Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Imperva's DDoS Protection safeguards all your digital assets at the edge, ensuring seamless operations without interruptions. With this service, you can maintain business continuity thanks to assured uptime. The crucial principle in DDoS defense is that while it takes mere moments to go offline, recovering can take hours; hence, each second is vital during an assault. Imperva provides reassurance by automatically filtering out attack traffic at the edge, eliminating the need for you to increase bandwidth costs. The DDoS Protection service specifically designed for websites is perpetually active, swiftly countering any DDoS attack, regardless of its type or scale, that targets your web applications. This service works in tandem with Imperva's cloud web application firewall (WAF), which effectively blocks attempts at hacking and malicious bot attacks. A simple modification to your DNS records directs all HTTP/S traffic destined for your domain(s) through the Imperva network. Acting as a secure proxy, Imperva’s DDoS protection conceals the IP address of your origin server, providing an additional layer of security against potential threats. By implementing this robust solution, organizations can confidently focus on their core operations without the constant worry of DDoS attacks disrupting their services.

Description

Imperva Runtime Protection identifies and prevents attacks originating from within the application itself. By employing innovative LangSec techniques that interpret data as executable code, it gains comprehensive insight into potentially harmful payloads prior to the completion of application processes. This approach delivers swift and precise defense without relying on signatures or a learning phase. Furthermore, Imperva Runtime Protection serves as an essential element of Imperva’s top-tier, comprehensive application security solution, elevating the concept of defense-in-depth to unprecedented heights. It ensures that applications remain secure against evolving threats in real-time.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
Archer
BMC AMI Data for Db2
Buyer Discovery
Cloudera
GigaSECURE
IBM Cloud
Intelligent Management Center
Microsoft Azure
NTT Application Security
PayPal
RapidScale Identity as a Service
Red Hat Cloud Suite
SAP Cloud Platform
SolarWinds Access Rights Manager
Teradata VantageCloud
VMware Cloud
Veracode

Integrations

Amazon Web Services (AWS)
Archer
BMC AMI Data for Db2
Buyer Discovery
Cloudera
GigaSECURE
IBM Cloud
Intelligent Management Center
Microsoft Azure
NTT Application Security
PayPal
RapidScale Identity as a Service
Red Hat Cloud Suite
SAP Cloud Platform
SolarWinds Access Rights Manager
Teradata VantageCloud
VMware Cloud
Veracode

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Imperva

Founded

2002

Country

United States

Website

www.imperva.com/products/ddos-protection-services/

Vendor Details

Company Name

Imperva

Founded

2002

Country

United States

Website

www.imperva.com/products/runtime-application-self-protection-rasp/

Product Features

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Alternatives

Alternatives

Operant Reviews

Operant

Operant AI
WEDOS Protection Reviews

WEDOS Protection

WEDOS Group SA
Hdiv Reviews

Hdiv

Hdiv Security
K2 Security Platform Reviews

K2 Security Platform

K2 Cyber Security