Download PDF

Imperva
Protecting your data and all paths to it with market-leading application and data security products.
Overview
HQ Location
United States
Year Founded
2002
Company Type
Private
Revenue
$10-100m
Employees
1,001 - 10,000
Website
Company Description
Imperva is a cybersecurity leader with a mission to protect data and all paths to it. We protect the data of over 6,000 global customers from cyber attacks through all stages of their Digital Transformation. Our products are informed by the Imperva Research Lab, a global threat intelligence community, that feeds the latest security and compliance expertise into our solutions.
IoT Snapshot
Imperva is a provider of Industrial IoT cybersecurity and privacy technologies.
Technologies
Use Cases
Services
Technology Stack
Imperva’s Technology Stack maps Imperva’s participation in the cybersecurity and privacy IoT Technology stack.
-
Devices Layer
-
Edge Layer
-
Cloud Layer
-
Application Layer
-
Supporting Technologies
Technological Capability:
None
Minor
Moderate
Strong
Case Studies.

Case Study
Automating Protection of AWS Environment with Imperva: A Case Study
DigiCert was not satisfied with their previous DDoS mitigation solution on AWS as it excessively scrubbed traffic and blocked legitimate traffic. They needed a new security solution that provided both WAF protection and DDoS mitigation across their hybrid environment. They wanted to automate the security process as much as possible and reduce false positives.

Case Study
Enhancing Data Security Credentials: A Case Study of a Global IT Service Provider
In the current era of data breaches, the customer needed to enhance their data security credentials to win a contract with a major financial institution. They also needed to comply with security policies, establish controls for offshore initiatives, and achieve secure data reproduction and integrated masking across multiple databases.

Case Study
Automating Protection of AWS Environment with Imperva: A Case Study of DigiCert
DigiCert was using another vendor for DDoS mitigation on AWS, but they were not satisfied with the offering as it excessively scrubbed traffic and blocked legitimate traffic. They needed a new security solution that could manage risk, monitor all traffic, and only allow valid traffic to access their applications. They also wanted to automate as much of the security process as possible.