Skip to main content
TrustRadius
Imperva DDoS Protection

Imperva DDoS Protection

Overview

What is Imperva DDoS Protection?

Imperva provides DDoS Protection services for enterprise websites, networks, and domain name servers.

Read more
Recent Reviews

TrustRadius Insights

Ease of Use: Reviewers find Imperva DDoS Protection's GUI easy to use, with clear and descriptive labels. Some reviewers also appreciate …
Continue reading
TrustRadius

Leaving a review helps other professionals like you evaluate Distributed Denial of Service (DDoS) Protection Solutions

Be the first one in your network to review Imperva DDoS Protection, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Imperva DDoS Protection?

Imperva provides DDoS Protection services for enterprise websites, networks, and domain name servers.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

7 people also want pricing

Alternatives Pricing

What is Cloudflare?

Cloudflare, from the company of the same name in San Francisco, provides DDoS and bot mitigation security for business domains, as well as a content delivery network (CDN) and web application firewall (WAF).

What is IBM Cloud Internet Services?

IBM Cloud Internet Services is a set of edge network services for securing internet-facing applications from DDoS attacks, data theft, and bot attacks, as well as optimizing their web apps or ensuring global responsiveness and the ongoing availability of their internet-facing applications.

Return to navigation

Product Details

What is Imperva DDoS Protection?

Imperva provides DDoS Protection services for enterprise websites, networks, and domain name servers.


Scope of Protection


Imperva offers DDoS protection services that differentiate themselves from other products in the industry by providing comprehensive protection at multiple layers of the OSI model. Their product safeguards layer 3 (network layer) by leveraging routing techniques to identify and mitigate volumetric attacks, as well as layer 7 (application layer) by inspecting application traffic for malicious behavior and patterns.


Imperva's DDoS protection services are compatible with various internet protocols, including HTTP, HTTPS, DNS, and IP. This compatibility allows organizations to secure their network and application infrastructure while maintaining compatibility with the protocols used in their environment. By offering multi-layered protection and protocol compatibility, Imperva's DDoS protection services provide organizations with a robust defense against DDoS attacks.

Imperva DDoS Protection Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Ease of Use: Reviewers find Imperva DDoS Protection's GUI easy to use, with clear and descriptive labels. Some reviewers also appreciate the availability of documentation which makes it easier for them to navigate through the software.

Effective DDoS protection: Many users have reported that Imperva DDoS Protection is effective in detecting and mitigating DDoS attacks. Several reviewers noted that they have experienced zero issues with DDoS attacks since implementing this software, making it a reliable security solution for financial organizations constantly targeted by such attacks.

Strong Security Features: Users highly praise Imperva's strong security features, including input sanitization mechanisms and Advanced Bot Protections along with WAF. Reviewers felt that the software was an unmatched security solution and highly recommended it based on their experience using it.

Challenging Audit Logging: Some users have found configuring audit logging to SIEM challenging. This has raised concerns among some customers as they need to make sure that their systems are properly configured and secure.

Data Leakage Risk: The insecure nature of the audit logging feature has made data leakage possible, according to some reviewers. This is a significant concern as it could lead to sensitive information being exposed.

Not Suitable for All Business Types: Some users have stated that the solution is not suitable for every business type. This may limit the software's utility in certain industries or organizations with specific needs.

Based on user reviews, we have identified three common recommendations for this solution:

  1. Conduct a competitive evaluation before making a decision: Users have suggested that it is important to thoroughly evaluate competitors before finalizing the choice of this solution. This recommendation emphasizes the need to analyze alternative options in order to make an informed decision.

  2. Great support and mitigation of attacks: Many users have praised the solution for its excellent support and effectiveness in mitigating attacks. The reviews highlight the prompt assistance and expertise provided by the support team in resolving issues and tackling security threats.

  3. Suitable for securing networks and infrastructure: Users commonly recommend this solution to those looking to enhance the security of their networks and infrastructure. The reviews indicate that the solution offers robust features and capabilities that effectively safeguard digital assets, providing peace of mind to users seeking to protect their systems from potential threats.

Sorry, no reviews are available for this product yet

Return to navigation