Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Imperva API Security Alternatives

Imperva API Security Reviews & Product Details

Verified User in Computer & Network Security
CC
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Imperva API Security?

Imperva API Security helps build a positive security model without an OAS file by learning capability. Besides, it can understand which API endpoint transfers sensitive data and provide security for enforcement decisions. Review collected by and hosted on G2.com.

What do you dislike about Imperva API Security?

It's cloud-based and commonly will be implemented by Imperva, but service support seems not good. Response time and resolution time are slow. Moreover, the related document is little Review collected by and hosted on G2.com.

What problems is Imperva API Security solving and how is that benefiting you?

Using APIs is everywhere, especially in digital transformation when application development, mobility, and IoT connection are motivated. Hence, API security is essential. With Imperva API Security, we can have a powerful solution providing analytics and visibility for discovering API endpoints having sensitive data. From there, we can enforce security policies to protect APIs. The Imperva solution also includes management and reporting capabilities helping the organizations know about security events intuitively. Review collected by and hosted on G2.com.

Imperva API Security Overview

What is Imperva API Security?

In today’s digital landscape, APIs are essential for connecting services and driving business operations. However, with their growing adoption comes an increased attack surface, exposing organizations to risks such as data breaches, malicious traffic, and compliance issues. Imperva API Security is designed to protect the full spectrum of your APIs—public, private, and shadow—while providing unmatched visibility and risk assessment across all environments. One of the key features of Imperva API Security is its automatic discovery and classification of all APIs, including those that may be undocumented or unintentionally exposed, known as shadow APIs. This ensures that your organization has a complete understanding of its API environment, which is critical for identifying vulnerabilities and effectively managing risk. By continuously monitoring API traffic, Imperva can detect anomalies, suspicious behavior, and potential threats in real-time, allowing security teams to take action before attacks cause any damage. Imperva also provides protection against emerging risks, leveraging AI and machine learning to identify evolving attack patterns. Whether your APIs are deployed on-premises, in the cloud, or in hybrid environments, Imperva offers seamless security regardless of the deployment model, ensuring that no API is left unprotected. This includes safeguarding against threats such as API abuse, credential stuffing, and unauthorized data access, all of which are becoming increasingly common. With Imperva API Security, organizations can confidently safeguard sensitive data and maintain regulatory compliance by implementing robust, proactive security measures. It provides peace of mind, knowing that every API, from legacy systems to newly deployed microservices, is fully secured and monitored. By securing your API ecosystem with Imperva, you can reduce your risk exposure, enhance operational efficiency, and focus on innovation without worrying about potential threats. Trust Imperva to deliver comprehensive API security, ensuring your business remains protected in an ever-evolving threat landscape.

Imperva API Security Details
Languages Supported
English
Show LessShow More
Product Description

APIs play a critical role in accelerating innovation in the digital economy, but they can also expose a wider attack surface for cybercriminals to exploit. Imperva API Security protects your APIs, introducing peace of mind on your end while detecting and blocking exploits of vulnerabilities on our end.


Seller Details
Seller
Imperva
Year Founded
2002
HQ Location
Redwood Shores, CA
Twitter
@Imperva
85,816 Twitter followers
LinkedIn® Page
www.linkedin.com
1,697 employees on LinkedIn®
Ownership
NASDAQ: IMPV
Phone
866-572-4810
Total Revenue (USD mm)
$264

AD
Overview Provided by:

Recent Imperva API Security Reviews

Harsha Vardhan  V.
HV
Harsha Vardhan V.Mid-Market (51-1000 emp.)
5.0 out of 5
"Best returns for your security investment."
Ease of deployment, User friendly dashboard and best security and compilance, ease of integration and i use is daily so its preety good.
Verified User
C
Verified UserEnterprise (> 1000 emp.)
4.0 out of 5
"Good API Security solution in the market"
Imperva API Security helps build a positive security model without an OAS file by learning capability. Besides, it can understand which API endpoin...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Imperva API Security Media

Imperva API Security Demo - Discovery APIs
Discovery APIs - Dashboard
Imperva API Security Demo - Inventory
Inventory
Imperva API Security Demo - API Group Policies
API Group Policies
Answer a few questions to help the Imperva API Security community
Have you used Imperva API Security before?
Yes

1 out of 2 Total Reviews for Imperva API Security

4.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.

Imperva API Security Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Harsha Vardhan  V.
HV
Technical Consultant - PreSales
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about Imperva API Security?

Ease of deployment, User friendly dashboard and best security and compilance, ease of integration and i use is daily so its preety good. Review collected by and hosted on G2.com.

What do you dislike about Imperva API Security?

Solution is expensive and the security events report can be emailed not downloaded Review collected by and hosted on G2.com.

What problems is Imperva API Security solving and how is that benefiting you?

Before Imperva we were facing issues with API traffic visibility and now with Imperva we have covered both visibility and API Security Review collected by and hosted on G2.com.

There are not enough reviews of Imperva API Security for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Postman Logo
Postman
4.6
(1,220)
Postman enables teams to efficiently collaborate at every stage of the API lifecycle while prioritizing quality, performance, and security.
2
Cloudflare Application Security and Performance Logo
Cloudflare Application Security and Performance
4.5
(530)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
3
Orca Security Logo
Orca Security
4.6
(209)
Get workload-level visibility into AWS, Azure, and GCP without the operational costs of agents. You could buy three tools instead… but why? Orca replaces legacy vulnerability assessment tools, CSPM, and CWPP. Deploys in minutes, not months.
4
Intruder Logo
Intruder
4.8
(162)
Intruder is a proactive security monitoring platform for internet-facing systems.
5
Wallarm API Security Platform Logo
Wallarm API Security Platform
4.7
(95)
Wallarm is an AI-powered application security solution for the teams launching new modular software services or upgrading their existing web applications to a new stack. Wallarm includes an adaptive Next Gen WAF, attack sandboxing, vulnerability scanner and development time testing modules.
6
Beagle Security Logo
Beagle Security
4.7
(86)
Beagle Security is a web application penetration testing tool that helps you to identify vulnerabilities on your web application before hackers exploit them.
7
Salesforce Shield Logo
Salesforce Shield
4.5
(82)
Salesforce Security and Privacy offers a powerful set of tools for any customer who needs an extra level of control to meet internal or regulatory compliance requirements.
8
StackHawk Logo
StackHawk
4.6
(67)
StackHawk makes it simple for developers to find, triage, and fix application security bugs. Scan your application for AppSec bugs in the code your team wrote, triage and fix with provided documentation, and automate in your pipeline to prevent future bugs from hitting prod.
9
Cortex Cloud Logo
Cortex Cloud
4.1
(60)
Cloud to SOC security to protect cloud applications, data, and AI models across multicloud and hybrid environments by leveraging unified data and full-lifecycle context for real-time detection and response.
10
Invicti (formerly Netsparker) Logo
Invicti (formerly Netsparker)
4.6
(59)
Invicti (formerly Netsparker) is an automatic and easy-to-use web application security scanner to automatically find security flaws in websites, web applications and web services.
Show More