Overview

Imperva Company Overview

Imperva is a leading provider of data and application security solutions that protect business-critical information in the cloud and on-premises. Founded in 2002, we have enjoyed a steady history of growth and success, generating $264 million in 2016, with over 5,200 customers and more than 500 partners in 100+ countries worldwide.

We Protect What Matters Most

Cybercriminals constantly change their tactics. But what they are after, and how they ultimately make money, doesn’t change. They are after data. They make their money through extortion, via DDoS and ransomware, and through theft via data breaches. Today, data and applications are the fundamental assets of any enterprise. Data are the intellectual property and apps are what run the business. Imperva has a singular purpose: protect these critical assets from the ever-changing attacks of the cybercrime industry.

Blogs

Concern over Coronavirus Leading to Global Spread of Fake Pharmacy Spam

High levels of concern around the Coronavirus are currently being used to increase the online popularity of spam campaigns designed to spread fake news and drive unsuspecting users to dubious online drug stores. Read More

What Weak Spots Could DDoS Strike to Impact the US Election?

The recent takedown of Dyn DNS services, which caused major websites and services to become unavailable to many millions of users in Europe and North America, showed just how disruptive a distributed denial of service (DDoS) attack can be. Read More

How Account Takeover Botnets Outsmart Traditional Security Controls

Account Takeover (ATO) describes when an online account is accessed and/ or used by someone other than its legitimate owner, usually for malicious purposes. Account Takeover attacks happen when an attacker is trying to get unauthorized access to an account or when the account has already been compromised and the attacker uses the account for a malicious purpose, such as unauthorized access or data theft. Read More

A New Chapter in Bot Management Begins Today

I am excited to share that we have closed the acquisition of Distil Networks, the pioneer and leader in Bot Management. Over the past few weeks, we have been welcoming Distil’s employees into the Imperva family and have started integrating their powerful, analyst-recognized Bot Management solution into our industry-leading Imperva Application Security offering. Watch Now

Imperva to Acquire Distil Networks, the Leader in Bot Management

As an established leader in cybersecurity, Imperva provides our customers the most comprehensive, analyst-recognized application security solution on the market. We are a five-time leader in Gartner’s 2018 Magic Quadrant for Web Application Firewalls (WAF). Read More

9 Recommendations to Prevent Bad Bots on Your Website

Bots are on your website every day so how should you protect yourself? Every site is targeted for different reasons, and usually by different methods, so there is no one-size-fits-all bot defense solution. But there are some proactive steps you can take to start addressing the problem. Read More

Imperva Launches the Cyber Threat Index

Today, we are proud to announce the launch of the Cyber Threat Index, a new online information portal from the minds of our threat researchers at Imperva Research Labs. The current Cyber Threat Index is 776. This is categorized as High and is up 8 percent since December. Read More

Reputation Intelligence At Your Fingertips

American entertainer Will Rogers once famously said, “it takes a lifetime to build a good reputation, but you can lose it in a minute.” Our reputations are valuable commodities that establish rapport and clout among our colleagues, partners, and customers. A good reputation can go a long way in establishing trust, credibility, and confidence in a relationship. Read More

Contracts

Federal

GSA Schedule 70

GS-35F-0119Y
Dec 20, 2011- Dec 19, 2021

ITES-SW

W52P1J-15-D-0008
Mar 03, 2015- Aug 10, 2020
*Additional Option Years Available

State and Local

CMAS

3-12-70-2247E
Aug 28, 2012- Mar 31, 2022

City of Seattle Contract

0000003265
Jul 11, 2014- Dec 19, 2021

Fairfax County IT Hardware, Software, & Services

4400006323
Oct 04, 2015- Dec 04, 2021
*Additional Option Years Available

Kentucky COT - NASPO

MA7581700001211
Jun 21, 2017- Sep 15, 2026

NASPO ValuePoint

AR2472
Oct 14, 2016- Sep 15, 2026

Orange County National IPA Co-Op

MA-017-16010236
Jun 01, 2015- May 31, 2021

Pennsylvania COSTARS-6 IT Software Contract

COSTARS-006-176
Aug 31, 2017- Aug 31, 2021

State of Alaska Cloud Solutions Contract- NASPO

NVP-2018-CLOUD-0002
Aug 07, 2017- Sep 16, 2026

State of Arkansas Cloud Solutions Contract- NASPO

4600040559
Jul 01, 2017- Sep 15, 2026

State of California Cloud Solutions Contract- NASPO

7-17-70-40-05
Sep 15, 2017- Sep 15, 2026

State of Delaware Cloud Solutions Contract- NASPO

GSS177930CLOUD_SOL
Jun 30, 2017- Sep 15, 2026

State of Florida Department of Management Services Cloud Solutions Contract- NASPO

43230000-NASPO-16-ACS
Aug 01, 2017- Sep 30, 2020

State of Hawaii Cloud Solutions Contract - NASPO

17-18
Jul 01, 2017- Sep 15, 2026

State of Kansas Cloud Solutions Contract- NASPO

0000000000000000000043262
Jul 01, 2017- Sep 15, 2026

State of Louisiana Cloud Solutions Contract- NASPO

4400010663
Mar 03, 2017- Sep 15, 2026

State of Minnesota Cloud Solutions Contract- NASPO

128340
Aug 16, 2017- Sep 16, 2026

State of Missouri Cloud Solutions Contract- NASPO

CT170457009
Apr 21, 2018- Sep 10, 2026

State of Nebraska Cloud Solutions Contract- NASPO

78128 O4
Jul 19, 2017- Sep 16, 2026

State of Nevada Cloud Solutions Contract- NASPO

AR2472
Jun 15, 2017- Sep 15, 2026

State of New Mexico Cloud Solutions Contract- NASPO

80-00018-00046AE
May 10, 2018- Sep 16, 2026

State of Oklahoma Cloud Solutions Contract- NASPO

SW1022C
May 17, 2017- Sep 15, 2026

State of Washington Cloud Solutions Contract- NASPO

05116
Jul 17, 2017- Sep 15, 2026

Texas DIR-CPO-4444

DIR-CPO-4444
Jan 28, 2020- Jan 23, 2022
*Additional Option Years Available

Education

Massachusetts Higher Education Consortium (MHEC)

MC15-04
Aug 10, 2019- Jun 30, 2022

VASCUPP

UVA1482501
May 02, 2014- Dec 19, 2021

Events

Resources

Resources

Cyber attacks are inevitable. Data loss is not. Cyber security attacks targeting U.S. Federal and State and Local Governments continue to grow in number and sophistication. The attacks committed during the 2016 election have reaffirmed, now more than ever, how important it is to protect the data in ...

This publication has been developed by NIST to further its statutory responsibilities under the 3 Federal Information Security Modernization Act (FISMA), 44 U.S.C. § 3551 et seq., Public Law 4 (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, 5 inc...

This eBook goes beyond the guidance from Open Web Application SEcurity Project (OWASP) to provide insight into ways that security teams can use best-of-breed solutions to protect against recently identified OWASP Top 10 threats. These solutions provide layers of defense that work together to signifi...

Whitepaper

To make cloud transformations as efficient and successful as possible, companies must remain secure and compliant throughout. This Executive Brief paper explains that there are three strategic best practices that are key to ensure a secure and compliant cloud migrations, which every enterprise IT an...

Today, more than ever, federal agencies need to protect federal information and information systems against unauthorized access and improper usage. According to the Office of Management and Budget’s annual report1 on implementation of FISMA, cyber-attacks against federal agencies increased 14...

Web application firewalls have become an essential component of the modern organization’s security infrastructure, providing scalable high-fidelity protection of business-critical web applications from a broad spectrum of cyber threats. As with any must-have enterprise security solution, there ...

Imperva Camouflage offers an industry recognized best practice methodology that includes five core steps and a logical flow from the discovery of all sensitive information - through to the configuration of the masking engine with appropriate data masking techniques to protect that sensitive informat...