfied management. I couldn't tell you the exact return. The only real additional cost was retraining staff. That was minimal.

What's my experience with pricing, setup cost, and licensing?

I don't know the exact prices because that is a function of accounting, but I know service is contracted on a yearly basis. We purchased the minimal license for Imperva initially even though we have a lot of databases, but the license covered our needs. The company has recommended increasing the licensing. 

There are additional costs depending on the features. For example, if we want to prevent something on the DV level we can't because we didn't purchase that license. If we want it, we can add it. Our main goal right now is to enhance the license for the TPS license (transaction process system). It is easy to enhance functionality by adding other features licenses.

Which other solutions did I evaluate?

We did a comparison between Imperva and IBM Guardium before making the switch. The comparison was based on two things: auditing the databases and monitoring user privileges. These two features were offered by both solutions, so we were just left to evaluate based on the difference in prices. 

What other advice do I have?

I would give Imperva an eight out of ten as a solution. It meets our requirements equally to what we got from IBM Guardium which we went with based on little more than their name.

In a later review, we considered Imperva and realized that both products had almost the same features. If the same functionality is provided by both, it is hard to justify the more expensive product. Now we will save the extra money.

At that time, the administrator was not comfortable with the change to Imperva but we provided official training from Imperva. He had experience with other solutions for database auditing systems, so he was able to make the adjustment.

We are working with the minimal license so currently, the resources are lower compared to our IBM Guardium license. Even with a shortage of resources, everything is equal to the IBM Guadium solution and we can correct that resource shortage while still saving money.

The main thing is defining the actual requirements. If a solution complies with the requirements there's no need to spend extra money for the brand names.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1059231 - PeerSpot reviewer
Technical Account Manager at a tech services company with 201-500 employees
Reseller
The company's focus on their market sector makes them stand out from the competition
Pros and Cons
  • "The technical support for Imperva is super, super, super."
  • "They have very good documentation and knowledgebase resources that add to the depth of their support."
  • "The company focuses on and has a passion for security."
  • "Imperva needs to improve their cloud capabilities."

What is our primary use case?

We primarily use the product for data security.  

What is most valuable?

The feature that I have found the most valuable is the firewall component.  

What needs improvement?

What I would like to see improved is Imperva making further development in terms of them going to the Cloud. Our business is moving to the cloud, so we want to have cloud availability as an option. Imperva can do the cloud database, but they are still working at building it out and it does not seem to me to be fully operational.  

For how long have I used the solution?

We have been using Imperva for a little bit more than six years.  

What do I think about the stability of the solution?

We are experiencing good stability with this product. We have not had any crashes and no major problems navigating its management.  

What do I think about the scalability of the solution?

I think that SecureSphere is very scalable. Across our whole company, everyone is using it. We are 50 people. Right now at this size, we only require two people for maintenance.   

How are customer service and technical support?

The technical support for Imperva is super, super, super. They have a very experienced support team. They can diagnose all of our issues and are always very fast. They have very good documentation and knowledgebase resources that add to the depth of their support.  

Which solution did I use previously and why did I switch?

I have previously used McAfee as a similar solution. We decided to switch because McAfee is a little bit tricky to get to work the way it should work. I had experience with their version 6.4 solution and it used a lot of resources and had too much overhead.  

How was the initial setup?

The initial setup is moderately difficult. You have to understand the database and how the database communicates and also some knowledge about the platform. For example, if you have got the Unix environment you have got to understand how to work with that together with the product.  

What's my experience with pricing, setup cost, and licensing?

Initially, SecureSphere was expensive but they have incentives on their packages now. They have introduced new price models, which makes the product more affordable now. It is now at a pricing level in the range where most people are looking for this type of solution.  

Which other solutions did I evaluate?

Before choosing Imperva, we did evaluate other options including IBM Guardian Data Protect and also Oracle Audit Vault. In the end, we finally made the choice to go with Imperva first of all because they are a company that is very much into digital security. Security is the central focus of their business, so that is one of their strong areas. Then their product support is one of the best. The solution is very advanced in terms of comparing their available resources and training to other companies. These resources make it a very complete solution.  

What other advice do I have?

Imperva Security Sphere is something that I recommend any day, anytime because they are very much focused on security as a passion. So you find it has tons of capacity for scalability. It is focused on security. Even the solution's usability is very good.  

On a scale from one to ten (where one is the worst and ten is the best), I would rate this product as a nine scored out of ten possible points.  

Features that I would like to see to make it to ten-out-of-ten means that they will need to add a few things. First, they need to onboard database encryption features. Then they need to add some of the other features which they do not have that other competitors already have. They can do more to offer a broader range of features and be more feature-rich.  

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
PeerSpot user
GeorgeFyffe - PeerSpot reviewer
GeorgeFyffeVice President of Global Sales at SecureCloudDB
User

SecureCloudDB offers Native Cloud Database Security. You get all the Foundational Security you would expect as well as Real Time Activity Monitoring and Alerting. This is complimentatry to what Imperva offers on-prem. Why not try it out by registering for the free trial? You've nothing to lose and everything to gain!!

Buyer's Guide
Imperva SecureSphere Database Security
May 2025
Learn what your peers think about Imperva SecureSphere Database Security. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,604 professionals have used our research since 2012.
PeerSpot user
Solution Architect at a financial services firm with 10,001+ employees
Real User
Facilities data enrichment and process automation. It manages cluster capacity.

What is most valuable?

The most valuable features are:

  • DAM Module
  • Third-party data source integration: Feeds automation
  • Data enrichment: Provides better data quality and session handling
  • API: Used for process automation

How has it helped my organization?

The solution has improved our organization as follows:

  • Better agent performance compared to v9.5
  • Gateways are much more stable
  • Gateway cluster improves resource utilization and provides better resiliency
  • Offers the option to manage cluster capacity without touching the agent configuration

What needs improvement?

BUGs, BUGs, BUGs. The product is under high development and the amount of bugs is bit disappointing. The product has lots of limitations which are not clearly documented. You can only find out the limitations by engaging the support

By using this product you can have only one type of date and time format which is US format. I’m EU citizen and I prefer different date format, same for time format. I would prefer 24Hour clock instead of AM/PM.

For how long have I used the solution?

We have been used this solution for over three years.

What do I think about the stability of the solution?

There were stability issues in v9.5. There are no major stability issues in v10.5.

Stability is dependent on the infrastructure. If you use hypervisor, then you need to make sure to use resources and I/O settings that are optimal for SecureSphere. Otherwise, you will end up with stability and performance issues.

What do I think about the scalability of the solution?

There are some scalability issues. There was a hardcoded limitation in the number of MXs you can connect to SOM. In addition, the bigger the infrastructure, the bigger challenge there is to create a single audit report file.

How are customer service and technical support?

The technical support is OK. But they have big potential to do things better.

Which solution did I use previously and why did I switch?

We had a previous solution. We switched because the new requirements couldn’t be accomplished with the old solution.

How was the initial setup?

The installation was quite complex. We had to integrated lots of external systems in order to make it work right.

What other advice do I have?

Give it a try. Write down your requirements as detailed as possible, and perform a PoC using this list. If you find gaps that require additional development, it could take some time until you actually get it.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user548754 - PeerSpot reviewer
L3 Application Support Analyst at a financial services firm with 1,001-5,000 employees
Real User
I believe the most valuable feature is the GUI. If load is big and there are advanced filtering rules in place, gateways or MX can crash.

What is most valuable?

I believe the most valuable feature is the GUI. It is still very much oversized for the job it does, but in comparison to other alternatives, it is still the best at the moment.

How has it helped my organization?

Before SecureSphere was used, the native auditing tools were used, and now there is a segregation of duties when managing audit data from DBAs and DBS teams. It is a much more secure way to have audit data from databases and to monitor actions of privileged accounts.

What needs improvement?

All areas of this product have room for improvement. There are a lot of things that can be improved if you want this to run in a corporate environment with thousands of database servers. If your database server count is low, it is a fine solution for you.

Lack of centralized integration when supporting/configuring appliances (SOM has some, but not all configuration/reporting/management functions, but you can’t do a lot of things from one management appliance (SOM) and have to go to separate MX when you want to configure something). As well you can’t upgrade appliances via Update module (you can only do so with agent and that functionality has much room for improvement as the update GUI is not well designed, some functions do not work and event/alert notifications there are mostly useless). So this and some other things make management and support of very large SecureSphere infrastructure sometimes painful.

For how long have I used the solution?

I’ve been using SecureSphere for over three years.

What do I think about the stability of the solution?

It depends on the load of gateways/MXs. If load is big and there are advanced filtering rules in place, gateways or MX can crash or perform slowly.

What do I think about the scalability of the solution?

The SOM does not have all the functionality yet to manage all MXs centrally and, if you have a very large infrastructure, it is not so easy to manage it, as it requires you to apply updates or new configurations directly to agents or MXs 1 by 1.

How are customer service and technical support?

The support team responds promptly but sometimes it seems that, in more complex cases, they just try to stall for time for R&D to look at it and that they don’t know why some problems are happening.

Which solution did I use previously and why did I switch?

Before, we were using native database auditing tools. Regulators have pointed out that DBAs are managing auditing tools themselves, which is not a good practice. Usage of SecureSphere and forming a new team responsible only for management of this tool was suggested.

How was the initial setup?

Setup was complex. We had to deploy hundreds of gateway appliances to gather audit data and deploy thousands of agents to different OSs. This was not an easy task, as there were no simple solutions to do that. There were also challenges to configuring auditing rules and monitoring rules to work with all kinds of databases and different kind of requirements relating to them.

What's my experience with pricing, setup cost, and licensing?

I don’t know anything about pricing and licensing.

Which other solutions did I evaluate?

I believe an IBM solution was considered, but it was much too expensive and didn’t provide as many features.

What other advice do I have?

Use the newest version (at the moment I think it is 11.5) and pay extra for staff training and additional consultation on how to set up rules, etc.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1404789 - PeerSpot reviewer
Core Banking Application Support at a financial services firm with 10,001+ employees
Real User
Good granular auditing, but have had issues with the WAF and do not find it user friendly
Pros and Cons
  • "Currently, we have audit features for auditing databases, for example, granular auditing, which we really enjoy. We've been using it to check what users do."
  • "The solution is expensive."

What is our primary use case?

We primarily use the solution for monitoring database activities.

What is most valuable?

Currently, we have audit features for auditing databases, for example, granular auditing, which we really enjoy. We've been using it to check what users do. 

Apart from the WAF, which we've had issues with, every other feature we've been able to use very well. We use it for scanning databases, which is perfect. We need to run vulnerabilities counts as well, and this solution is great for that.

What needs improvement?

The feature right now that we have not been able to use successfully is the firewall aspect, the WAF.

In terms of the WAF, we tried their blocking functionality at some point, and our entire company came to a halt due to the fact that it was blocking even database connections. It was hanging our databases. Until now, we've not been able to fully use their database blocking functionality very well. That is the only aspect that I wish could be improved tomorrow.

The entire system is not user-friendly for me, and definitely not as user-friendly as Oracle Vault. It should be more user-friendly, to make it much more competitive in the space. 

The technical support is not offered by the company itself. Rather, you can only get technical support via partners. It isn't that good and because of this, we want to leave the product.

The solution is expensive.

If we can look at a system that can do 360 annual. There is an app call bridge that is something they've introduced, however, we don't have that yet. I don't know if that is able to do application monitoring as well, but I wish they had a feature that could do both the database and application monitoring.

For how long have I used the solution?

I've been using the solution for about four to five years now.

What do I think about the stability of the solution?

The stability is okay. I don't recall any kind of bug or glitch. It doesn't freeze or crash. Aside from issues with WAF, it's good.

What do I think about the scalability of the solution?

The scalability is fine for our purposes. We are able to modify the product, and we are able to do things to suit what we need, so it's okay for us. If I were to rate them out of ten on scalability, I'd give them a six.

How are customer service and technical support?

One of the reasons we want to leave this solution is the fact that we don't have any technical support whatsoever. If there was some on offer, it might convince us to stay. Technical support is typically handled by partners, and they do not do a good job. We've been trying to reach the parent company directly because we are unsatisfied with the level of service we've received and we've had no luck. Therefore, we'll probably leave the service altogether.

What's my experience with pricing, setup cost, and licensing?

The solution is pretty pricey. It's not the least expensive option. An organization will have to ensure they have the budget to cover the cost or having the product. I'd say that the amount of money they charge is unreasonable sometimes. If I were to rate them out of ten on pricing, I would give them a one.

Which other solutions did I evaluate?

We're currently looking to move away from Imperva. We're considering Audit Vault.

What other advice do I have?

The solution is okay, however, there is a lot to be improved upon. For that reason, I'd rate them five out of ten overall.

It's not a bad tool. It's a good tool. I tend to recommend it to others, however, if you're a small company, it may not make sense due to the fact that it is quite expensive.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
PeerSpot user
Mangalik Pal - PeerSpot reviewer
Senior Network Security Engineer at SNSIN
Real User
Easy to set up with good audit features and good performance
Pros and Cons
  • "The audit feature is great. It is totally encrypted."
  • "Some cloud versions are not supported by the agent."

What is our primary use case?

The use case is for database services, security purposes, and access capabilities. In DAM, we cannot use inline mode due to the blocking that is there. Details can be shared and accessed to see, for example, information about the DB, who's using it, its applications, et cetera. There are all kinds of reporting that can be accessed. We submit reports to the customer.

What is most valuable?

The audit feature is great. It is totally encrypted. Nobody can tamper with the details. For example, a DB admin can change the audit, however, if they are using the DAM product, that is totally different infrastructure so that the log, since it is an agent-based solution, whatever the activity will be done in the server regarding the database audit will be captured by the audit and that agent. The communication is totally encrypted and nobody can tamper with that data.

The initial setup is not overly complex.  

What needs improvement?

Some cloud versions are not supported by the agent. For example, we had a client that wanted to move to the cloud and wanted to use AWS, however, it was not possible. Imperva should have every kind of agent.

For how long have I used the solution?

I've used the solution for around three years. I've used it for a while now. 

What do I think about the stability of the solution?

The solution is stable. It's very reliable and the performance is good.

What do I think about the scalability of the solution?

It's a scalable solution. It's good. If we can just change the gateway or if it is a VM right now, we can upgrade the resources, or we can install many more agents in the server, in other servers, and we can take more servers behind it so that we can capture all the data for any of the server.

How are customer service and support?

Technical support is good. Sometimes we have to raise a ticket and we get good, proper support. There's no issue.

How was the initial setup?

The the setup itself is not too complex, it's conceptual. You have to understand at least the basics of the database. That's it. You don't have to be a DB admin, however, as a security engineer, you just need some small knowledge of a database, for example, what the database is, what the table is, et cetera.

What other advice do I have?

We are partners. 

I'd recommend the solution. If a company has a plan for the Imperva DAM solution, it can, while still not using the Imperva WAF solution. The WAF solution is also good. We can use the WAF as well as DAM. We have a box, a gateway, or management that is used for both cases.

If an organization wants to do both the cases like I have a database, I have a web server, I want to secure both the infrastructures, I know I can strictly go for the Imperva, and Imperva will give management of two gateways for two different solutions, and that's it. It can be a complete package.

I'd rate the solution nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Security Consultant and Cybersecurity Support at a tech services company with 51-200 employees
Real User
Enables us to monitor the most critical DBA activities, helping identify default accounts and passwords
Pros and Cons
  • "As we are very sensitive to financial impacts, this product provides great protection for our organization."
  • "I would like to see improvement in the integration part of the tool. This should be an easy process."

What is our primary use case?

The primary use case is for database monitoring. We are also using the blocking part, which is used for: 

  • Any suspicious activities which are done, such as delete command and query command, outside the admin, the solution is supposed to block them.
  • The blocking of compromised databases through cloning. Blocking will not allow the cloning.

We use it for blocking and auditing. Our job is monitoring. We are a government entity and provide services to other ministries. We use Imperva for its Database Activity Monitoring and File Integrity Monitoring tools. We have also enabled Database Firewall.

How has it helped my organization?

As we are very sensitive to financial impacts, this product provides great protection for our organization.

It enabled us to monitor the most critical DBA activities, and most critically helped us identify default accounts and passwords. Additionally, with this solution we were able to block an external attack on our Oracle DB.

What is most valuable?

  • DB Activity Monitoring
  • DB Firewall
  • CounterBreach

Their web application firewall (WAF) is quite good.

What needs improvement?

They have to put more focus on the administrative part of the application, especially on upgrades. There are a lot of packages to download and install that you have to be knowledgeable on. For example, we tried to install a version, and it did not work. Then, support had to become involved.

They should add an application availability dashboard feature and should focus more on the alerting mechanism.

There is a problem with the integrations. I would also like to see improvement in the integration part of the tool. This should be an easy process. For example, I had an issue with the integration of a file server. 

Within the endpoints, the communication is breaking down most of the time. Sometimes, once the communication stops, it does not resume again.

They could approve monitoring in the next release. E.g., right now, we lack the ability to know when databases are down. This is something we could use monitoring to mitigate. 

For how long have I used the solution?

I have been using Imperva for around four and a half years.

What do I think about the stability of the solution?

The stability is good. Sometimes the gateways disconnect and connect again automatically.

We have a dedicated staff person for maintenance: alert, fine tuning, and adjustments.

What do I think about the scalability of the solution?

The solution is scalable. I would rate the scalability as an nine out of ten. We have used this solution since 2014 but have not encountered any scalability issues so far.

Within our organization, we have around 500 users. Our site protects approximately 70,000 end users.

How are customer service and technical support?

When the technical support is required, they assist us. I would rate them as seven out of ten because they are not so good due to the due to differing time zones. 

We managed by using the regional vendors. Overall, the support is effective.

Which solution did I use previously and why did I switch?

We previously used IBM Guardium. Before 2015, it was bit complicated to use.

How was the initial setup?

A bit complex, but following the instructions and the manual guide is enough for the initial setup. A little knowledge helps.

What about the implementation team?

We used the Imperva Professional Services for the configuration in our environment. It is important to have experienced professionals do these changes.

The initial deployment for our team was a failure.

The implementation took one week. Afterwards, the configuration started, then the use case testing. Overall, it took for us around one month.

Our local partner is now supporting us. Gulf IT has very good experience in the Middle East. They are nice to work with and supporting us well.

What was our ROI?

We have seen ROI, as it protects our company from threats.

This tool helped us mitigate audit risks by 100 percent.

What's my experience with pricing, setup cost, and licensing?

We have all the licenses, which we pay for annually. The price is a little high, but the product is good.

Which other solutions did I evaluate?

Yes, Guardium.

What other advice do I have?

Identify the proper use cases, then implement it.

Resource overhead management is a good option. The OS chain option provides the real user behind the DB application user.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Senior IT Security Consultant at a tech consulting company with 51-200 employees
Consultant
It relies on signature-based policies, as well as on a web correlation engine.

What is most valuable?

WAF is a great security layer to protect an organization from a wide spectrum of application attacks residing in OSI layer 7. The Imperva device relies on signature-based policies, as well as on a web correlation engine. In addition, the packet inspection can be enhanced with the aid of stream signature policies, which are policy items focused on the stream rather than the HTTP/HTTPS protocol. Imperva can easily match a web user to the requests launched from his client. While the default policy subset is very rich and covers different regulations (e.g., PCI, SOX), there is always an option to create custom policies addressing specific needs. Security alerts are comprehensive of all the necessary details for the analysis, such as connection details, signature triggered, alert type (e.g., Protocol, Profile), severity and followed action (e.g., syslog forward, IP monitoring).

DAM also provides great value to audits and again, the data monitoring policies by default are very rich.

If you don't know exactly what kind of data you store in-house, SecureSphere allows you to actively scan and classify your information, automatically providing you detailed status of the data, which can be further reviewed and finalised by analysts or DBAs. This is also valid for user rights on the data, understanding the level of privileges granted to users and suggesting countermeasures in detailed aggregated charts and reports.

Once under monitoring, the data can be reviewed with an intuitive interface that allows the analyst to drill down, quickly narrowing the scope in a few clicks and focusing the attention only on the relevant queries. Once the pattern is identified, it is even possible to quickly report a detailed status of the findings, as well as generate a report template for future uses. This is on the hot data, what we have available in the management database. The time span can be increased indeterminately with a good retention configuration, combined with a SAN that stores the cold data, partitioned in daily slices and ready to be loaded into a separate database space for archives.

This is brilliant if you think about scalability, for you can obtain a very big archive while preserving system resources and performance. However, to get this configuration, in-depth tuning is needed for several weeks in order to get all relevant metrics (e.g. data stored per day, data spikes, backup speed, link transfer capacity, etc.) and adopt the appropriate customizations.

Audit data can also be correlated with application users by obtaining a detailed match of the database queries executed according to a particular web user’s HTTP requests.

The FAM module allows organizations to continuously audit storages and network shares and keep a detailed record of every file operation across the company. Scans are available also in this context, providing user rights as well as access to the monitored files. A data classification is also possible with the FAM.

All of Imperva’s features are extremely powerful, while a certain degree of knowledge is required to have a solid understanding of the product.

How has it helped my organization?

Imperva helps you comply with data regulations such as SOX or PCI. It helps SOC analysts to enlarge the scope analysis, significantly providing great procedures to drill down into the audit or a customizable enrichment fed by several types of input, e.g. Active Directory or other external platforms, and even a layer 7 inspection. When fully integrated, the application user requests are bound with the queries executed, giving a comprehensive picture of how your web application interacts with the data layer highlighting all possible security flaws in the data management, code bugs or server misconfigurations. All this logical data collection is effectively arranged into detailed profiles from where it is possible to spot the unusual deviations or to create advanced conditions to trigger upon this baseline. Think about access to PCI data from users different to the ones allowed, such as DBAs, only from a certain subnet, let's say the external network, out of the business hours, like nights or weekends. This is one possibility of what Imperva can achieve in your organization to protect the data from unauthorised users.

What needs improvement?

To have the mind at ease with a security solution has been always a chimera. Even SecureSphere suffers from some limitations, which I believe will be handled in the near future. I see two main things to improve at this point:

  • SSL tunnel support for z/OS agents
  • Capability to retain live audit policy data for several months; sometimes, on certain installations, this is not feasible due to the big data streams involved in the scope.

For how long have I used the solution?

I've been supporting the Imperva technology since version 8.x. I have a company that provides consultancy services and I support Imperva.

What do I think about the stability of the solution?

From versions 9.5 and later, the Imperva solution has reached an optimum level of stability. On every unusual state reported, I was always able to relate it to misconfigurations or other hardware limitations and never to major bugs or software problems.

What do I think about the scalability of the solution?

Again, Imperva works great when you need to increase managed devices, add new gateways or even change the operational modes of the latter.

How are customer service and technical support?

On a scale from 1-10 (1=worst, 10=best) I would say technical support is 9. Support is always guaranteed and every internal SE has been always competent and ready to assist.

Which solution did I use previously and why did I switch?

I tested different audit and WAF solutions and the one I was always more comfortable with is Imperva.

How was the initial setup?

Setup is actually complex due to the nature of the product and needs deep knowledge of the solution to get things working with minor effort. If you don't know exactly what kind of solution are you deploying or even the installation steps to get the environment fully working, you won't be able to install it easily.

What's my experience with pricing, setup cost, and licensing?

I am a technician, so I am not very confident discussing this topic.

What other advice do I have?

Doing the initial Imperva training before putting your hands on the product helps a lot. Getting assistance from Imperva during the initial stage of your new environment is highly recommended.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Imperva SecureSphere Database Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2025
Product Categories
Database Security
Buyer's Guide
Download our free Imperva SecureSphere Database Security Report and get advice and tips from experienced pros sharing their opinions.