BlueCross BLueShield
General electric

Global threat visibility is a key security advantage

Imperva combines threat research from Imperva security researchers, threat intelligence from a variety of partners, and live data crowdsourced from customers around the world.


Block bad bots and automated attacks

Accurately distinguish incoming traffic between human and bot traffic, identify “good” and “bad” bots, and classify traffic by browser type with Imperva Bot Protection.

Protect against credential compromise

Prevent account takeover attacks such as unauthorized access, brute force login attempts, and use of compromised user names and passwords with Imperva Account Protection.

Block emerging threats

Automatically block emerging threats based on continual threat intelligence and signature updates.

How Imperva Threat Intelligence Protects Your Data

Attack Analytics unleashes global insights

Block “known bad” traffic

Imperva Threat Intelligence will trace where requests originate, who creates them and what their risks are, so you can identify and discard threats coming from known bad actors before they reach your system.

Precise DDoS mitigation

Identify good bots, bad bots and humans

Know who you’re dealing with. More than 60 percent of internet traffic is generated by bots, and bad bots are responsible for a ton of malicious activity. Imperva Threat Intelligence can discern who’s a bad bot, a good bot or a human and makes sure the bad bots get stopped and the good humans and bots get through.

Stop account takeover

Stop account takeover

Criminals try to gain unauthorized access to customer accounts to transfer money, execute fraudulent transactions, and bring down your reputation. Imperva Account Protection detects credential stuffing based on stolen credentials and brute force techniques. It also detects risky devices based on device finger printing and suspicious login behavior.

Flexible policies

Leverage global threat visibility

We’re stronger together. Imperva harnesses the collective insight of Imperva deployments around the world to crowdsource threat intelligence. Imperva Threat Intelligence uses patent-pending algorithms to translate live-attack data, gather it into attack patterns, policies, and reputation data and deliver it to all subscribers.

Consistenly updated signature pool

Automatic signatures and policies updates

Threat intelligence is useless if it’s not put into action. Imperva’s emergency feed automatically updates attack signatures and provides predefined security policies to automatically block emerging threats.

Related Content

Key Resources

Protect Against OWASP Top 10 Risks

Protect Against OWASP Top 10 Risks

Read ebook ›
Why Care About Data-Centric Security?

How Reputation Intelligence Improves Application Security

Read blog ›