
Overview

Product video
Imperva SecureSphere WAF for AWS extends all of the security and management capabilities of the world's most-trusted web application firewall to Amazon Web Services environments. SecureSphere for AWS is the first enterprise-class Web Application Firewall tailored specifically for Amazon Web Services. Running natively in AWS, and leveraging all its capabilities, SecureSphere for AWS scales on-demand with AWS applications. SecureSphere applies multiple defenses and correlates results to offer laser-accurate attack detection. Certified by ICSA Labs, SecureSphere addresses PCI 6.6 and provides ironclad protection against the OWASP Top Ten, including SQL Injection, XSS and CSRF. Note that AV2500 provides up to 500 Mbps throughput.
Highlights
- Automated Protection - Patented Dynamic Profiling technology streamlines management and lowers operations costs by learning application changes over time. Security updates from the Imperva ADC protect applications against the latest threats.
- Flexible Deployment Options - The SecureSphere WAF offers organizations automated, adaptable security and easy deployment into Amazon environments with full support for elastic load balancing and CloudFormation.
- Fraud and Automated Attack Protection - With advanced bot detection capabilities, IP Reputation, granular custom rules, and fraud integration, SecureSphere stops dangerous threats like site scraping, application DDoS, comment spam, and web fraud.
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Cost/hour |
|---|---|
c5a.2xlarge Recommended | $3.33 |
c6i.8xlarge | $3.33 |
c7i.8xlarge | $3.33 |
c5a.xlarge | $3.33 |
c4.xlarge | $3.33 |
m5.2xlarge | $3.33 |
m4.2xlarge | $3.33 |
m4.xlarge | $3.33 |
m5.xlarge | $3.33 |
m5.4xlarge | $3.33 |
Vendor refund policy
We do not support refunds, but customers can cancel at any time. Contact Imperva for more information.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Additional details
Usage instructions
AUTOMATIC DEPLOYMENT (RECOMMENDED)
Imperva simplifies the deployment of your WAF Gateway infrastructure on AWS by providing dynamically generated CloudFormation and Terraform templates tailored to your specific requirements via the Imperva Cloud Template Tool.
For detailed instructions and additional information: https://docs.imperva.com/bundle/v15.4-waf-on-amazon-aws-byol-installation-guide/page/10450.htm
MANUAL DEPLOYMENT
DISCLAIMER:
- This procedure is not intended for use in large-scale production environments. For a best-practice installation, use the automated deployment method.
- You must obtain an account-unique unseal key from Imperva to complete this procedure.
- You need a running Imperva WAF Gateway Management Server to use this product.
-
Create a VPC, a key pair and at least one subnet.
-
Create a security group for the Gateway instances.
-
Create the following inbound rules:
- [Management Server SG] ==> [Gateway SG] @ TCP:443
- [Gateway SG] ==> [Management Server SG] @ TCP:8083, TCP:8085
- [Administrative IP ranges] ==> [Gateway SG] @ TCP:22
- [Client ranges] ==> [Gateway SG] @ [reverse proxy ports] (variable)
-
Launch one or more instances using the product's AMI. Assign the Gateway security group and set the following user data (providing your own unseal key): ModelType : AV2500OD Component : gateway ProductLicensing : OnDemand ImpervaLicenseKey : <unseal_key>
-
Once all instance status checks have passed, SSH into each instance as ec2-user, enter 'admin' to access root, and execute the following First-Time Login commands to configure it as a Gateway:
bootstrap_set //bootstrap/product/components/gateway/cloud gateway_group "aws"
/opt/imperva/impcli/commands/ftl --silent --component Gateway --model_type AV2500OD --management_ip <management_server_ip> --secure_password <secure_password> --system_password <system_password> --imperva_password <imperva_password> --grub_password <grub_password> --product WAF --timezone UTC --gateway_mode reverse-proxy-hades --gateway_group aws --is_advanced_bridge Disabled
- Replace all <variables> with your own values.
- For <management_ip>, supply the private IP of your Management Server.
- Log in to your Management Server's user interface, navigate to Setup > Gateways and verify that all Gateways appear as Running under the aws Gateway group. This might take up to 5 minutes after completing the FTL for each instance.
- Refer to the user guide to configure your environment as desired and protect your applications: https://docs.imperva.com/bundle/v15.4-waf-user-guide/page/70414.htm
Resources
Support
Vendor support
Imperva's team of Support Engineers is positioned across the globe to provide 24x7x365 coverage, and can be contacted by phone, email, or online via our Self Service Support Portal. Visit the Imperva Support page above for more details.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Web defenses have reduced incidents and protect banking sites from bots and DDoS attacks
What is our primary use case?
My main use case for Imperva Application Security Platform is protecting public-facing websites, and I primarily used Imperva for the web application firewall, which was the principal use case for us.
I recall a time when Imperva's Web Application Firewall helped us detect threats and protect against specific attacks. We used it in a large banking group to avoid and detect threats and protect against OWASP Top 10 vulnerabilities in web application security. This helped us significantly in detecting those vulnerabilities while using custom rules in WAF , making it a very effective use case for our web applications.
In addition to that, we were using Imperva WAF for bot detection and DDoS attacks. We tweaked the firewall rules and added rate-limiting rules to help manage DDoS attacks to a certain level.
What is most valuable?
What I found most effective about Imperva's WAF is that it has predefined rules covering many use cases, including compliance rules for PCI DSS and local country compliance. The customized rules based on application threats proved to be very useful, along with a good dashboard that, although somewhat complicated for beginners, becomes easy to manage at an expert level with good API integration and effective threat intelligence to detect threats.
After discussing the WAF, I believe Imperva has made significant advancements in its Cloud WAF offerings, which can now effectively protect against bot and DDoS attacks. This showcases a good advantage of being part of the Thales cybersecurity group while expanding its product range in the Cloud WAF space.
Imperva Application Security Platform has positively impacted my organization by providing strong protection for web applications, as many big companies in the UK use Imperva WAF as an essential protection layer, illustrating its effectiveness.
What needs improvement?
To improve Imperva Application Security Platform, there is a necessity for enhancement in the threat layer, especially regarding DDoS protection and geographical DDoS attacks. Additionally, there is a need for more API integration within the environment, indicating room for improvement in those areas.
I rate this product eight out of ten because I believe there can still be improvements for the WAF, especially in terms of custom rules. I suggest that more rules could be added to the system instead of relying on SMEs for customization. The hardware being more expensive compared to other vendors poses a challenge, along with a need for improvement in the cloud WAF offerings.
For how long have I used the solution?
I have been using Imperva Application Security Platform for nearly five to six years. I first used it in a large banking group before I joined my current company, where I used both the Imperva on-premise devices and Imperva Cloud.
What do I think about the stability of the solution?
In my experience, Imperva Application Security Platform is stable.
What do I think about the scalability of the solution?
Regarding scalability, it is good in the cloud but not very strong for on-premise installations.
How are customer service and support?
The customer support from Imperva has been great, with a single point of contact who catered to our company's needs effectively.
Which solution did I use previously and why did I switch?
We did not use a different solution before adopting Imperva Application Security Platform.
How was the initial setup?
We purchased Imperva Application Security Platform through a partner.
What was our ROI?
Although it is difficult to quantify the return on investment in monetary terms given that we cannot translate threats into monetary values, the use of Imperva was driven by compliance reasons and resulted in fewer incidents.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup costs, and licensing has shown that the setup cost was high, with the hardware installation in the data center being particularly expensive. Additionally, the cost associated with the appliances used to load balance application traffic resulted in expensive licensing and a need for frequent license rotation. Configuring both hardware and software has also proven to be time-consuming and costly.
Which other solutions did I evaluate?
Before choosing Imperva Application Security Platform, we evaluated F5 as a WAF solution and also considered Cloudflare .
What other advice do I have?
Although it is difficult to measure the success in commercial or monetary terms, we found that we could manage more threats within the environment, with Imperva flagging threats coming from the internet, resulting in few incidents. This illustrates how Imperva helped us.
I would highly recommend others to consider using Imperva Application Security Platform, and I rate this product eight out of ten.
Stronger application and API protection has reduced attacks and informed better security design
What is our primary use case?
My main use case for Imperva Application Security Platform involves using it in more than a couple of organizations where I was employed.
We used Imperva Application Security Platform for web application firewall and API security in one of those organizations.
Since we integrate a number of external vendor products in our environment, most of these integrations occur via API, and hence we use Imperva Application Security Platform for API security.
What is most valuable?
Imperva Application Security Platform offers features such as Attack Analytics.
Attack Analytics has helped us understand what traffic is being received by our applications, and based on that, we have created the policies. The false positives have been reduced, saving a lot of time for us to work on other important tasks rather than wasting time on addressing those false positives.
Imperva Application Security Platform has considerably improved our web application security posture and it has also helped us design our applications with security as the primary concern. Before using Imperva Application Security Platform, we received many attacks, such as command injection attacks, SQL injection attacks, and even though we were using a niche web application firewall, we were not able to tackle those attacks. After moving to Imperva Application Security Platform, these attacks have been prevented significantly, and the attacks on the initial level have been considerably reduced.
What needs improvement?
We have not yet encountered any issues with Imperva Application Security Platform until now; however, improvements are always expected from the vendor. No major improvements are required, but it should still work on reducing the false positives. Although we do not receive that many false positives, some improvement is still required regarding learning the traffic while using Imperva Application Security Platform.
Nothing as of now because we have still not used all the features of Imperva Application Security Platform, but we are exploring it and in the future, maybe we will understand what improvements are required.
For how long have I used the solution?
I have been using Imperva Application Security Platform on-prem as well as in the cloud for almost four years.
What do I think about the stability of the solution?
Imperva Application Security Platform is quite stable.
What do I think about the scalability of the solution?
I do not have much experience with respect to the scalability of Imperva Application Security Platform because a different infrastructure team manages all these aspects; we, as a security team, are just using it for protecting our applications and APIs.
How are customer service and support?
I had an experience reaching out to customer support for an issue with Imperva Application Security Platform, and it was quite good; they addressed the issue effectively.
Which other solutions did I evaluate?
If anyone is concerned about API security, then Imperva Application Security Platform is definitely a good choice.
Imperva is a trusted brand, and I have been using Imperva Web Application Firewall on-prem and also as SaaS, but Imperva Application Security Platform is a next-generation cloud-based service that is quite helpful and powerful. Based on current attacks and the latest AI-based attacks, some improvement is required, but it remains a promising product that I would recommend to others.
What other advice do I have?
I would rate this product an 8 out of 10.
Strong protection has improved legacy app security and currently reduces risky server connections
What is our primary use case?
Imperva Application Security Platform is generally used for legacy-type applications that cannot be migrated to the cloud. A specific example of how I use this tool to protect legacy applications in my organization is that we have an intranet which has not been fully developed or technologically advanced enough to run in the cloud, so by having this, we secure it effectively.
What is most valuable?
Imperva Application Security Platform allows you to enhance your application security posture. Among the best features that Imperva Application Security Platform offers, the policies are very dynamic, and it also has profiling at the application level that allows you to work in this mode.
I would like to highlight especially the ThreatRadar feature, which is an additional subscription, and ThreatRadar helps with threat intelligence by allowing you to block advanced attacks as well as mitigate risks more effectively.
Imperva Application Security Platform positively impacts us because we have a critical website, so by placing a WAF of Imperva's quality, it allows us to have visibility and granular control over the various attacks that can occur on the website.
A concrete improvement I have seen thanks to Imperva Application Security Platform is that it has decreased the level of connections to the final server. The specific improvement is that the connections that reach the server are fewer because Imperva is already filtering them at the WAF stage.
What needs improvement?
Imperva Application Security Platform could be improved if it allowed integration with Active Directory in the cloud, or if it provided visibility of user roles and permissions.
For how long have I used the solution?
I have been using Imperva Application Security Platform for a little more than three years.
What do I think about the stability of the solution?
I consider Imperva Application Security Platform to be a stable solution.
What do I think about the scalability of the solution?
I would rate the scalability of Imperva Application Security Platform as very good since it adapts well and you can grow independently because the interfaces support one and ten gigs.
How are customer service and support?
Imperva Application Security Platform customer support has been very good; the ticketing platform allows us to have visibility of the case, and the staff makes the effort to respond quickly.
Which solution did I use previously and why did I switch?
I did not previously use any other solution before Imperva Application Security Platform.
How was the initial setup?
The advice I would give to others who are considering using Imperva Application Security Platform is to start with learning mode and then move to blocking mode slowly for approximately one week so that Imperva can identify the website and the connections that are made to it.
What was our ROI?
I have seen a return on investment with Imperva Application Security Platform, as it is generally associated with time savings, because the review of alerts and the visibility it gives saves us significant operational time. The clarification on time savings is that it refers to the time spent on alerts.
What's my experience with pricing, setup cost, and licensing?
My experience with the pricing, implementation cost, and licenses of Imperva Application Security Platform is that it is high compared to a traditional WAF solution, but it meets expectations.
Which other solutions did I evaluate?
Before choosing Imperva Application Security Platform, I did not evaluate other options, as we went directly with Imperva due to recommendations.
What other advice do I have?
I would rate Imperva Application Security Platform an eight on a scale from one to ten. Imperva Application Security Platform is a very good platform; even though it is not in Gartner, clients request it and trust the brand. I would rate customer support on a scale from one to ten as an eight. My overall review rating for Imperva Application Security Platform is eight out of ten.
Web defenses have blocked unauthorized access and protect sensitive health data effectively
What is our primary use case?
My main use case for Imperva Application Security Platform is to block unauthorized IPs, users, and source applications, as we configured the Web Application Firewall to monitor internet-based applications during my previous project.
To decide which policies to configure for blocking unauthorized users and sources, we identify authorized users and source IP addresses, ensuring only those belonging to the organization are validated and whitelisted in Imperva Application Security Platform to effectively block unauthorized sources. Imperva Application Security Platform works on a whitelisting concept, meaning only whitelisted users are allowed while others are treated as unauthorized.
We implement multiple policies for sensitive data in the Web Application Firewall because users may attempt to access sensitive health-related information. In a healthcare project, we set up patterns to alert if sensitive data is accessed within the organization and block it if accessed externally.
What is most valuable?
The best features of Imperva Application Security Platform include its ease of use, as it offers both on-premises and cloud options, with minimal maintenance downtime during patching due to the recommended three gateways setup, allowing for resource monitoring while upgrading.
Imperva Application Security Platform positively impacts my organization by reducing CVE-related issues significantly, as we monitor and learn from reports generated during collaboration with respective teams.
We track the reduction in CVE-related issues through weekly and monthly meetings using Imperva Application Security Platform reports. Initially, there were over 1,500 vulnerabilities, but we managed to fix almost all of them within three months, leaving only two low severity issues outstanding.
What needs improvement?
Imperva Application Security Platform can be improved as it currently lacks integration with other tools under the Data Security Fabric, particularly the WAF feature, which would enhance overall functionality.
Generally, I am satisfied with the user experience of Imperva Application Security Platform; however, I would suggest streamlining the patching process for larger environments as it becomes time-consuming when applying multiple patches across many gateways.
For how long have I used the solution?
I have been working in IT security for 10 years out of my overall 17 plus years of experience.
What do I think about the stability of the solution?
Imperva Application Security Platform is always stable, having encountered issues infrequently across my usage of their products.
What do I think about the scalability of the solution?
The scalability of Imperva Application Security Platform is indeed good, effectively accommodating growth for larger organizations despite internal data management policies.
Imperva Application Security Platform handles scalability effectively, allowing for growth when appropriately understood through policies and configurations, although understanding the platform takes time.
How are customer service and support?
Customer support from Imperva has been very good as I have raised over 100 cases, with responsive support addressing urgent needs, even offering early support despite initial SLA challenges.
Which solution did I use previously and why did I switch?
We did not previously use a different solution, starting with DAM and moving directly into a full implementation due to an incident that required rapid deployment.
How was the initial setup?
We utilized AWS for our private cloud environment, finding it satisfactory, although I only used Imperva Application Security Platform Cloud once for DAM, not WAF.
What was our ROI?
While I would not say we have saved money, we have certainly saved time through effective documentation and support for compliance-related issues, streamlining the necessary processes with fewer employees.
What's my experience with pricing, setup cost, and licensing?
We faced challenges with high costs, as the customer perceived pricing for gateways to be excessive, but we handled multiple billing instances with sophisticated setups.
Which other solutions did I evaluate?
We did not evaluate other options before choosing Imperva Application Security Platform, opting for it directly because it fit our needs for an on-premises solution.
What other advice do I have?
Beyond the WAF, Imperva DAM is beneficial because it features Imperva Security Fabric and Data Security Fabric, including tools like File Access Activity Monitoring, though the WAF is still using previous functionalities.
I can confirm that Imperva Application Security Platform is stable, though we have not purchased Imperva Application Security Platform cloud environment from the AWS Marketplace.
It is important to decide the purpose for using Imperva Application Security Platform; I recommend it for monitoring internet-based applications, while for internal tasks, it may not be worthwhile due to its costs. I would rate this review as a 9.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Advanced protection has secured our websites and reduces DDoS and zero‑day attack incidents
What is our primary use case?
What is most valuable?
The best features Imperva Application Security Platform offers are for speed and protection. There is runtime and zero protection, and we have the sub and sub plus protection.
The speed and protection features of Imperva Application Security Platform help my team day-to-day by providing safe and clear access to the website. For example, my company is a multinational company that experiences many attacks, such as DDoS attacks, hitting the general website of the company before. The protection protects all of the websites in Imperva, so accessing the website is safer right now, not disrupted by DDoS attacks.
Imperva Application Security Platform has positively impacted my organization by making the website more secure. It reduces the DDoS attacks and reduces the attacks from threat actors, including SQL Injection and zero-day attacks, by using dynamic application profiling from Imperva. This is very helpful for my company as it reduces the incidents from the website.
What needs improvement?
I would suggest that Imperva Application Security Platform should include new features combined with AI. When I was using Imperva, it was not yet combined with AI. I believe that AI can now be used to make things easier, to track the attacks or IPs, or perhaps to determine the best configuration for each company that is using Imperva.
For how long have I used the solution?
What other advice do I have?
I would add that I have a unique observation about the features of Imperva Application Security Platform. For protection to protect more safely and restrictively, I have another use case with an internal website. This website is internal, and those people who want to access it can use the VPN or the internal network. I have encountered cases where a person from the internal company wants to access the website without using the API and got blocked by Imperva because there is a feature or configuration that allows specific IPs. I had to log all of the ways to access the web and allow only a few IPs from the internal IPs. I think Imperva is very secure, very restricted, and good for protecting websites, especially for internal websites and production servers.
Regarding improvements to Imperva Application Security Platform, I think all aspects of Imperva Web Application Firewall, including the UI/UX, are good, and I can operate it smoothly with the application. I give this product a rating of 8.5 out of 10.