Best Software for 2025 is now live!
Save to My Lists
Claimed
Claimed

Imperva App Protect Features

What are the features of Imperva App Protect?

Management

  • Dashboard
  • Reports
  • Logs

Integration

  • API

Top Rated Imperva App Protect Alternatives

Filter for Features

Management

Dashboard

An easy to read, often single page, real-time user interface, showing a graphical presentation of the current status and historical trends of an organization's Key Performance Indicators (KPIs) to enable instantaneous and informed decisions to be made at a glance. This feature was mentioned in 47 Imperva App Protect reviews.
85%
(Based on 47 reviews)

Reports

Based on 46 Imperva App Protect reviews. Access pre-built and custom reports.
78%
(Based on 46 reviews)

Logs

Record of data changes taking place in the software. 45 reviewers of Imperva App Protect have provided feedback on this feature.
74%
(Based on 45 reviews)

IT Alerting

Send summary, update, or actionable alerts to administrators to detail activity.

Not enough data

Network Capacity

Provide control over traffic. Limits access to suspicious visitors and monitors for traffic spikes to prevent overloads like DDoS attacks.

Not enough data

Logging

Information on each incident is stored in databases for user reference and analytics.

Not enough data

API / Integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data

Integration

API

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. This feature was mentioned in 22 Imperva App Protect reviews.
73%
(Based on 22 reviews)

Administration

Dashboard & Reporting

Reporting and analytics that report on activity and program effectiveness.

Not enough data

Alerting

Identifies and alerts administrators of threats, issues, incidents and requests related to website security.

Not enough data

Risk Analysis

Blacklist and Whitelist

Tracking recipient tagging of domains for blacklists and whitelists.

Not enough data

Vulnerability Assessment

Analyzes your existing website and network to outline access points that can be easily compromised.

Not enough data

Security Auditing

Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices.

Not enough data

Threat Protection

Firewall

Protects websites and web applications from a variety of attacks and malware threats.

Not enough data

DDoS Protection

Protects against distributed denial of service (DDoS) attacks.

Not enough data

Malware Detection

Discovers website and web application malware.

Not enough data

Malware Removal

Facilitates the remediation of website and web application malware.

Not enough data

Functionality

Bot Traffic

Control and filter bot traffic.

Not enough data

Protection

DNS Protection

Detect and protect against attacks targeting domain name servers.

Not enough data

Website Protection

Detect and protect against attacks targeting websites.

Not enough data

Infrastructure Protection

Detect and protect against attacks targeting on-premise or locally controlled infrastructure.

Not enough data

Resolution

Attack Mitigation

Monitors for and rids systems of bots, or other threats suspected of committing unauthorized actions.

Not enough data

Network Monitoring

Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.

Not enough data

Security Monitoring

Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Anomoly Detection

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Resolution Automation

Diagnoses and resolves incidents without the need for human interaction.

Not enough data