Overview
What is Imperva DDoS Protection?
Imperva provides DDoS Protection services for enterprise websites, networks, and domain name servers.
Pricing
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
7 people also want pricing
Alternatives Pricing
Product Details
- About
- Tech Details
What is Imperva DDoS Protection?
Imperva provides DDoS Protection services for enterprise websites, networks, and domain name servers.
Scope of Protection
Imperva offers DDoS protection services that differentiate themselves from other products in the industry by providing comprehensive protection at multiple layers of the OSI model. Their product safeguards layer 3 (network layer) by leveraging routing techniques to identify and mitigate volumetric attacks, as well as layer 7 (application layer) by inspecting application traffic for malicious behavior and patterns.
Imperva's DDoS protection services are compatible with various internet protocols, including HTTP, HTTPS, DNS, and IP. This compatibility allows organizations to secure their network and application infrastructure while maintaining compatibility with the protocols used in their environment. By offering multi-layered protection and protocol compatibility, Imperva's DDoS protection services provide organizations with a robust defense against DDoS attacks.
Imperva DDoS Protection Technical Details
Operating Systems | Unspecified |
---|---|
Mobile Application | No |
Comparisons
Compare with
Reviews
Community Insights
- Pros
- Cons
- Recommendations
Ease of Use: Reviewers find Imperva DDoS Protection's GUI easy to use, with clear and descriptive labels. Some reviewers also appreciate the availability of documentation which makes it easier for them to navigate through the software.
Effective DDoS protection: Many users have reported that Imperva DDoS Protection is effective in detecting and mitigating DDoS attacks. Several reviewers noted that they have experienced zero issues with DDoS attacks since implementing this software, making it a reliable security solution for financial organizations constantly targeted by such attacks.
Strong Security Features: Users highly praise Imperva's strong security features, including input sanitization mechanisms and Advanced Bot Protections along with WAF. Reviewers felt that the software was an unmatched security solution and highly recommended it based on their experience using it.
Challenging Audit Logging: Some users have found configuring audit logging to SIEM challenging. This has raised concerns among some customers as they need to make sure that their systems are properly configured and secure.
Data Leakage Risk: The insecure nature of the audit logging feature has made data leakage possible, according to some reviewers. This is a significant concern as it could lead to sensitive information being exposed.
Not Suitable for All Business Types: Some users have stated that the solution is not suitable for every business type. This may limit the software's utility in certain industries or organizations with specific needs.
Based on user reviews, we have identified three common recommendations for this solution:
-
Conduct a competitive evaluation before making a decision: Users have suggested that it is important to thoroughly evaluate competitors before finalizing the choice of this solution. This recommendation emphasizes the need to analyze alternative options in order to make an informed decision.
-
Great support and mitigation of attacks: Many users have praised the solution for its excellent support and effectiveness in mitigating attacks. The reviews highlight the prompt assistance and expertise provided by the support team in resolving issues and tackling security threats.
-
Suitable for securing networks and infrastructure: Users commonly recommend this solution to those looking to enhance the security of their networks and infrastructure. The reviews indicate that the solution offers robust features and capabilities that effectively safeguard digital assets, providing peace of mind to users seeking to protect their systems from potential threats.