Overview

Imperva® is a leading cybersecurity company that delivers best-in-class solutions to protect data and applications – wherever they reside – on-premises, in the cloud, and across hybrid environments. The company’s Incapsula, SecureSphere, and CounterBreach product lines help organizations protect websites, applications, APIs, and databases from cyberattacks while ensuring compliance. Imperva innovates using data, analytics, and insights from our experts and our community to deliver simple, effective and enduring solutions that protect our customers from cybercriminals.

Imperva protects you from cybercriminals – be they external actors or malicious insiders. Imperva protects cloud applications, websites and applications, files, SharePoint systems, databases and big data repositories from both theft and ever-evolving extortion attacks like DDoS and ransomware. Our technology provides granular visibility into how users access data and applications, and uses sophisticated user tracking and classification to detect and block cyberattacks, botnets, unauthorized users and malicious insiders. The Imperva Defense Center research team – comprised of some of the world’s leading experts in data and application security – roots out new attack methods and stops them before they reach you. So whether your critical digital assets are in the cloud or on-premises, in an application or in a database, you can be confident that Imperva will protect them from both the profit-driven cybercrime industry and nation-state actors.

Learn more at www.imperva.com, our blog, or Twitter.

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


Federal Contracts

ITES-SW

Vendor(s): CoN Certified Term: March 2015 - March 2020


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

eVA- Virginia's Total e-Procurement Solution

Vendor ID #: E51768

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

Orange County National IPA Co-Op

Through May 31, 2020 (with 2 option years)

VASCUPP

Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021

VITA Contract

Term: through March 31, 2018


Events

Archived Events

Resources

Datasheet

Imperva is a leading provider of cyber security solutions that protect business critical data and applications in the cloud and on-premises.

Guide

This guide focuses on application and data security. It shows you how to migrate your security policies from on-premises to the cloud, depending on the deployment you select. It delineates the various options available to you and helps you identify a path that makes the most sense for your site-spec...

Industry Study

The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Imperva SecureSphere on their organizations.

In November 2017, Imperva commissioned Forrester Consulting to conduct a study of IT professionals to explore current security and compliance challenges faced by companies who are evolving their database ecosystems through cloud and big data initiatives. The objective was to understand how companies...

Resources

This eBook goes beyond the guidance from Open Web Application SEcurity Project (OWASP) to provide insight into ways that security teams can use best-of-breed solutions to protect against recently identified OWASP Top 10 threats. These solutions provide layers of defense that work together to signifi...

Whitepaper

Web application firewalls have become an essential component of the modern organization’s security infrastructure, providing scalable high-fidelity protection of business-critical web applications from a broad spectrum of cyber threats. As with any must-have enterprise security solution, there ...

Imperva Camouflage offers an industry recognized best practice methodology that includes five core steps and a logical flow from the discovery of all sensitive information - through to the configuration of the masking engine with appropriate data masking techniques to protect that sensitive informat...