Overview
What is Imperva Attack Analytics?
Imperva Attack Analytics, (formerly ThreatRadar), is a threat intelligence service relying on research from Imperva's Application Defense Center (ADC), integratable into Imperva's WAF solutions and able to be fed into enterprise security data.
Provides the foundations for a robust risk management process
Imperva Attack Analytics a tool that cannot be missing in your organization
Imperva Attack Analytics delivers quality analytics and security
Pricing
What is Imperva Attack Analytics?
Imperva Attack Analytics, (formerly ThreatRadar), is a threat intelligence service relying on research from Imperva's Application Defense Center (ADC), integratable into Imperva's WAF solutions and able to be fed into enterprise security data.
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
2 people also want pricing
Alternatives Pricing
What is AlienVault USM?
AlienVault® Unified Security Management® (USM) delivers threat detection, incident response, and compliance management in one unified platform. It is designed to combine all the essential security capabilities needed for effective security monitoring across cloud and on-premises environments,…
What is CrowdStrike Falcon?
CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no…
Product Details
- About
- Tech Details
What is Imperva Attack Analytics?
Imperva Attack Analytics Technical Details
Operating Systems | Unspecified |
---|---|
Mobile Application | No |
Comparisons
Compare with
Reviews and Ratings
(3)Community Insights
- Business Problems Solved
- Pros
- Cons
The product has proven to be an invaluable tool during drills, as it efficiently detects and identifies cyber-attacks and their patterns. Users have praised its AI-based threat details for providing comprehensive information about external web and network attacks, including the source, destination, attack type, and brute force attempts. This level of detail has greatly aided in risk mitigation efforts. Additionally, the product addresses a significant challenge in the visibility and response aspect of incident response. Customers have found that it provides a clear view of attacks on their environment, allowing for proactive monitoring and timely alerts during attack situations. This feature has been particularly helpful in enhancing the security of sensitive information by providing complete visibility into the database, privileged activities, and auditing access. Moreover, the product's ability to generate customized reports has facilitated deep analysis and comprehensive evaluation of attacks. Notably, users have found that the product meets operational scalability demands by consolidating management, visibility, and reporting across distributed locations. It also enforces access policies, sends real-time alerts, and enables incident management and response, ultimately improving overall security measures.
Imperva attack analytics: Multiple reviewers have expressed a high level of satisfaction with Imperva's attack analytics, considering it the best in the industry. This positive sentiment indicates that users greatly appreciate and trust this aspect of the product.
Convenient root signature analysis: Users have praised Imperva for its ability to analyze attacks using root signatures. This feature enables them to effectively mitigate and address potential threats, making their overall experience more convenient and efficient.
Comprehensive defense against security attacks: Imperva's built-in signatures and modules provide a comprehensive solution for defending against security attacks. The product filters traffic up to the application layer, offering robust protection and ensuring that users' systems are safeguarded from potential threats.
Detection of small scale attacks needs improvement: Some users have reported that the software occasionally fails to detect small scale attacks, indicating a need for improvement in this area. This suggests that there is room for enhancing the software's ability to identify and respond to smaller security threats.
Manual configuration modules required: According to some reviewers, manual configuration modules are sometimes necessary with the software, suggesting that it may not be fully automated as expected. This indicates a potential limitation in terms of ease-of-use and efficiency, as users may need to spend extra time on manual configurations instead of relying on seamless automation.
UI performance needs improvement: Several users have mentioned that the user interface becomes laggy while running reports, highlighting the need for improved UI performance. A sluggish UI can hinder productivity and cause frustration among users who rely on smooth and efficient interactions with the software. Enhancements in UI optimization could lead to a more seamless experience for users when generating reports.
Reviews
(1-3 of 3)- Routinely runs assessments and scans our systems to identify missing patches and configurations
- Enables the company to identify users with excessive rights to sensitive data
- Accelerates incident response and investigation with centralized management and advanced analytics
- Improve the process of forwarding details about system events and database security events to the company's Security Operations Center through better integration with other systems
- Continuous API endpoint protection with security norms adjusted to APIs
- Analyzes security events using artificial intelligence
- DDoS protection that shields assets to ensure business continuity with no performance impact and guaranteed uptime
- Visibility and control over all endpoint access
- Detects malicious behavior and use of stolen credentials, with real-time remediation
- Clean analytics saves hundreds of hours in incident response
- It quickly shows us the statistics graphically.
- It gives us a super grainy detail of the attack.
- The board is very friendly.
- It is always constantly updated.
- A heat map of global attacks versus attacks coming our way.
- Attention or support in Spanish language
- Increase the history of the logs
- See the attacks in real time.
- easy-to-read graphics.
- Accurate information in the logs.
- We gain in reputation as our website has never been down.
- We gain credibility as we are protected with the best security tool.
- We gain trust, our clients know that their accounts are well protected.
- Alerting on known vulnerabilities
- Detecting anomalous behavior
- Providing recommendations for remediation
- The UI does not feel intuitive
- The support documentation sometimes is lacking or unclear
- API integration seems a little more complicated than need be.
- Its ability to detect anomalous behavior for possible zero day attacks
- The insights provide helpful tips for remediation of issues
- Allows private clouds to have a secure front end similar to public clouds
- Imperva Attack Analytics has detected multiple vulnerabilities for zero-day attacks before they were exploited. This allowed us to remediate the vulnerabilities without any downtime or financial impact.
- Imperva Attack Analytics has allowed our on-premise infrastructure the same level of security provided as our cloud infrastructure.