

Find out what your peers are saying about Cloudflare, Radware, NETSCOUT and others in Distributed Denial-of-Service (DDoS) Protection.
They know how much money they are losing while the system is down, so by increasing the possibility of not having a down website or web application, return on investment can be calculated easily.
My thoughts on the pricing, setup cost, and licensing of the Imperva SecureSphere Database Security are that it could be more competitive.
I would rate the technical support of Imperva DDoS as ten.
Local vendors provide on-ground support, and if issues cannot be resolved, a support ticket is raised to the OEM via a portal.
Regarding customer support, I would like to see improvements in response time.
99% of customers are using the cloud version of Imperva DDoS protection, so they just purchase the new license and scale as needed.
The scalability of the Imperva SecureSphere Database Security in accommodating the organization's growth and database security needs is excellent.
The solution works well for large organizations and enterprise levels if appropriately sized during the setup.
The stability of Imperva DDoS is very good, as it seems they have a lot of servers around the world.
It is important to manage it correctly by performing health checks with the vendor.
I rate the stability of Imperva SecureSphere Database Security as nine because there are ongoing integration processes between Imperva and Thales.
Maybe Imperva DDoS could use endpoints to get information about the attacks before they commence from the endpoint level or establish cooperation with endpoint vendors to share this information.
We cannot be competitive by price alone, though in terms of quality, Imperva SecureSphere Database Security is the best compared to Russian import products and building products such as Garda, which attempt to copy Imperva's data activity monitoring and database firewall functionality.
The archiving functionalities should be enhanced to allow easy conversion of archived logs into CSV or Excel formats for data analysis.
I would rate the pricing of Imperva DDoS as five, where one is very cheap and ten is very expensive.
The price is high, but it is not as high as competitors like IBM, Guardian, and Oracle.
I have utilized Imperva's Intelligent Traffic Filtering feature. This feature helps me understand how the attack is progressing and what is happening inside the requests to our website.
Imperva SecureSphere Database Security provides one of the best solutions to analyze data, maintain GDPR compliance, and help investigate any incidents.
The real-time alerts and remediation actions available in Imperva SecureSphere Database Security have helped me promptly address security incidents.
If something malicious occurs, I can set a policy to block it, review the action, and decide whether to release it if it's found not to be malicious.
| Product | Market Share (%) |
|---|---|
| Imperva Application Security Platform | 7.8% |
| Cloudflare | 16.7% |
| Arbor DDoS | 9.8% |
| Other | 65.7% |
| Product | Market Share (%) |
|---|---|
| Imperva Data Security Fabric | 25.0% |
| IBM Security Guardium Data Protection | 26.4% |
| Oracle Audit Vault | 12.1% |
| Other | 36.5% |

| Company Size | Count |
|---|---|
| Small Business | 83 |
| Midsize Enterprise | 25 |
| Large Enterprise | 61 |
| Company Size | Count |
|---|---|
| Small Business | 26 |
| Midsize Enterprise | 9 |
| Large Enterprise | 32 |
Imperva Application Security Platform delivers comprehensive and continuous web threat protection. Renowned for its ease of use, it shields web applications and databases from various cyber threats while integrating seamlessly with cloud and on-premises environments.
Imperva Application Security Platform protects web environments by offering advanced security measures against threats like DDoS attacks, SQL injections, and cross-site scripting. As a robust web application firewall, it provides extensive monitoring and bot management capabilities. The platform integrates content delivery networks for enhanced performance and scalability, while real-time traffic analysis ensures consistent protection. Despite its strengths, improvements can be made in policy management and customization options. Users seek better integration with third-party tools and more competitive pricing models. The inclusion of AI for enhanced analytics is also anticipated.
What are the key features of Imperva Application Security Platform?Imperva Application Security Platform is implemented in industries needing strong database and application protection. Companies use it to enforce geolocation restrictions and manage bots, benefiting sectors like finance and e-commerce where data security and threat monitoring are critical. Its ability to protect and ensure data accessibility makes it integral to business operations prioritizing cyber resilience.
Imperva Data Security Fabric provides cutting-edge database security, featuring capabilities like activity monitoring, web application firewalls, and real-time alerting for comprehensive data protection.
Imperva Data Security Fabric focuses on securing databases through advanced monitoring, logging, and user behavior analysis. With features designed for ease of configuration, it effectively blocks unauthorized access and maintains detailed audit logs. Integration with other systems and automated reporting enhance vulnerability assessments and compliance efforts. Imperva's data discovery, classification, and masking capabilities strengthen security by managing user rights and uncovering vulnerabilities, making it ideal for protecting sensitive data and supporting forensic and compliance needs.
What are the key features of Imperva Data Security Fabric?Imperva Data Security Fabric is widely used across industries like finance and government, focusing on database security, activity monitoring, and user behavior analysis. It is essential for detecting unauthorized access and preventing data breaches while ensuring compliance. Financial institutions and government agencies leverage its capabilities to maintain data integrity and monitor database activities, implementing firewalls and vulnerability assessments that secure on-premises and cloud environments.
We monitor all Distributed Denial-of-Service (DDoS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.