Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Imperva API Security Alternatives

2 Imperva API Security Reviews

4.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
2 Imperva API Security Reviews
4.5 out of 5
2 Imperva API Security Reviews
4.5 out of 5

Imperva API Security Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Harsha Vardhan  V.
HV
Technical Consultant - PreSales
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about Imperva API Security?

Ease of deployment, User friendly dashboard and best security and compilance, ease of integration and i use is daily so its preety good. Review collected by and hosted on G2.com.

What do you dislike about Imperva API Security?

Solution is expensive and the security events report can be emailed not downloaded Review collected by and hosted on G2.com.

Verified User in Computer & Network Security
CC
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Imperva API Security?

Imperva API Security helps build a positive security model without an OAS file by learning capability. Besides, it can understand which API endpoint transfers sensitive data and provide security for enforcement decisions. Review collected by and hosted on G2.com.

What do you dislike about Imperva API Security?

It's cloud-based and commonly will be implemented by Imperva, but service support seems not good. Response time and resolution time are slow. Moreover, the related document is little Review collected by and hosted on G2.com.

There are not enough reviews of Imperva API Security for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Postman Logo
Postman
4.6
(1,220)
Postman enables teams to efficiently collaborate at every stage of the API lifecycle while prioritizing quality, performance, and security.
2
Cloudflare Application Security and Performance Logo
Cloudflare Application Security and Performance
4.5
(530)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
3
Orca Security Logo
Orca Security
4.6
(209)
Get workload-level visibility into AWS, Azure, and GCP without the operational costs of agents. You could buy three tools instead… but why? Orca replaces legacy vulnerability assessment tools, CSPM, and CWPP. Deploys in minutes, not months.
4
Intruder Logo
Intruder
4.8
(162)
Intruder is a proactive security monitoring platform for internet-facing systems.
5
Wallarm API Security Platform Logo
Wallarm API Security Platform
4.7
(95)
Wallarm is an AI-powered application security solution for the teams launching new modular software services or upgrading their existing web applications to a new stack. Wallarm includes an adaptive Next Gen WAF, attack sandboxing, vulnerability scanner and development time testing modules.
6
Beagle Security Logo
Beagle Security
4.7
(86)
Beagle Security is a web application penetration testing tool that helps you to identify vulnerabilities on your web application before hackers exploit them.
7
Salesforce Shield Logo
Salesforce Shield
4.5
(82)
Salesforce Security and Privacy offers a powerful set of tools for any customer who needs an extra level of control to meet internal or regulatory compliance requirements.
8
StackHawk Logo
StackHawk
4.6
(67)
StackHawk makes it simple for developers to find, triage, and fix application security bugs. Scan your application for AppSec bugs in the code your team wrote, triage and fix with provided documentation, and automate in your pipeline to prevent future bugs from hitting prod.
9
Cortex Cloud Logo
Cortex Cloud
4.1
(60)
Cloud to SOC security to protect cloud applications, data, and AI models across multicloud and hybrid environments by leveraging unified data and full-lifecycle context for real-time detection and response.
10
Invicti (formerly Netsparker) Logo
Invicti (formerly Netsparker)
4.6
(59)
Invicti (formerly Netsparker) is an automatic and easy-to-use web application security scanner to automatically find security flaws in websites, web applications and web services.
Show More