Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Technical Director at a consultancy with 11-50 employees
Real User
Top 10
Comprehensive database security solution and easy initial setup process
Pros and Cons
  • "We use it for database security, vulnerability analysis, discovery, and handling requests from applications and users."
  • "Improvements can be made in data enrichment and enhancing the GUI (Graphical User Interface) for a better user experience."

What is our primary use case?

We are system integrators, so we mostly work on implementing projects. We don't handle maintenance or administration. Our focus is on implementation.

We use it for database security, vulnerability analysis, discovery, and handling requests from applications and users.

What is most valuable?

It's not just one feature because the whole process is important, starting from discovery to protection and prevention. If we use agent-based functionality instead of a gateway, the solution becomes more feature-rich.

What needs improvement?

Mostly in areas like data masking since they previously had a product called "camouflage," but it was dropped. It would be better to have something similar to that. 

Additionally, improvements can be made in data enrichment, aggregation of data from different perspectives, and enhancing the GUI (Graphical User Interface) for a better user experience.

For how long have I used the solution?

We have experience in implementing the solution. It has been almost four years.

Buyer's Guide
Imperva SecureSphere Database Security
December 2024
Learn what your peers think about Imperva SecureSphere Database Security. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.

What do I think about the stability of the solution?

I would rate the stability of this solution a seven out of ten. There's some room for improvement in terms of stability.

What do I think about the scalability of the solution?

I would rate the scalability of this solution as seven out of ten. It's scalable, but further implementation and development would make it even better.

How are customer service and support?

We have been able to handle everything on our own. As partners, we are technical savvy.

How was the initial setup?

The initial setup is actually quite easy. It's not something hard to do, but having some experience with the product is helpful.

If it's only the deployment, it takes around two to three days. But if we consider tuning and ongoing processes, the time for deployment varies.

What was our ROI?

ROI depends on the use case. Most companies use it for security and compliance. So, it varies based on the specific use cases.

What's my experience with pricing, setup cost, and licensing?

It's not a cheap solution.

What other advice do I have?

I would recommend considering Imperva. It's important to conduct a proof of concept (POC), include a list of potential different vendors or products, and make an informed decision.

Overall, I would rate the solution an eight out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
Data Center Network Expert at TOSAN
Real User
A scalable solution that helps to secure our web-based financial applications
Pros and Cons
  • "This solution has helped secure our Internet-based services, protecting us against DoS and other types of web-based attacks."
  • "The GUI for this solution could use some improvement."

What is our primary use case?

Our primary use for this solution is securing banking web applications. It protects the web service of one of the big Internet banks in Iran.

How has it helped my organization?

This solution has helped secure our Internet-based services, protecting us against DoS and other types of web-based attacks.

What is most valuable?

The most valuable features include the compliance with standards for security in web applications, and the ability to detect vulnerabilities.

What needs improvement?

The GUI for this solution could use some improvement.

I would like to see better support for countries in the Middle East, and other places that do not have direct access to the vendor.

For how long have I used the solution?

Five years.

What do I think about the stability of the solution?

Stability is great. Immediately after we deployed it, we had a good feeling about security and performance.

What do I think about the scalability of the solution?

The scalability of this solution is good. Compared to other products, this one is more scalable.

Currently, this solution is protecting approximately twenty thousand end-users.

We are deploying new web-based services and applications, so we expect the usage to increase.

How are customer service and technical support?

Due to restrictions because of sanctions in Iran, we do not have support for this solution. For this reason, we have done everything ourselves. This can be challenging because sometimes we have troubles upgrading the device, or obtaining new signatures.

Which solution did I use previously and why did I switch?

We did not use another solution prior to this one.

How was the initial setup?

The initial setup and configuration for this solution were very simple and straightforward.

Deployment in our environment took approximately one week. We begin by deploying it in a test environment. After performing some tests, we moved it to the operational environment.

Two technical staff are required for deployment and maintenance, and we have about six people, in different roles, who manage this solution.

What about the implementation team?

We handled the implementation and deployment ourselves.

What was our ROI?

Our ROI from the initial payment was realized in approximately two months.

What's my experience with pricing, setup cost, and licensing?

This is an affordable solution. There is an annual licensing fee for upgrading the device.

Which other solutions did I evaluate?

After we undertook wide research and development, we found that this product is suitable for us. Two of the products that we looked at in addition to this one were FortiWeb and F5.

What other advice do I have?

Imperva is a product leader in this line, and it is very good. In fact, I have experience with other products, and I would say that this solution is best-in-class. If we had support then this solution would be perfect.

I would rate this solution a nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Imperva SecureSphere Database Security
December 2024
Learn what your peers think about Imperva SecureSphere Database Security. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
reviewer1010271 - PeerSpot reviewer
Program Manager at a energy/utilities company with 10,001+ employees
Real User
Top 20
Policies and alerts allow us to detect malicious activity in critical databases
Pros and Cons
  • "The tool happens to be very intelligent when it comes to processing policies and sounding alerts. It allows us to implement policies and measure actions against them, raising alerts accordingly."
  • "The only challenge I see is that SecureSphere is deployed on servers or databases which are held on physical infrastructure. However, there are databases which are hosted on cloud platforms and Imperva has a separate tool altogether for that, not SecureSphere."

What is our primary use case?

The primary use case is specific to database security through log auditing, to identify the actions performed by various users. That gets logged. Then policies are used to see whether any action performed by a database user is below a threshold or above a threshold; whether there should there be an alert because of it.

It is used by specific teams within our organization to monitor activity, to see whether there is any malicious activity or a user who's not supposed to be performing a certain action.

How has it helped my organization?

It helps us look into who's doing what, particularly on databases related to critical applications. That's the way we see it as useful. We've been using it for four or five years now, and it has been bringing in the value that we expected it to.

What is most valuable?

The tool happens to be very intelligent when it comes to processing policies and sounding alerts. It allows us to implement policies and measure actions against them, raising alerts accordingly. That is the best feature.

What needs improvement?

Comparing it with other products in the market, we definitely see that Imperva SecureSphere is head-to-head with the likes of McAfee, IBM Guardium, and others. It's definitely good. The only challenge I see is that SecureSphere is deployed on servers or databases which are held on physical infrastructure. However, there are databases which are hosted on cloud platforms and Imperva has a separate tool altogether for that, not SecureSphere. If an organization is monitoring databases which are on physical as well as virtual infrastructure, running two different tools can become a problem. If that could be merged together it would be an improvement.

Having read about Imperva, I couldn't get much detail as to what their roadmap is for the future, whether they would want to merge them or not. But as a customer, if I can have one tool for various landscapes, like the databases hosted on a physical landscape as well as the virtual ones, that makes it a lot easier.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

The stability has been good. In our case, we've been using it through one of our suppliers so we don't directly manage it. It's our supplier who manages it for us. The supplier happens to manage the infrastructure on which the database application or databases are hosted as well.

We don't deal with it but, getting the reports that we have been getting from our supplier, it looks pretty good as far as stability is concerned. We haven't experienced many issues. Even if there were any, it would be our supplier's responsibility to make sure that they got resolved very quickly, so they rarely come to our notice.

What do I think about the scalability of the solution?

When it comes to scalability, as I noted, there are two different tools, one for physical infrastructure and another for virtual infrastructure.

If I want to scale it up from a physical to a virtual platform, that's certainly not a feature at this point of time. That can be a drawback. You have to look for a separate tool from the same vendor because you already have an existing tool from that vendor which is doing well. And you cannot have tools from two different vendors running on two different platforms.

How are customer service and technical support?

We have not used technical support. Our supplier manages the tool, so we don't get in touch with Imperva if there are any issues. Our supplier does that for us.

What other advice do I have?

My advice is to go to IT CentralStation and download the report on database security tools.

In general, it's all about the policies that you put into the tool to get the output. The tool itself is pretty smart. As someone who is designing the policies or the outputs or the queries, it is like putting a query into a SQL database to get the results. The better or more optimized the query is, the better output you will receive, and so it goes with this solution.

When selecting a vendor, pricing, of course, is the most important thing to look at. Then, you look at the scalability options, at how good the tool is, that it suffices your functionality requirements, and that it provides interoperability.

I rate Imperva at eight out of ten across the various areas that I just mentioned, be it interoperability, scalability, cost, or ease of installation and setup. Measuring it on each of these aspects is how I came up with my rating.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
TamunoibitonAdoki - PeerSpot reviewer
Security Engineer at Globus Bank
Real User
Top 10
Comes with flexible and affordable pricing that suits small and medium enterprises
Pros and Cons
  • "The tool's pricing is flexible and affordable for small and medium enterprises."
  • "I have worked with IBM before, and I prefer its ease of deployment and management. Imperva SecureSphere Database Security has tricky deployment, whereas IBM's deployment is straightforward because of the UI."

What needs improvement?

I have worked with IBM before, and I prefer its ease of deployment and management. Imperva SecureSphere Database Security has tricky deployment, whereas IBM's deployment is straightforward because of the UI.

For how long have I used the solution?

I have been using the solution for three years.

What's my experience with pricing, setup cost, and licensing?

The tool's pricing is flexible and affordable for small and medium enterprises.

What other advice do I have?

I rate the product an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Network Engineer at CBN
Real User
Top 20
Up-to-date inventory management and compliance
Pros and Cons
  • "The most valuable feature is the automatic reports on new databases, which gives us up-to-date inventory management."
  • "Sometimes the reports are cumbersome, and you have to drill down to get more information."

What is our primary use case?

I use SecureSphere to monitor our core databases and privilege operations by administrators, and to provide compliance reports.

How has it helped my organization?

In terms of regulatory compliance, one of the key requirements is to ensure that our core databases are monitored. SecureSphere allows us to generate details to prove that we're compliant with all requirements.

What is most valuable?

The most valuable feature is the automatic reports on new databases, which gives us up-to-date inventory management.

What needs improvement?

Sometimes the reports are cumbersome, and you have to drill down to get more information. SecureSphere also sometimes needs a lot of maintenance to keep the agents running on the database. In the next release, Imperva should include a preventative solution that will stop an attack before it happens or read the behavior of particular accounts and act on it. They should also make SecureSphere available on mobile so that if an administrator isn't on-prem, he can access the solution via the internet wherever he may be.

For how long have I used the solution?

I've been using this solution for almost three years.

What do I think about the stability of the solution?

SecureSphere has been very stable until recently, due to the addition of new source databases causing performance issues.

What do I think about the scalability of the solution?

SecureSphere is very scalable.

How are customer service and support?

Imperva's technical support has been good. In the past, it sometimes took a long time to resolve an issue, but more recently, the responsiveness has been very impressive.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

Previously, we used Oracle Audit Vault, but its reports were a little complex, and their support was not so impressive.

How was the initial setup?

The initial setup was straightforward, and the deployment took between one and two weeks.

What about the implementation team?

Our deployment was done in-house.

What was our ROI?

SecureSphere has resulted in us receiving audit exceptions, especially from the final details, which is a big deal to my organization since we have to be compliant.

What other advice do I have?

I would recommend SecureSphere to other users and advise making a dedicated team available to work on the solution and configure the correct set of policies so they can get value for their money. I'd give SecureSphere a rating of eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Solution Architect at a financial services firm with 10,001+ employees
Real User
Facilities data enrichment and process automation. It manages cluster capacity.

What is most valuable?

The most valuable features are:

  • DAM Module
  • Third-party data source integration: Feeds automation
  • Data enrichment: Provides better data quality and session handling
  • API: Used for process automation

How has it helped my organization?

The solution has improved our organization as follows:

  • Better agent performance compared to v9.5
  • Gateways are much more stable
  • Gateway cluster improves resource utilization and provides better resiliency
  • Offers the option to manage cluster capacity without touching the agent configuration

What needs improvement?

BUGs, BUGs, BUGs. The product is under high development and the amount of bugs is bit disappointing. The product has lots of limitations which are not clearly documented. You can only find out the limitations by engaging the support

By using this product you can have only one type of date and time format which is US format. I’m EU citizen and I prefer different date format, same for time format. I would prefer 24Hour clock instead of AM/PM.

For how long have I used the solution?

We have been used this solution for over three years.

What do I think about the stability of the solution?

There were stability issues in v9.5. There are no major stability issues in v10.5.

Stability is dependent on the infrastructure. If you use hypervisor, then you need to make sure to use resources and I/O settings that are optimal for SecureSphere. Otherwise, you will end up with stability and performance issues.

What do I think about the scalability of the solution?

There are some scalability issues. There was a hardcoded limitation in the number of MXs you can connect to SOM. In addition, the bigger the infrastructure, the bigger challenge there is to create a single audit report file.

How are customer service and technical support?

The technical support is OK. But they have big potential to do things better.

Which solution did I use previously and why did I switch?

We had a previous solution. We switched because the new requirements couldn’t be accomplished with the old solution.

How was the initial setup?

The installation was quite complex. We had to integrated lots of external systems in order to make it work right.

What other advice do I have?

Give it a try. Write down your requirements as detailed as possible, and perform a PoC using this list. If you find gaps that require additional development, it could take some time until you actually get it.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user254619 - PeerSpot reviewer
Operations Consultant at a financial services firm with 10,001+ employees
Real User
Sometimes convincing the engineering team that there was a problem was a bit harder than it should have been, but the on-site engineers who supported the implementation were excellent.

What is most valuable?

We utilise the following components:

  1. Database activity monitoring of Oracle/SQL/Sybase databases - we did have UDB running, but that was decommissioned
  2. Assessment scans using mostly custom checks to check for security settings - we did expand this at one point to check for best practise, but this was discontinued

How has it helped my organization?

It hasn't really improved the way we function, but it has allowed us to meet several audit issues that were outstanding for many years. We tried another product, but we found it did not meet our requirements.

What needs improvement?

  • Capacity management of application needs significant improvement
  • Task management functionality is pretty basic, with not a lot of functionality
  • I would also like to be able to replace IP addresses with DNS names for easier recognition of host machines
  • The SOM feature could also be dramatically improved to allow central management of the entire feature set
  • The ability to manage lifecycle of agents could be improved via central deployment of upgraded agents

For how long have I used the solution?

I started using the database auditing/risk areas of the product in mid-2011. We use agents for monitoring database activity. We do not use the gateways for collecting data via the network.

What was my experience with deployment of the solution?

We had several performance issues on high throughput applications due to outdated, old hardware/non-ideal settings in the agents. These were mostly on our end.

What do I think about the stability of the solution?

We had a few minor issues with stability, but it has not impacted our service. We did have an agent cause a reboot of a host server, but this was quickly fixed via an upgrade of the agent.

What do I think about the scalability of the solution?

Capacity management is a major issue with the application. There is no easy way to identify when new hardware is required, or if a modification to the configuration could solve the issue. This may have been due to our method of deployment though.

How are customer service and technical support?

Customer Service:

We had a service provider in-between Imperva and our organisation. It did not make things easy. When dealing directly with Imperva I had good experiences with the vendor, and real issues were escalated quickly and getting access to the relevant engineering sections of the vendor was possible.

Technical Support:

Technical support was hit and miss. Sometimes we received excellent support, and other times it was not so good. Sometimes convincing the engineering team that there was a real problem in the software was a bit harder than it should have been. Overall, compared to other vendors, support was good.

Which solution did I use previously and why did I switch?

We previously used another solution, and that product was different depending on the DBMS that was being monitored. Technical expertise in DBMS technology with that vendor was poor, so we switched..

How was the initial setup?

The initial setup was easy, but some of the specific requirements we had required some work. Deploying the hardware during the initial setup did not require and specific customisation for our organisation. The audit policies and assessments obviously did require customisation, but it was relatively simple. Later on, we did find some issues that were due to the setup of the site hierarchy that was not brought to our attention until one to two years later.

What about the implementation team?

We used on-site vendor engineers to support the internal implementation. Their level of expertise was excellent.

What was our ROI?

This is not relevant to the production selection, as we were required to close off auditing items.

Which other solutions did I evaluate?

We compared IBM Guardium and Imperva SecureSphere via a POC process. We did a paper evaluation of other products to choose two products for the POC.

What other advice do I have?

Go through the POC process and test all ITIL processes to ensure you understand what will be required for the entire lifecycle of implementation/support. Engage with DBA teams to provide DBA support and knowledge. If it's possible, ensure there are people who understand databases on the SecureSphere support team.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Network Engineer at CBN
Real User
Top 20
Has a robust recording system and does a good job monitoring events
Pros and Cons
  • "Ability to send event monitoring and administrative activities."
  • "There is sometimes lost communication and it can take a lot of troubleshooting to solve."

What is our primary use case?

We use this product to monitor database administrator events and activities on all services. We also use it for preventive measures. Some sensitive queries can be blocked in line before transactions occur.

What is most valuable?

It's great that we're able to send light event monitoring and administrative activities. SecureSephere has a robust recording system.

What needs improvement?

We have a lot of lost communication between the clients and the management server. This is a client-on-server solution and sometimes the agent stops communicating and it can take a lot of troubleshooting to solve the issue. It would also be helpful if they'd improve artificial intelligence. 

For how long have I used the solution?

We've been using this solution for six years. 

What do I think about the stability of the solution?

The stability is pretty good. 

What do I think about the scalability of the solution?

The scalability is good. 

How are customer service and support?

The customer support is not very good. 

Which solution did I use previously and why did I switch?

I don't recall the name of the previous solution but we switched to Imperva because it was less complex. 

How was the initial setup?

The initial setup was reasonably straightforward. The deployment took about three months and we had some external assistance. 

What's my experience with pricing, setup cost, and licensing?

This is an expensive solution. We pay an additional amount for support. 

What other advice do I have?

Staff need training prior to using this product. 

I rate this solution nine out of 10.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Imperva SecureSphere Database Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2024
Product Categories
Database Security
Buyer's Guide
Download our free Imperva SecureSphere Database Security Report and get advice and tips from experienced pros sharing their opinions.