Imperva

Applications are being churned out faster than security teams can secure them. Imperva gets ahead of the challenge, mitigating risk for your business with full-function defense-in-depth, protecting not just your websites but all your applications and networks from attack.

We provide multi-layered protection to make applications and websites always available, always user-friendly, and always secure.

null

Attack Analytics

Mitigate and respond to real security threats quickly and decisively with actionable intelligence across all your layers of defense.

  • Automatically correlate and extract meaningful narratives from thousands of security events, using machine learning
  • Reduce risk by combating alert fatigue
  • See attacks from the edge to the heart of the network, incorporating behavioral attack data from every customer we protect

null

Management & Rotation

Maintain uptime no matter what. Prevent any type of DDoS attack – of any size – from blocking access to your website & network infrastructure.

  • Best-in-the-industry 3-second mitigation SLA
  • Automatic detection and mitigation
  • Available in always-on or on-demand mode
  • 44 global scrubbing centers, 6+ Tbps of scrubbing capacity at 65 billion Packets-Per-Second (PPS)

null

CDN

Improve website performance and reduce bandwidth costs with a developer-friendly CDN. Cache static resources at the edge while accelerating dynamic websites and APIs.

  • Fast onboarding with a simple DNS change
  • Offload origin bandwidth via automatic content profiling
  • Layer 7 cloud load balancing with redirect and rewrite rules

null

Cloud WAF

Let legitimate traffic in and keep bad traffic out. Protect your applications at the edge with an enterprise-class cloud WAF.

  • Little to no tuni+ng required
  • Deploy in blocking mode with near-zero false positives
  • A managed service backed by a team of security experts

null

WAF Gateway

Protect applications and APIs inside your network with Imperva WAF Gateway.

  • Ideal for highly-regulated industries like financial services and healthcare
  • Dynamically profile application structure and usage, blocking anomalies and illegal traffic
  • Highly configurable to allow tight protection of your specific applications

null

Runtime Application Self-Protection

Secure your applications with a single plugin that protects both legacy and modern applications against previously-known and zero-day attacks.

  • Push code into production fast with security embedded
  • Autonomous protection blocks real-time attacks without added latency
  • Works in any type of deployment architecture including on-premises, in the cloud, and in containers

Security versus Agility? Get both.

More data is growing in more places, and more users are accessing it to create business value. You need to identify critical data security risks without compromising the agility of your business.

Reduce risk, protect sensitive data from threats and prove compliance.

null

Data Risk Analytics

Discover risky data activity and prevent a data breach before any damage happens. Investigate more data threats faster. Reduce risk with a proactive security approach and actionable insights.

  • Distills billions of audit events into a manageable number of security insights
  • Provides granular risk context into how data is being used by whom with machine learning and behavior analytics
  • Explains incidents in plain language to accelerate investigation and reduce risk

null

Data Monitoring and Protection

No one accesses your data without you knowing about it. Audit all data activity, including local privileged users and applications. Get immediate detection and split-second response to threats.

  • Stops threats in real-time with pre-built or custom security policies that block the unauthorized activity
  • Automatically captures detailed audit trail showing who accessed what data, when and what was done to the data for compliance and forensics
  • Enables consistent oversight across a wide range of environments – databases, big data, clouds, mainframes and more

null

Data Discovery and Classification

Know what sensitive data you have, and where it lives. Reduce risks to security and compliance by discovering new, forgotten, or rogue databases. Identify data stores in scope for compliance.

  • Automates discovery of databases on-premises or in the cloud
  • Identifies sensitive, regulated data for compliance mandates (e.g. PCI, HIPAA, GDPR)
  • Examines database content and metadata for pre-defined and custom data types

null

Database Vulnerability Assessments

Find security gaps that attackers can exploit. Scan databases for vulnerabilities and misconfigurations. Get recommendations on remedial actions.

  • Identifies vulnerabilities and misconfigurations for databases on-premises or in the cloud
  • Leverages over 1,500 pre-defined assessments, based on CIS and DISA STIG benchmarks

null

Data Masking

De-identify sensitive data in non-production environments. Safely unlock the power of your data. Mitigate data breach risks. Comply with data privacy and protection regulations.

  • Replaces sensitive data with fictional, but realistic values using multiple transformation techniques
  • Maintains data utility with referential integrity and statistical accuracy
  • Delivers enterprise-class scalability and performance by masking large volumes of data quickly and easily
  • Supports a broad range of data stores

Supersecure your data with Imperva

Request Demo