Imperva App Protect Features
What are the features of Imperva App Protect?
Management
- Dashboard
- Reports
- Logs
Integration
- API
Top Rated Imperva App Protect Alternatives
(97)
4.6 out of 5
Visit Website
Sponsored
Imperva Cloud Application Security Categories on G2
Filter for Features
Management
Dashboard | An easy to read, often single page, real-time user interface, showing a graphical presentation of the current status and historical trends of an organization's Key Performance Indicators (KPIs) to enable instantaneous and informed decisions to be made at a glance. This feature was mentioned in 47 Imperva App Protect reviews. | 85% (Based on 47 reviews) | |
Reports | Based on 46 Imperva App Protect reviews. Access pre-built and custom reports. | 78% (Based on 46 reviews) | |
Logs | Record of data changes taking place in the software. 45 reviewers of Imperva App Protect have provided feedback on this feature. | 74% (Based on 45 reviews) | |
IT Alerting | Send summary, update, or actionable alerts to administrators to detail activity. | Not enough data | |
Network Capacity | Provide control over traffic. Limits access to suspicious visitors and monitors for traffic spikes to prevent overloads like DDoS attacks. | Not enough data | |
Logging | Information on each incident is stored in databases for user reference and analytics. | Not enough data | |
API / Integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data |
Integration
API | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. This feature was mentioned in 22 Imperva App Protect reviews. | 73% (Based on 22 reviews) |
Administration
Dashboard & Reporting | Reporting and analytics that report on activity and program effectiveness. | Not enough data | |
Alerting | Identifies and alerts administrators of threats, issues, incidents and requests related to website security. | Not enough data |
Risk Analysis
Blacklist and Whitelist | Tracking recipient tagging of domains for blacklists and whitelists. | Not enough data | |
Vulnerability Assessment | Analyzes your existing website and network to outline access points that can be easily compromised. | Not enough data | |
Security Auditing | Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices. | Not enough data |
Threat Protection
Firewall | Protects websites and web applications from a variety of attacks and malware threats. | Not enough data | |
DDoS Protection | Protects against distributed denial of service (DDoS) attacks. | Not enough data | |
Malware Detection | Discovers website and web application malware. | Not enough data | |
Malware Removal | Facilitates the remediation of website and web application malware. | Not enough data |
Functionality
Bot Traffic | Control and filter bot traffic. | Not enough data |
Protection
DNS Protection | Detect and protect against attacks targeting domain name servers. | Not enough data | |
Website Protection | Detect and protect against attacks targeting websites. | Not enough data | |
Infrastructure Protection | Detect and protect against attacks targeting on-premise or locally controlled infrastructure. | Not enough data |
Resolution
Attack Mitigation | Monitors for and rids systems of bots, or other threats suspected of committing unauthorized actions. | Not enough data | |
Network Monitoring | Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point. | Not enough data | |
Security Monitoring | Detects anomalies in functionality, user accessibility, traffic flows, and tampering. | Not enough data | |
Anomoly Detection | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. | Not enough data | |
Resolution Automation | Diagnoses and resolves incidents without the need for human interaction. | Not enough data |