SecureSphere V2500 Database Firewall, Passive HA - license

Mfg. Part: SS-DBF-V25-P-V1 | CDW Part: 4080097 | UNSPSC: 43233204
$27,226.76Advertised Price
Lease Option ($801.01 /month) Lease Availability

Have leasing questions? Let us know how can we help.

Note: Leasing is available to organizations only. Leasing is not available to individuals.
Mon-Fri 7am-7:30pm CT
Availability:In Stock
Ships same day if ordered before 4 PM CT
  • License
View More
Product Overview
Main Features
  • License
SecureSphere hardware appliances deliver fast security, high performance monitoring and auditing, and resiliency for demanding network environments. SecureSphere hardware appliances provide you with the flexibility, reliability, and performance needed to power SecureSphere cyber security solutions.

Technical Specifications
Specifications are provided by the manufacturer. Refer to the manufacturer for an explanation of the print speed and other ratings.
License Category: License
License Qty: 1 license
License Type: License

Brand: Imperva
Compatibility: PC
Manufacturer: Imperva
Model: V2500 Database Firewall, Passive HA
Packaged Quantity: 1
Product Line: SecureSphere

Category: Online & appliance based services
Installation Type: Locally installed
Subcategory: Online & appliance based services - appliance software

Product Reviews
Rated 4 out of 5 by 5reviewers.
Rated 4 out of 5 by It relies on signature-based policies, as well as on a web correlation engine. Valuable Features:WAF is a great security layer to protect an organization from a wide spectrum of application attacks residing in OSI layer 7. The Imperva device relies on signature-based policies, as well as on a web correlation engine. In addition, the packet inspection can be enhanced with the aid of stream signature policies, which are policy items focused on the stream rather than the HTTP/HTTPS protocol. Imperva can easily match a web user to the requests launched from his client. While the default policy subset is very rich and covers different regulations (e.g., PCI, SOX), there is always an option to create custom policies addressing specific needs. Security alerts are comprehensive of all the necessary details for the analysis, such as connection details, signature triggered, alert type (e.g., Protocol, Profile), severity and followed action (e.g., syslog forward, IP monitoring).DAM also provides great value to audits and again, the data monitoring policies by default are very rich.If you don't know exactly what kind of data you store in-house, SecureSphere allows you to actively scan and classify your information, automatically providing you detailed status of the data, which can be further reviewed and finalised by analysts or DBAs. This is also valid for user rights on the data, understanding the level of privileges granted to users and suggesting countermeasures in detailed aggregated charts and reports.Once under monitoring, the data can be reviewed with an intuitive interface that allows the analyst to drill down, quickly narrowing the scope in a few clicks and focusing the attention only on the relevant queries. Once the pattern is identified, it is even possible to quickly report a detailed status of the findings, as well as generate a report template for future uses. This is on the hot data, what we have available in the management database. The time span can be increased indeterminately with a good retention configuration, combined with a SAN that stores the cold data, partitioned in daily slices and ready to be loaded into a separate database space for archives.This is brilliant if you think about scalability, for you can obtain a very big archive while preserving system resources and performance. However, to get this configuration, in-depth tuning is needed for several weeks in order to get all relevant metrics (e.g. data stored per day, data spikes, backup speed, link transfer capacity, etc.) and adopt the appropriate customizations.Audit data can also be correlated with application users by obtaining a detailed match of the database queries executed according to a particular web user’s HTTP requests.The FAM module allows organizations to continuously audit storages and network shares and keep a detailed record of every file operation across the company. Scans are available also in this context, providing user rights as well as access to the monitored files. A data classification is also possible with the FAM.All of Imperva’s features are extremely powerful, while a certain degree of knowledge is required to have a solid understanding of the product.Improvements to My Organization:Imperva helps you comply with data regulations such as SOX or PCI. It helps SOC analysts to enlarge the scope analysis, significantly providing great procedures to drill down into the audit or a customizable enrichment fed by several types of input, e.g. Active Directory or other external platforms, and even a layer 7 inspection. When fully integrated, the application user requests are bound with the queries executed, giving a comprehensive picture of how your web application interacts with the data layer highlighting all possible security flaws in the data management, code bugs or server misconfigurations. All this logical data collection is effectively arranged into detailed profiles from where it is possible to spot the unusual deviations or to create advanced conditions to trigger upon this baseline. Think about access to PCI data from users different to the ones allowed, such as DBAs, only from a certain subnet, let's say the external network, out of the business hours, like nights or weekends. This is one possibility of what Imperva can achieve in your organization to protect the data from unauthorised users.Room for Improvement:To have the mind at ease with a security solution has been always a chimera. Even SecureSphere suffers from some limitations, which I believe will be handled in the near future. I see two main things to improve at this point:* SSL tunnel support for z/OS agents* Capability to retain live audit policy data for several months; sometimes, on certain installations, this is not feasible due to the big data streams involved in the scope.Use of Solution:I've been supporting the Imperva technology since version 8.x. I have a company that provides consultancy services and I support Imperva.Stability Issues:From versions 9.5 and later, the Imperva solution has reached an optimum level of stability. On every unusual state reported, I was always able to relate it to misconfigurations or other hardware limitations and never to major bugs or software problems.Scalability Issues:Again, Imperva works great when you need to increase managed devices, add new gateways or even change the operational modes of the latter.Technical Support:On a scale from 1-10 (1=worst, 10=best) I would say technical support is 9. Support is always guaranteed and every internal SE has been always competent and ready to assist.Previous Solutions:I tested different audit and WAF solutions and the one I was always more comfortable with is Imperva.Initial Setup:Setup is actually complex due to the nature of the product and needs deep knowledge of the solution to get things working with minor effort. If you don't know exactly what kind of solution are you deploying or even the installation steps to get the environment fully working, you won't be able to install it easily.Cost and Licensing Advice:I am a technician, so I am not very confident discussing this topic.Other Advice:Doing the initial Imperva training before putting your hands on the product helps a lot. Getting assistance from Imperva during the initial stage of your new environment is highly recommended.Disclaimer: I am a real user, and this review is based on my own experience and opinions. October 4, 2016
Rated 4 out of 5 by With the audit log system, it can secure an audit trail from privileged users with user logs on a physical server, but the UX is not great and sometimes confusing. Valuable Features:There are many features that are valuable, it depends on the purpose. If the purpose is compliance or auditing, the most valuable feature are the audit log system, as it helps you to secure an audit trail and from user to action even if the user are privileged and even if the user logs in on the physical server. If the purpose is security the most valuable feature are the way it can drop and prevent the access of sensitive table/data set by rules and policies. Lastly, if the purpose is availability, the most valuable feature is the way it can drop connections set by rules and policies.Improvements to My Organization:If the purpose is compliance or auditing, ex PCI-DSS you need a system like this to pass part of the compliance. As I help customers with compliance, this is a great tool to make it all "simple" and the report part makes the lives easier for the users/auditors.If it's used for security, this, or systems like this, are the last line of defence, and you will prevent incursions, or at least know what happened, and what was stolen.If it is to be used to monitor availability, you will only know the real ROI if you are a victim of a large attack, then you can pat yourself on the back and say "Yay! We prevented that". This cannot be achieved solely on the Imperva system and you need the full suite of WAF.Room for Improvement:This product needs a good team of UX people, because it's not always that understandable, and sometimes it's straight up confusing.Deployment Issues:They did have some issues with HA and Clustered environments, but it is supposed to be fixed in v12, which I have not tested.Stability Issues:No issues encountered.Scalability Issues:There are issues, but it is supposed to be fixed in v12, which I have not tested.Customer Service:It's good, but it's a big company, so you need to know the paths to get the most out of it.Technical Support:It's very good.Initial Setup:This is a complex system, and all other in the same league are just as complex. There are no workarounds to simplify it.Cost and Licensing Advice:It's expensive, and their licensing is kind of strange, but it is what it is.Other Solutions Considered:We also looked at IBM InfoSphere Guardium.Disclaimer: My company has a business relationship with this vendor other than being a customer:We are a partner/vendor. December 30, 2015
Rated 4 out of 5 by It provides you with audit logs for changes to the database. Valuable Features:* Database activity monitoring* Web application firewallImprovements to My Organization:This product has limited attacks to the core tax collection application. It also provides audit logs for changes to the database and gives user account details.Room for Improvement:None so far.Use of Solution:I've used it for over two years.Deployment Issues:I was not around during the implementation, but reports do not show any issues noted.Stability Issues:None so far.Scalability Issues:None so far. Our solution has not had bottlenecks so farCustomer Service:Customer service has always been available.Technical Support:Technical support is rated highly.Previous Solutions:Only a firewall was in place before. WAF was needed for web application specific protection as firewalls are not the best solution.Initial Setup:No issues noted in the implementation reports.Implementation Team:A third party vendor was used to implement the product and to get the IT security staff trained.ROI:We have had a high ROI with this product.Cost and Licensing Advice:Budget for licenses in synch with your financial years, and it's best to have licenses covering over a year so that planning for procurement of new licenses is done earlier. Of course, if you operate in AWS cloud, its much easier to justify as you can pay for three or more years at once.Other Solutions Considered:I am not privy to procurement details, but we use Gartner as a source. Imperva is the sole leader in its field.Other Advice:Implement this product across all systems running applications as access to one unprotected system can be elevated to a protected one. Also, have reports produced frequently using the tools available in the system and analyze them to know and investigate the sources of attacks the WAF has blocked. That's because they could be internal indicating a compromise or a malicious user within. Ensure that your SharePoint environment is also protected as though it may be internal, attacks can be directed at it.Disclaimer: I am a real user, and this review is based on my own experience and opinions. June 16, 2015
Rated 4 out of 5 by This is a very complex solution with a wide range of capabilities. Valuable Features:The database activity monitoring module used for real time database monitoring and integrated into the security event and incident monitoring solution. Most importantly for our critical legacy databases that cannot be encrypted and require real time a activity monitoring.Improvements to My Organization:It provides a more granular monitoring of database activity at the column and row level as opposed to high level database management system logs.Room for Improvement:The professional services and customer training aspect needs to be improved.Use of Solution:I've used it for four years.Deployment Issues:The first implementation was not tailored to our specific requirements and the system was basically an expensive log collector until the vendors came to capture our requirements and then made modifications. This was then followed up with training.Stability Issues:No issues encountered.Scalability Issues:No issues encountered.Customer Service:It's moderate.Technical Support:It's moderate.Previous Solutions:I used a different solution with a former employer.Initial Setup:We are a large organization with about 100 critical heterogeneous database servers. This means that one configuration does not fit all, and that made the implementation very complex. Combined with protection of sensitive information that could be logged by the solution.Implementation Team:We used a vendor and their level of expertise was between moderate and high.ROI:The ROI based on the number of prevented, and detected, information security incidents can be classified as high.Other Solutions Considered:We also looked at Sentrigo Hedgehog by McAfee.Other Advice:Ensure the vendor clearly captures your specific database monitoring requirements and that might include importing the metadata of the database for proper monitoring. Training should be included in the implementation budget as this is a very complex solution with a wide range of capabilities.Disclaimer: I am a real user, and this review is based on my own experience and opinions. June 4, 2015
Rated 4 out of 5 by Sometimes convincing the engineering team that there was a problem was a bit harder than it should have been, but the on-site engineers who supported the implementation were excellent. Valuable Features:We utilise the following components:* Database activity monitoring of Oracle/SQL/Sybase databases - we did have UDB running, but that was decommissioned* Assessment scans using mostly custom checks to check for security settings - we did expand this at one point to check for best practise, but this was discontinuedImprovements to My Organization:It hasn't really improved the way we function, but it has allowed us to meet several audit issues that were outstanding for many years. We tried another product, but we found it did not meet our requirements.Room for Improvement:* Capacity management of application needs significant improvement* Task management functionality is pretty basic, with not a lot of functionality* I would also like to be able to replace IP addresses with DNS names for easier recognition of host machines* The SOM feature could also be dramatically improved to allow central management of the entire feature set* The ability to manage lifecycle of agents could be improved via central deployment of upgraded agentsUse of Solution:I started using the database auditing/risk areas of the product in mid-2011. We use agents for monitoring database activity. We do not use the gateways for collecting data via the network.Deployment Issues:We had several performance issues on high throughput applications due to outdated, old hardware/non-ideal settings in the agents. These were mostly on our end.Stability Issues:We had a few minor issues with stability, but it has not impacted our service. We did have an agent cause a reboot of a host server, but this was quickly fixed via an upgrade of the agent.Scalability Issues:Capacity management is a major issue with the application. There is no easy way to identify when new hardware is required, or if a modification to the configuration could solve the issue. This may have been due to our method of deployment though.Customer Service:We had a service provider in-between Imperva and our organisation. It did not make things easy. When dealing directly with Imperva I had good experiences with the vendor, and real issues were escalated quickly and getting access to the relevant engineering sections of the vendor was possible.Technical Support:Technical support was hit and miss. Sometimes we received excellent support, and other times it was not so good. Sometimes convincing the engineering team that there was a real problem in the software was a bit harder than it should have been. Overall, compared to other vendors, support was good.Previous Solutions:We previously used another solution, and that product was different depending on the DBMS that was being monitored. Technical expertise in DBMS technology with that vendor was poor, so we switched..Initial Setup:The initial setup was easy, but some of the specific requirements we had required some work. Deploying the hardware during the initial setup did not require and specific customisation for our organisation. The audit policies and assessments obviously did require customisation, but it was relatively simple. Later on, we did find some issues that were due to the setup of the site hierarchy that was not brought to our attention until one to two years later.Implementation Team:We used on-site vendor engineers to support the internal implementation. Their level of expertise was excellent.ROI:This is not relevant to the production selection, as we were required to close off auditing items.Other Solutions Considered:We compared IBM Guardium and Imperva SecureSphere via a POC process. We did a paper evaluation of other products to choose two products for the POC.Other Advice:Go through the POC process and test all ITIL processes to ensure you understand what will be required for the entire lifecycle of implementation/support. Engage with DBA teams to provide DBA support and knowledge. If it's possible, ensure there are people who understand databases on the SecureSphere support team.Disclaimer: I am a real user, and this review is based on my own experience and opinions. May 26, 2015
  • 2016-10-30 T09:19:26.593-05:00
  • bvseo_lps, prod_bvrr, vn_prr_5.6
  • cp-1, bvpage1
  • co_hasreviews, tv_5, tr_5
  • loc_en_US, sid_4080097, prod, sort_default
1-5 of 5
Adding to Cart...
12/2/2016 10:33:44 PM
^ Back to Top

Maximum 300 characters
An account manager will email you within one business day to confirm your request.

Your Quote has been submitted

What Happens Next? A confirmation email is on its way. Within one business day, you will be contacted by an Account Manager to finalize your quote.


Something went wrong.

Please try again later.

License Selector

    The license selector is not currently available. Please try again later.