Skip to main content
TrustRadius
Imperva Attack Analytics

Imperva Attack Analytics
Formerly ThreatRadar

Overview

What is Imperva Attack Analytics?

Imperva Attack Analytics, (formerly ThreatRadar), is a threat intelligence service relying on research from Imperva's Application Defense Center (ADC), integratable into Imperva's WAF solutions and able to be fed into enterprise security data.

Read more

Learn from top reviewers

Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Imperva Attack Analytics?

Imperva Attack Analytics, (formerly ThreatRadar), is a threat intelligence service relying on research from Imperva's Application Defense Center (ADC), integratable into Imperva's WAF solutions and able to be fed into enterprise security data.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

3 people also want pricing

Alternatives Pricing

What is AlienVault USM?

AlienVault® Unified Security Management® (USM) delivers threat detection, incident response, and compliance management in one unified platform. It is designed to combine all the essential security capabilities needed for effective security monitoring across cloud and on-premises environments,…

What is Egnyte?

Egnyte provides a unified content security and governance solution for collaboration, data security, compliance, and threat detection for multicloud businesses. More than 16,000 organizations trust Egnyte to reduce risks and IT complexity, prevent ransomware and IP theft, and boost employee…

Return to navigation

Product Details

What is Imperva Attack Analytics?

Imperva Attack Analytics Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews From Top Reviewers

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

The product has proven to be an invaluable tool during drills, as it efficiently detects and identifies cyber-attacks and their patterns. Users have praised its AI-based threat details for providing comprehensive information about external web and network attacks, including the source, destination, attack type, and brute force attempts. This level of detail has greatly aided in risk mitigation efforts. Additionally, the product addresses a significant challenge in the visibility and response aspect of incident response. Customers have found that it provides a clear view of attacks on their environment, allowing for proactive monitoring and timely alerts during attack situations. This feature has been particularly helpful in enhancing the security of sensitive information by providing complete visibility into the database, privileged activities, and auditing access. Moreover, the product's ability to generate customized reports has facilitated deep analysis and comprehensive evaluation of attacks. Notably, users have found that the product meets operational scalability demands by consolidating management, visibility, and reporting across distributed locations. It also enforces access policies, sends real-time alerts, and enables incident management and response, ultimately improving overall security measures.

Imperva attack analytics: Multiple reviewers have expressed a high level of satisfaction with Imperva's attack analytics, considering it the best in the industry. This positive sentiment indicates that users greatly appreciate and trust this aspect of the product.

Convenient root signature analysis: Users have praised Imperva for its ability to analyze attacks using root signatures. This feature enables them to effectively mitigate and address potential threats, making their overall experience more convenient and efficient.

Comprehensive defense against security attacks: Imperva's built-in signatures and modules provide a comprehensive solution for defending against security attacks. The product filters traffic up to the application layer, offering robust protection and ensuring that users' systems are safeguarded from potential threats.

Detection of small scale attacks needs improvement: Some users have reported that the software occasionally fails to detect small scale attacks, indicating a need for improvement in this area. This suggests that there is room for enhancing the software's ability to identify and respond to smaller security threats.

Manual configuration modules required: According to some reviewers, manual configuration modules are sometimes necessary with the software, suggesting that it may not be fully automated as expected. This indicates a potential limitation in terms of ease-of-use and efficiency, as users may need to spend extra time on manual configurations instead of relying on seamless automation.

UI performance needs improvement: Several users have mentioned that the user interface becomes laggy while running reports, highlighting the need for improved UI performance. A sluggish UI can hinder productivity and cause frustration among users who rely on smooth and efficient interactions with the software. Enhancements in UI optimization could lead to a more seamless experience for users when generating reports.

(1-3 of 3)

Provides the foundations for a robust risk management process

Rating: 10 out of 10
June 22, 2022
MR
Vetted Review
Verified User
Imperva Attack Analytics
2 years of experience
Complete visibility into the database, all privileged activities, as well as comprehensive auditing of any access to sensitive information. It meets the operational scalability demands of the company by consolidating the management, visibility and reporting across the distributed locations. Enforces access policies, sending real-time alerts and enabling users to create follow-on tasks, to ensure proper incident management and response
  • Routinely runs assessments and scans our systems to identify missing patches and configurations
  • Enables the company to identify users with excessive rights to sensitive data
  • Accelerates incident response and investigation with centralized management and advanced analytics
Cons
  • Improve the process of forwarding details about system events and database security events to the company's Security Operations Center through better integration with other systems
I have found the solution to be flexible, adaptable and responsive which enables the implementation of risk management principles and security best practices. It provides visibility into cloud application usage, including what data has been accessed, when and by whom that help detect behavioral anomalies with app usage and alert on suspicious events.
  • Continuous API endpoint protection with security norms adjusted to APIs
  • Analyzes security events using artificial intelligence
  • DDoS protection that shields assets to ensure business continuity with no performance impact and guaranteed uptime
  • Visibility and control over all endpoint access
  • Detects malicious behavior and use of stolen credentials, with real-time remediation
  • Clean analytics saves hundreds of hours in incident response
We chose Imperva Attack Analytics for its ability to monitor and audit database activities and its ability to scale and meet demands of the distributed environment. The solution is simple, straightforward and transparent for colleagues, and provides real-time event monitoring, audit analysis and customisable reports.

Imperva Attack Analytics a tool that cannot be missing in your organization

Rating: 10 out of 10
June 02, 2022
FL
Vetted Review
Verified User
Imperva Attack Analytics
3 years of experience
I am currently using Imperva Analytics to analyze all the web traffic that our domains receive with this system we can measure different metrics, for example, we can know where the attacks come from in detail, what technique they used, from what country and the public IPs of attackers, in the same way we can see the peak hours of more attacks and the bandwidth that these events are causing us. In itself, it is an excellent security tool that gives us greater visibility.
  • It quickly shows us the statistics graphically.
  • It gives us a super grainy detail of the attack.
  • The board is very friendly.
  • It is always constantly updated.
Cons
  • A heat map of global attacks versus attacks coming our way.
  • Attention or support in Spanish language
  • Increase the history of the logs
I think Imperva Analytics is a super complete security tool, for now it would be great if they could add a heat map of the attacks that are coming to me versus the attacks that are being executed in real time worldwide, to know if we are being victims of a massive attack against several countries. In the same way, an improvement that they recently implemented seems good to me to bring to the comment is that they assigned us an engineer who would provide us with personalized attention from Imperva.
  • See the attacks in real time.
  • easy-to-read graphics.
  • Accurate information in the logs.
  • We gain in reputation as our website has never been down.
  • We gain credibility as we are protected with the best security tool.
  • We gain trust, our clients know that their accounts are well protected.
We have used Radware, it is a very good tool, comparing it with Imperva it is at the same level, what we chose to use Imperva is the much more accessible price they gave us. Being transparent with my opinion, I consider it honorable to tell the truth in this type of survey, if you have the economic capacity to have both systems, I recommend a hybrid solution, it is always good and welcome.

Imperva Attack Analytics delivers quality analytics and security

Rating: 8 out of 10
June 02, 2022
Vetted Review
Verified User
Imperva Attack Analytics
1 year of experience
We use Imperva Attack Analytics to monitor all of our internet-facing resources. Imperva Attack Analytics allows us to see possible threats and vulnerabilities before they have a chance to cause problems.
  • Alerting on known vulnerabilities
  • Detecting anomalous behavior
  • Providing recommendations for remediation
Cons
  • The UI does not feel intuitive
  • The support documentation sometimes is lacking or unclear
  • API integration seems a little more complicated than need be.
If you have many internet-facing resources in multiple clouds Imperva Attack Analytics can be very helpful. It is most useful for on-premise private clouds with a sizeable internet-facing footprint.
  • Its ability to detect anomalous behavior for possible zero day attacks
  • The insights provide helpful tips for remediation of issues
  • Allows private clouds to have a secure front end similar to public clouds
  • Imperva Attack Analytics has detected multiple vulnerabilities for zero-day attacks before they were exploited. This allowed us to remediate the vulnerabilities without any downtime or financial impact.
  • Imperva Attack Analytics has allowed our on-premise infrastructure the same level of security provided as our cloud infrastructure.
While somewhat more difficult to work with than other offerings, Imperva Attack Analytics has proved to be just as if not more capable in alerting than many of the public cloud alternatives. Once you get past the initial setup and get a solid understanding of the product it becomes exceedingly useful.
Return to navigation