Imperva Application Security
0.00

Problems that solves

Unauthorized access to corporate IT systems and data

Risk or Leaks of confidential information

IT infrastructure does not meet business tasks

Risk of data loss or damage

High costs

Values

Reduce Costs

Ensure Security and Business Continuity

Manage Risks

Imperva Application Security

Imperva Application Security provides multi-layered protection to make applications and websites always available, always user-friendly, and always secure

Description

Imperva Application Security mitigates risk for your business with full-function defense-in-depth, providing protection wherever you choose to deploy - in the cloud, on-premises, or via a hybrid model. Imperva offers advanced analytics to quickly identify the threats that matter, DDoS protection with a 3-second mitigation SLA, a developer-friendly Content Delivery Network (CDN) for the utmost performance, Web Application Firewall (WAF) solutions, bot protection, Runtime Application Self-Protection (RASP) for security embedded into the application itself, and more.

Attack Analytics
  • Automatically correlate and extract meaningful narratives from thousands of security events, using machine learning
  • Reduce risk by combating alert fatigue
  • See attacks from the edge to the heart of the network, incorporating behavioral attack data from every customer we protect
 
DDoS Protection
  • Best-in-the-industry 3-second mitigation SLA
  • Automatic detection and mitigation
  • Available in always-on or on-demand mode
  • 44 global scrubbing centers, 6+ Tbps of scrubbing capacity at 65 billion Packets-Per-Second (PPS)
 
CDN
  • Fast onboarding with a simple DNS change
  • Offload origin bandwidth via automatic content profiling
  • Layer 7 cloud load balancing with redirect and rewrite rules
 
Cloud WAF
  • Little to no tuning required
  • Deploy in blocking mode with near-zero false positives
  • A managed service backed by a team of security experts
 
WAF Gateway
  • Ideal for highly-regulated industries like financial services and healthcare
  • Dynamically profile application structure and usage, blocking anomalies and illegal traffic
  • Highly configurable to allow tight protection of your specific applications
 
Runtime Application Self-Protection
  • Push code into production fast with security embedded
  • Autonomous protection blocks real-time attacks without added latency
  • Works in any type of deployment architecture including on-premises, in the cloud, and in containers

User features

Roles of Interested Employees

Chief Executive Officer

Chief Information Officer

Chief Technical Officer

Chief IT Security Officer

Organizational Features

Internet access is available for employees

GDPR Compliance

Personal data operation