Articles - 5 31 2023
Articles - 5 31 2023
Articles
Articles 1
Contents
Contents
Imperva Software Releases. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Imperva Snapshot. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Imperva Security Mobile App. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Cyber Threat Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Database Support - Data Security Coverage Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Understanding Updated Product Naming. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
New Support Case - Product Categories and Names. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
On-Premises Hardware Supported Versions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Imperva Product and Service Certifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Imperva Attack Analytics – SOC2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Imperva Corporate (All Offices) – ISO 27001. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Imperva Cloud Application Security (previously Incapsula) – PCI & SOC2. . . . . . . . . . . . . . . . . . . . 25
Imperva SecureSphere (on-Premises) – Common Criteria & UC APL. . . . . . . . . . . . . . . . . . . . . . . . . 26
Imperva SeS Managed Services – PCI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Knowledgebase Content has Moved!. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Articles 2
Articles
Application Security
Data Security
v4.11 Sonar
February 28, 2023
(Data Security Fabric)
Articles 3
Articles
Cloud Data Security Periodically released. Click link to see latest releases.
Patches
Articles 4
Articles
Imperva Snapshot
Imperva Snapshot is a free, fast and easy-to-use cloud data security posture assessment service for Amazon RDS
managed databases.
It identifies data-related risks from all angles - its configuration, vulnerabilities exposure and classification - not just
the database configuration and infrastructure.
Imperva Snapshot uses a Patent-Pending technology. It uses a temporary restored copy of your database, and all data
stays within your own AWS account. It is completely safe and has no impact on the contents or performance of your
production database. In only a few minutes, Imperva Snapshot will deliver a detailed assessment report to your email
inbox.
Snapshot utilizes Imperva’s data detection and classification engines to scan your cloud database.
It provides robust insights about the infrastructure as well as the data resides within it.
Articles 5
Articles
Articles 6
Articles
Note: The Imperva Mobile App will be discontinued on May 17, 2024.
Overview
Imperva’s Security Mobile App is a visibly clear and action-oriented dashboard that enables you to view your Imperva
Cloud WAF security posture and performance on the go. You can stay up-to-date with real-time push notifications on
critical events and be able to drill down quickly to what’s most important. For example:
• One simple view for Attack Analytics, CDN and Cloud WAF
• Aggregated account view
• Push notifications on DDoS (L7 and L3/4 infra protect), critical setting changes, data overage, and critical Attack
Analytic events
• See trends with period comparison
• Access Attack Analytics data
• See the percentage of alerted events out of the total amount of events
• See the percentage of blocked events out of the total amount of events
• Face recognition for login and SSO
• View data for sub accounts
The Imperva Security Mobile App is currently available for iOS, Mac and Android users only via the Apple App store or
the Google Play store (scan the QR code or click the AppStore/Google Play Store button to download).
Note: The Imperva Mobile App can only run on certified Apple or Google operating systems.
App Store
Articles 7
Articles
You can watch a quick two-minute video on what exactly Imperva’s Security Mobile App can do here.
Dashboard
After you login, select the period you are interested in reviewing and the Imperva Security Mobile App dashboard
displays three main sections. In each section you can drill down and every date and graph shown, indicates the
comparison to the last period before the one you selected.
• Security Overview - Understand in more detail the breakdown of your recent security events. This section is
divided into three categories (Total Requests, Blocked Events, and Alerted events) and clicking on each category
enables you to see an activity graph for that category. You can click on View Websites Settings to see which of
your websites are protected and which are vulnerable. In addition, after clicking View Websites Settings, you
can click the button on the top right corner of the screen to create and send a report showing and suggesting
actions you can take to fix vulnerabilities.
• Attack Analytics Incidents - Gain high visibility into your recent attack incidents. You can also access this
directly from the Incidents shortcut on the bottom toolbar. This section is divided into three categories (Critical,
Major and Minor) and you can drill down into each category to view only the desired incidents.
• Traffic and Health - Make sense of the attacks and traffic visiting your websites. This section is divided into four
fields (Bot Visits, Cached Bandwidth, Accumulated Bandwidths and DDoS attacks) and you can view further
information on each field when selecting it.
Articles 8
Articles
• Account Data View - If you have sub account access, you can now login to the Mobile App with your Imperva
user credentials and view your account. If you have parent account access, when you login to a parent account
that has sub accounts, you can now switch between the parent and sub accounts. You can perform this by
clicking the Accounts icon .
Notifications
• A DDoS attack is above the given threshold. This enables notifying the relevant people if needed. Clicking on the
notification opens the dashboard where you can examine the details.
• A DDoS attack is over. Clicking on the notification opens the dashboard where you can examine the details.
• An Attack Analytic incident occurs. Clicking on the notification opens the dashboard where you can examine the
details.
• Reaching 90% of the bandwidth utilization that you purchased.
Settings Widget
The Settings widget is located on the bottom toolbar. Here you can choose which notifications you want alerts on, see
acknowledgments, see the terms and conditions policy, contact us or logout.
Known Issues
The Imperva Security Mobile App login password can only contain a combination of lowercase characters, uppercase
characters and numbers.
Articles 9
Articles
It provides an easy-to-understand score to track cyber threat level consistently over time, as well as observe trends.
The data is (when applicable) also analyzed by industry and by country, to provide further analytics and insights.
The Cyber Threat Index is calculated using data gathered from all Imperva sensors across the world.
Viewers of the global Cyber Threat Index can dive deeper into the score & drill-down for individual industries and
countries, and also view historic Index scores.
Articles 10
Articles
The tool lists supported coverage for all Imperva database products (DAM, DRA, Sonar).
• Click an item, for example Database Cloudera Hadoop (CDH) 6.2; all supported environment variables become
highlighted
• Scroll down the page to see those variables such as Agent version, MX and Gateway version, supported
hypervisor and cloud platforms, etc.
Note: The Data Security Coverage Tool is replacing the database and OS coverage tables in the
Release Notes, those tables are no longer available.
Articles 11
Articles
Articles 12
Articles
Imperva now offers separate, subscription based licensing for Applications and for Data. For more information on
licensing see the Imperva Licensing Plans page
jSonar products have become part of Data Security Fabric (DSF), and Sonar Warehouse is now referred to as the DSF
Hub. For more information regarding the solution see Data Security Fabric Updated Naming.
SecureSphere Products
• WAF Gateway
• Data Security Gateways (known as of v14.7
As of v14.7 Imperva has a new Data Security offering named
as Agent Gateways, see below)
Data Security Fabric (DSF) that bundles what were previously
Notes: three separate products into a single offering. They include
• The terms WAF Gateway and Data Security • Database Activity Monitoring (DAM)
Gateway are terms primarily used in • Data Risk Analytics (DRA)
purchasing and licensing Imperva products. • Sonar
They do not appear in user documentation.
For specific information regarding the update of naming for
Gateways are discussed in the framework of
this solution and its components, see Data Security Fabric
their role in deploying WAF or Data Security
Updated Naming.
products, not as licenses or branded names.
• As of v14.4, these product lines have been
physically separated. Meaning gateways can
only be installed as a WAF or a Data Security
Gateway. A single gateway no longer
supports both licenses.
Articles 13
Articles
The following is an overall look at updated naming per product. In addition to the remaining of the old SecureSphere
brand, and full separation of gateways, a number of other product name changes related to SecureSphere have taken
place. The following table maps old names to new references to help better understand this transition.
Old Reference Updated Product Name as of v14.1 Updated Product Name as of v14.7
Articles 14
Articles
Old Reference Updated Product Name as of v14.1 Updated Product Name as of v14.7
All main component names of what were previously the SecureSphere System are now part of the separate WAF or
DAM product system and their names will not change. Only the SOM name has been updated to Management Server
Manager.
Instructions for installing on these platforms can be found in this documentation portal tagged with the Document
Type classification Installation.
You can further filter by Public Cloud or Hypervisor Installation to find the relevant installation instructions.
Instructions for configuring and using WAF or DAM products are found in Document Type User Guide. User Guides for
WAF, DAM, File and SharePoint are the same whether they’re physically installed, installed as a virtual machine or
installed in AWS or Azure.
Incapsula Products
The product name Incapsula has been retired. As part of our new FlexProtect licensing model, this translates into the
category name of Cloud Application Security which reflects the package of services that was offered as Incapsula, as
well as the updated product names.
This table maps old names to new to help better understand this transition.
Articles 15
Articles
Prevoty Products
Prevoty products are now referred to exclusively as RASP. RASP content is has been fully migrated to the
Documentation Portal starting with version 4.2.
• Sonar: The Sonar product itself has been rebranded and SonarW which provides the management interface is
now referred to as the DSF Hub and reads Data Security Fabric after logging in. The DSF Hub interface is
undergoing development and will continue to evolve over the coming quarters.
• Cloud Application Security (Previously Incapsula): Has been rebranded and the word Incapsula has been
removed from most locations. We are still in the process of updating remaining items. The URL
my.imperva.com has been created and most traffic to my.incapsula.com has been redirected to that URL. We
ask that all new devOps scripts refer to the new URL
• Imperva WAF and DAM (Previously SecureSphere): In v14.1 you will already start to see new branding with
different colors and fonts. In the first release for v14x, some instances of SecureSphere and ThreatRadar will
have been updated in the UI to reflect new naming conventions. Note: in order to eliminate any risk of impact to
dev-ops deployments, changes in the interface will be minimal, and you will continue to see the word
SecureSphere in some locations
Articles 16
Articles
• Sonar: Sonar Documentation has been migrated from the old JSonar web server and is now available on
docs.imperva.com. While the product name Sonar is officially being replaced with Data Security Fabric, in the
meantime and in order to enable users to navigate and understand documentation for the specific component
products, Sonar will continued to be referred to in most documentation as it is still a system distinct from DAM
and DRA that needs to be installed and configured independently. Some changes will be made in the
documentation as the UI evolves. When this is no longer the case naming will be fully aligned with Data Security
Fabric.
• Cloud Application Security (Previously Incapsula): Documentation has already been partially updated and
will be completed in the following quarters
• Imperva On-Premises (Previously SecureSphere): Documentation updates are currently being planned. They
will be rolled out gradually and will be approached on a publication by publication basis. With a handful of
publications being updated each quarter. However note that due to the limited amount of changes in the UI, to
remain faithful to the UI the word SecureSphere will still appear in many locations, while in those referring to
the SecureSphere system it will be changes to 'On-Premises"
Articles 17
Articles
This page provides a short description for the different product categories and products.
This category is used to open cases related to Application Security based products delivered via Imperva's Cloud
Application Security (formerly known as Incapsula and Distil), and includes the items in the following table.
Product Description
Account Takeover Protection Used to open cases for the Account Takeover Protection (ATO) Product.
Used to open cases for the Advanced Bot Protection Product. This is the cloud based
Advanced Bot Protection Bot protection offering. For legacy users of Distil Networks Bot Defender, select Distil
Networks Bot Defender instead.
API Security Used to open cases for the API Security product. Select this option when your issue is
with cloud based API Security offering. For users of API Security as deployed in the On-
Articles 18
Articles
Product Description
Premises product, select Application Security - On-Premises first, then select API
Security from there.
Used to open cases for the Attack Analytics product when accessed from the Cloud
platform. If your case relates to Attack Analytics accessed from an On-Premises
Attack Analytics
deployment, select the Product Category Application Security - On-Premises, then
select Attack Analytics from there.
Cloud WAF Used to open cases for Cloud WAF, previously known as Incapsula.
Content Delivery Network (CDN) Used to open cases for the Content Delivery Network product.
DDoS Protection for Networks Used to open cases for DDoS Protection for Networks product.
DDos Protection for Websites Used to open cases for DDoS Protection for Websites product.
Used to open cases for the Distil Network legacy product named Bot Defender when
Distil Networks Bot Defender
deployed in the cloud.
Load Balancing / Site Failover Used to open cases for the Load Balancing / Site Failover product.
This category is used to open cases related to Application Security based products delivered via On-Premises
deployment (e.g. SecureSphere) whether via physical appliance, VMWare, AWS, Azure or Google Cloud, and includes
the items in the following table.
Product Description
API Security Used to open cases for the API Security product. Select this option when your issue is
with API Security offering that is part of the On-Premises product. For users of API
Articles 19
Articles
Product Description
Security as deployed in the cloud, select Application Security - Cloud first, then select
API Security from there.
Used to open cases for the Attack Analytics product when accessed from an On-
Attack Analytics Premises deployment. For users of Attack Analytics accessed from the cloud, select
Application Security - Cloud first, then select Attack Analytics from there.
Used to open cases for the Distil Network legacy product Bot Defender when deployed
Distil Networks Bot Defender
On-Premises.
Data Security
This category is used to open cases related to all Data Security based products, regardless of deployment type, and
includes the items in the following table.
Product Description
Cloud Data Security Used to open cases related to Cloud Data Security (CDS).
Data Masking Used to open cases related to Data Masking (previously Camouflage).
Data Risk Analytics Used to open cases related to Data Risk Analytics (previously CounterBreach).
Articles 20
Articles
Product Description
Used to open cases related to Data Activity Monitoring (previously SecureSphere DAM)
Database Activity Monitoring
whether delivered through a physical appliance, on VMWare, or through AWS, Azure or
(DAM Gateway)
Google Cloud.
Used to open cases related to File Activity Monitoring (previously SecureSphere FAM)
File Activity Monitoring whether delivered through a physical appliance, on VMWare, or through AWS, Azure or
Google Cloud.
Imperva Agent Used to open cases related to the Imperva Agent (previously the SecureSphere Agent).
z/OS Agent Used to open cases related to agents for z/OS (IMS, DB2).
Product Description
Articles 21
Articles
Articles 22
Articles
Supported On-Premises
Models Size Generation
Versions
Articles 23
Articles
Imperva as a security company with a strong understanding of Governance, Risk and Compliance, has a solid risk
management program in place. We continue to maintain globally recognized certifications for current products and
services. These certifications along with the corresponding controls are assessed by third party auditors to validate
the effectiveness of our program. The ever changing threat landscape, requires us to continue expanding our
governance, risk and controls to meet these growing needs.
SOC2 is not a certification – it is a type of audit report that attests to the trustworthiness of services provided by a
service organization, ensuring Trust Service Principles of Security, Availability, Processing Integrity, Confidentiality,
and Privacy are being addressed.
Request for some documentation may require a non-disclosure agreement (NDA) to be in place. To request additional
documentation, please contact an Imperva sales representative via https://www.imperva.com/contact-us/.
Articles 24
Articles
ISO 27001 is an international standard recognized around the world for mitigating information security risks. ISO
outlines key standards and industry best practices related to implementing and managing in a given information
security risk environment.
Request for some documentation may require an NDA to be in place, to request additional documentation, please
contact an Imperva sales representative via https://www.imperva.com/contact-us/
Articles 25
Articles
PCI certification is considered the best way to safeguard sensitive data and information, thereby helping businesses
build long lasting and trusting relationships with their customers.
SOC 2 is not a certification – it is a type of audit report that attests to the trustworthiness of services provided by a
service organization, ensuring Trust Service Principles of Security, Availability, Processing Integrity, Confidentiality,
and Privacy are being addressed.
Request for some documentation may require an NDA to be in place, to request additional documentation, please
contact an Imperva sales representative via https://www.imperva.com/contact-us/
Common Criteria defines a common framework for evaluating security features and capabilities, assuring buyers that
the process of specification, implementation and evaluation for any certified computer security solution was
conducted in a thorough and standard manner.
UC APL (Unified Capabilities Approved Products List) represents the agency's master list of products available for
purchase that are secure, trusted, and approved for deployment within the DoD's technology infrastructure.
Request for some documentation may require an NDA to be in place, to request additional documentation, please
contact an Imperva sales representative via https://www.imperva.com/contact-us/
Articles 26
Articles
Articles 27
Articles
Articles 28
Articles
PCI certification is considered the best way to safeguard sensitive data and information, thereby helping businesses
build long lasting and trusting relationships with their customers.
Request for some documentation may require an NDA to be in place, to request additional documentation, please
contact an Imperva sales representative via https://www.imperva.com/contact-us/
Articles 29
Articles
We've worked hard to make this transition as smooth as possible and to make finding information easier, but in this
case it looks like we messed up, and we apologize.
Please type the title of the article you're looking for in search located at the top of this page and press Enter to run the
search.
Note: Some content is restricted and you may be required to login to view it.
• If you're looking for legacy content or downloads, you can also visit the Imperva FTP at https://ftp-
us.imperva.com/Downloads/
• If you're looking for a community thread, please visit our new Community at https://community.imperva.com/
home
If you're looking for legacy content or downloads, you can also visit the Imperva
FTP at https://ftp-us.imperva.com/Downloads/
If you're looking for legacy content or downloads, you can also visit the Imperva
FTP at https://ftp-us.imperva.com/Downloads/
Articles 30