
Overview

Product video
Imperva SecureSphere WAF for AWS extends all of the security and management capabilities of the world's most-trusted web application firewall to Amazon Web Services environments. SecureSphere for AWS is the first enterprise-class Web Application Firewall tailored specifically for Amazon Web Services. Running natively in AWS, and leveraging all its capabilities, SecureSphere for AWS scales on-demand with AWS applications. SecureSphere applies multiple defenses and correlates results to offer laser-accurate attack detection. Certified by ICSA Labs, SecureSphere addresses PCI 6.6 and provides ironclad protection against the OWASP Top Ten, including SQL Injection, XSS and CSRF. Note that AV1000 provides up to 100 Mbps throughput. If more is required, see SecureSphere Web Application Firewall AV2500 Gateway for AWS (On-Demand).
Highlights
- Automated Protection - Patented Dynamic Profiling technology streamlines management and lowers operations costs by learning application changes over time. Security updates from the Imperva ADC protect applications against the latest threats.
- Flexible Deployment Options - The SecureSphere WAF offers organizations automated, adaptable security and easy deployment into Amazon environments with full support for elastic load balancing and CloudFormation.
- Fraud and Automated Attack Protection - With advanced bot detection capabilities, IP Reputation, granular custom rules, and fraud integration, SecureSphere stops dangerous threats like site scraping, application DDoS, comment spam, and web fraud.
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Cost/hour |
|---|---|
c5a.2xlarge Recommended | $1.37 |
c4.2xlarge | $1.37 |
c5a.4xlarge | $1.37 |
c5.2xlarge | $1.37 |
c4.4xlarge | $1.37 |
c6i.xlarge | $1.37 |
c5.4xlarge | $1.37 |
c7i.xlarge | $1.37 |
c5a.8xlarge | $1.37 |
c7i.2xlarge | $1.37 |
Vendor refund policy
We do not support refunds, but customers can cancel at any time. Contact Imperva for more information.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Additional details
Usage instructions
AUTOMATIC DEPLOYMENT (RECOMMENDED)
Imperva simplifies the deployment of your WAF Gateway infrastructure on AWS by providing dynamically generated CloudFormation and Terraform templates tailored to your specific requirements via the Imperva Cloud Template Tool.
For detailed instructions and additional information: https://docs.imperva.com/bundle/v15.4-waf-on-amazon-aws-byol-installation-guide/page/10450.htm
MANUAL DEPLOYMENT
DISCLAIMER:
- This procedure is not intended for use in large-scale production environments. For a best-practice installation, use the automated deployment method.
- You must obtain an account-unique unseal key from Imperva to complete this procedure.
- You need a running Imperva WAF Gateway Management Server to use this product.
-
Create a VPC, a key pair and at least one subnet.
-
Create a security group for the Gateway instances.
-
Create the following inbound rules:
- [Management Server SG] ==> [Gateway SG] @ TCP:443
- [Gateway SG] ==> [Management Server SG] @ TCP:8083, TCP:8085
- [Administrative IP ranges] ==> [Gateway SG] @ TCP:22
- [Client ranges] ==> [Gateway SG] @ [reverse proxy ports] (variable)
-
Launch one or more instances using the product's AMI. Assign the Gateway security group and set the following user data (providing your own unseal key): ModelType : AV1000OD Component : gateway ProductLicensing : OnDemand ImpervaLicenseKey : <unseal_key>
-
Once all instance status checks have passed, SSH into each instance as ec2-user, enter 'admin' to access root, and execute the following First-Time Login commands to configure it as a Gateway:
bootstrap_set //bootstrap/product/components/gateway/cloud gateway_group "aws"
/opt/imperva/impcli/commands/ftl --silent --component Gateway --model_type AV1000OD --management_ip <management_server_ip> --secure_password <secure_password> --system_password <system_password> --imperva_password <imperva_password> --grub_password <grub_password> --product WAF --timezone UTC --gateway_mode reverse-proxy-hades --gateway_group aws --is_advanced_bridge Disabled
- Replace all <variables> with your own values.
- For <management_ip>, supply the private IP of your Management Server.
- Log in to your Management Server's user interface, navigate to Setup > Gateways and verify that all Gateways appear as Running under the aws Gateway group. This might take up to 5 minutes after completing the FTL for each instance.
- Refer to the user guide to configure your environment as desired and protect your applications: https://docs.imperva.com/bundle/v15.4-waf-user-guide/page/70414.htm
Resources
Support
Vendor support
Imperva's team of Support Engineers is positioned across the globe to provide 24x7x365 coverage, and can be contacted by phone, email, or online via our Self Service Support Portal. Visit the Imperva Support page above for more details.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Have noticed several areas that need improvement while some features are helpful during deployment
What is our primary use case?
I prefer not to do a review for EDR since it is a new product that I am using. Instead, I would like to review other products I have worked with before, such as Imperva products, Imperva Web Application Firewall