Ratings and Reviews 1 Rating

Total
ease
features
design
support

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Cloudflare Reviews & Ratings
    2,002 Ratings
    Company Website
  • cside Reviews & Ratings
    25 Ratings
    Company Website
  • Source Defense Reviews & Ratings
    7 Ratings
    Company Website
  • Bitdefender Ultimate Small Business Security Reviews & Ratings
    3 Ratings
    Company Website
  • UTunnel VPN and ZTNA Reviews & Ratings
    118 Ratings
    Company Website
  • Guardz Reviews & Ratings
    117 Ratings
    Company Website
  • ManageEngine Endpoint Central Reviews & Ratings
    2,936 Ratings
    Company Website
  • Feroot Reviews & Ratings
    28 Ratings
    Company Website
  • ManageEngine OpManager Reviews & Ratings
    1,660 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    163 Ratings
    Company Website

What is Imperva Application Security Platform?

Imperva's Application Security Platform provides robust protection for applications and APIs, effectively addressing modern security threats without compromising performance. This comprehensive platform includes a range of features such as Web Application Firewall (WAF), Advanced Bot Protection, API Security, DDoS Protection, Client-Side Protection, and Runtime Protection, all designed to defend against various vulnerabilities and attacks. By leveraging advanced analytics and automated threat response systems, Imperva ensures that applications remain secure whether deployed in cloud, on-premises, or hybrid environments. Its flexible architecture further allows for seamless integration into different operational frameworks, significantly bolstering the overall security posture. As a result, organizations can confidently safeguard their digital assets against evolving threats while maintaining optimal operational efficiency.

What is Corero SmartWall?

The SmartWall suite of DDoS protection solutions adeptly mitigates a wide range of attacks, ensuring that the applications and services it defends remain accessible and that genuine traffic flows uninterrupted. Designed specifically to handle massive network-centric DDoS threats, reflective amplified spoof attacks, and even those that escape traditional out-of-band detection methods, it stands out in its effectiveness. With the capability to detect and respond within mere seconds—far quicker than the lengthy minutes often required by older systems—it secures the continuous operation of online businesses. In addition, it offers comprehensive visibility through its detailed reporting and alerting systems, which provide clear, actionable insights into DDoS attack patterns throughout the network. The system's precise automatic mitigation functions not only lower the total cost of ownership (TCO) but also empower IT and security teams to redirect resources towards addressing other security challenges efficiently. This comprehensive approach not only safeguards against immediate threats but also strengthens the overall resilience of the network, fostering the development of more sophisticated cybersecurity tactics. By enhancing the ability to respond to various threats, it plays a crucial role in maintaining a secure online environment.

Media

Media

Integrations Supported

Active Directory
Centraleyezer
GTT Envision
ImmuniWeb
Imperva Account Takeover Protection
InMotion Hosting
Proofpoint Digital Risk Protection
The Thrive Platform

Integrations Supported

Active Directory
Centraleyezer
GTT Envision
ImmuniWeb
Imperva Account Takeover Protection
InMotion Hosting
Proofpoint Digital Risk Protection
The Thrive Platform

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Imperva

Date Founded

2002

Company Location

United States

Company Website

www.imperva.com/products/application-security/

Company Facts

Organization Name

Corero

Date Founded

1997

Company Location

United States

Company Website

www.corero.com

Categories and Features

Application Delivery Controllers (ADC)

CGNAT
Content Redirection
IP Traffic Optimization
Load Balancing
Proxy / Reverse Proxy
SSL Offload
Server Health Monitoring
Traffic Chaining / Steering
Web Application Firewall (WAF)

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Load Balancing

Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Categories and Features

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Popular Alternatives

Popular Alternatives

AccessPatrol Reviews & Ratings

AccessPatrol

CurrentWare Inc.