Overview

Imperva Company Overview

Imperva is a leading provider of data and application security solutions that protect business-critical information in the cloud and on-premises. Founded in 2002, we have enjoyed a steady history of growth and success, generating $264 million in 2016, with over 5,200 customers and more than 500 partners in 100+ countries worldwide.

We Protect What Matters Most

Cybercriminals constantly change their tactics. But what they are after, and how they ultimately make money, doesn’t change. They are after data. They make their money through extortion, via DDoS and ransomware, and through theft via data breaches. Today, data and applications are the fundamental assets of any enterprise. Data are the intellectual property and apps are what run the business. Imperva has a singular purpose: protect these critical assets from the ever-changing attacks of the cybercrime industry.

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


Federal Contracts

ITES-SW

ITES-SW Contract # W52P1J-15-D-0008 Term: March 2015 - March 2020


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

eVA- Virginia's Total e-Procurement Solution

Vendor ID #: E51768

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

Orange County National IPA Co-Op

Through May 31, 2019 (with 2 option years)

VASCUPP

Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021

VITA Contract

Term: through March 31, 2019


Events

Upcoming Events

October 25, 2018 at 11:00 AM ET

Archived Events

Resources

SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? AND InvisibleBit = 0 ORDER BY FeaturedBit DESC, Type ASC

Datasheet

Imperva is a leading provider of cyber security solutions that protect business critical data and applications in the cloud and on-premises.

Guide

This guide focuses on application and data security. It shows you how to migrate your security policies from on-premises to the cloud, depending on the deployment you select. It delineates the various options available to you and helps you identify a path that makes the most sense for your site-spec...

Industry Study

The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Imperva SecureSphere on their organizations.

In November 2017, Imperva commissioned Forrester Consulting to conduct a study of IT professionals to explore current security and compliance challenges faced by companies who are evolving their database ecosystems through cloud and big data initiatives. The objective was to understand how companies...

Resources

Cyber attacks are inevitable. Data loss is not. Cyber security attacks targeting U.S. Federal and State and Local Governments continue to grow in number and sophistication. The attacks committed during the 2016 election have reaffirmed, now more than ever, how important it is to protect the data in ...

This eBook goes beyond the guidance from Open Web Application SEcurity Project (OWASP) to provide insight into ways that security teams can use best-of-breed solutions to protect against recently identified OWASP Top 10 threats. These solutions provide layers of defense that work together to signifi...

Whitepaper

Web application firewalls have become an essential component of the modern organization’s security infrastructure, providing scalable high-fidelity protection of business-critical web applications from a broad spectrum of cyber threats. As with any must-have enterprise security solution, there ...

Imperva Camouflage offers an industry recognized best practice methodology that includes five core steps and a logical flow from the discovery of all sensitive information - through to the configuration of the masking engine with appropriate data masking techniques to protect that sensitive informat...