Community Blogs

Be the first person to recommend this.
Introduction Imperva Release Notes provide information on changes and enhancements to our Cloud WAF product in each release. In October 2019 a series of changes were implemented to protect Imperva Cloud WAF customers against HTTP Request Smuggling attacks (learn more here ). Further updates have been made over the past 60 days; these changes have also been detailed in in Release Notes. This article will explain recent updates, detail the attack technique that precipitated them and explain why it is important to be protected against such attacks. What is HTTP Smuggling? An HTTP Request Smuggling attack includes HTTP requests aiming ...
0 comments
2 people recommend this.
Discover how Imperva helps S&T Global engineer security solutions for its Albanian customers. To many of its customers and partners, Imperva means more than world-class security technologies. The Imperva user community is an important part of our entire business ecosystem. Our customers and partners regularly rely on expert advice to solve the industry’s toughest challenges and obtain guidance for delicate deployments. Cybersecurity is a demanding, constantly changing field. Imperva’s user community helps people around the globe gain access to the latest developments in the industry, and empowers them to share their insights with other Imperva ...
0 comments
Be the first person to recommend this.
Preparing to deploy DAM and multiple Agents, what are the important factors in doing this deployment. Sizing Probably the most important factor is proper sizing. Sizing has two main factors – HPS and Throughput HPS – hits per second – are the number of SQL hits/sec the GW can accept and process Every GW model has its own maximum HPS that it can support, so its important to know what model of GW is being deployed Throughput, is the amount of raw data that can be accepted by the GW The throughput is the total data being sent by all agents that are connected to the GW Audit requirements It is critical to know ...
0 comments
1 person recommends this.
Security Modules and Alert Mode Alert mode should only be used for websites that are subject to the “Cross Site Scripting Rule”. If your website is not subject to the rule and your security modules are set to “Alert Only”, your settings may not be meeting best practice. Please follow the below steps to change settings: 1. Log in to your my.imperva.com account. 2. On the sidebar, click Websites (default). 3. Click a site name to access the site's dashboard. 4. On the sidebar, click Settings. 5. Click WAF and you will be directed to the below page: Define Threat Responses For each type of threat, you ...
0 comments
Be the first person to recommend this.
AIX Requirements Imperva requires the DB to be started if it’s running on AIX, why is this an Imperva requirement? This is not an Imperva requirement, it is dictated by AIX design and processing This situation involves system call updates and how they are made available to the processes that need those calls to function as expected Specifically the system calls updated or newly added by the agent These system-calls are updated directly to the primary system-call table – aka svc table In addition to the main svc table there are copies of this table which are used by the various processes/applications In order to have the updated ...
0 comments
Be the first person to recommend this.
VM Admin is resisting requests to reserve resources for the Imperva instance. What is the proper response? VM advantages Imperva recognizes that there are many advantages of deploying virtual instances One primary advantage is that it allows the instances/hosts on a VM to share available resources The idea is that if an instance needs more CPU or memory it can request it when needed In this situation resources are not reserved and only allocated when needed/requested. This solution works for applications or databases where operations can be queued or retried In the case of a security appliance this is not an ...
0 comments
Be the first person to recommend this.
When performing DAM – Database Activity Monitoring – the legacy deployment is to install the agent on the DB server, register the agent and assign it to a specific gateway. There is also an option to assign a secondary gateway for fail-over purposes.   This model worked well for years, but as audit requirements changed so did the need to monitor database activity. There are customer deployments that have over 100 agents deployed and actively monitoring. The legacy deployment was simply not sufficient to support large agent deployments. There needed to be more flexibility and visibility.   DAM Clusters were introduced just for that reason. ...
3 comments
Be the first person to recommend this.
#CloudWAF(formerlyIncapsula)
0 comments

EOS and EOL information

Be the first person to recommend this.
Where do I find EOS and EOL information and what is the difference between the two. EOL/EOS information can be found at https://www.imperva.com/services/technicalsupport Search for Software schedule and it will take you to the tabs EOL – end of life – Software When a software version reaches EOL no more patches will be released for that version In addition there will be no bug fixes released Support will still troubleshoot issues during the EOL period but it will require being on the latest patch for that version If the issue is not a known issue with a corresponding workaround or is not resolved by the latest available patch, an upgrade ...
0 comments
1 person recommends this.
General questions customers have about Licensing, MX SoM and more License are applied to the MX and SoM There is no license on the GW There are two types of licenses - perpetual and Flex-Protect A perpetual license is for a fixed amount of devices and services and typically cover 1 calendar year, and are deployment specific A Flex-Protect license can cover a variety of devices depending on the requirements, and cover multiple deployments – on-prem, AWS/AZURE, or hybrid What are Activation's and how are they used? Activation's are for virtual deployments An activation is the ability to create a new license on demand Under Flex-Protect ...
0 comments