Want to see who topped the 2019 Best Software Awards?

Imperva Incapsula

4.1
(74 reviews)
Optimized for quick response

Incapsula is a cloud-based security and acceleration service that makes websites safer, faster, and more reliable.

Work for Imperva Incapsula?

Learning about Imperva Incapsula?

We can help you find the solution that fits you best.

Imperva Incapsula Features

Content

Static Content Caching

Caching of static content at distributed PoPs for faster load times.

86%
(Based on 43 reviews)

Dynamic Content Routing

Routing of dynamic content for faster load time of dynamic pages.

79%
(Based on 38 reviews)

Cache purging

The ability to purge the cache from different edge location PoPs.

81%
(Based on 42 reviews)

Administration

Content Delivery

Caching of static or dynamic content at distributed PoPs for faster load times.

Not enough data available

Dashboard & Reporting

Reporting and analytics that report on activity and program effectiveness.

Not enough data available

Alerting

Identifies and alerts administrators of threats, issues, incidents and requests related to website security.

Not enough data available

Analysis

Logging and Reporting

Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.

Not enough data available

Issue Tracking

Track issues and manage resolutions.

Not enough data available

Security Monitoring

Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data available

Reporting and Analytics

Reporting and Analytics

Not enough data available

Management

IT Alerting

Send summary, update, or actionable alerts to administrators to detail activity.

Not enough data available

Network Capacity

Provide control over traffic. Limits access to suspicious visitors and monitors for traffic spikes to prevent overloads like DDoS attacks.

Not enough data available

Logging

Information on each incident is stored in databases for user reference and analytics.

Not enough data available

API / Integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data available

Security

SSL

Shared SSL certificate.

87%
(Based on 39 reviews)

Custom SSL

SSL certificate that you provide to the CDN software, or is provided for you and is not shared.

83%
(Based on 32 reviews)

Risk Analysis

Blacklist and Whitelist

Tracking recipient tagging of domains for blacklists and whitelists.

Not enough data available

Vulnerability Assessment

Analyzes your existing website and network to outline access points that can be easily compromised.

Not enough data available

Security Auditing

Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices.

Not enough data available

Controls

Application-Layer Controls

Gives user configurable rules to control requests, protocols and policies.

Not enough data available

Traffic Controls

Limits access to suspicious visitors and monitors for traffic spikes to prevent overloads like DDoS attacks.

Not enough data available

Network Controls

Lets users provisionnetworks, deliver content, balance loads, and manage traffic.

Not enough data available

Protection

DNS Protection

Detect and protect against attacks targeting domain name servers.

Not enough data available

Website Protection

Detect and protect against attacks targeting websites.

Not enough data available

Infrastructure Protection

Detect and protect against attacks targeting on-premise or locally controlled infrastructure.

Not enough data available

Management

Dashboard

An easy to read, often single page, real-time user interface, showing a graphical presentation of the current status and historical trends of an organization's Key Performance Indicators (KPIs) to enable instantaneous and informed decisions to be made at a glance.

87%
(Based on 46 reviews)

Reports

Access pre-built and custom reports.

80%
(Based on 45 reviews)

Logs

Record of data changes taking place in the software.

76%
(Based on 44 reviews)

Threat Protection

Firewall

Protects websites and web applications from a variety of attacks and malware threats.

Not enough data available

DDoS Protection

Protects against distributed denial of service (DDoS) attacks.

Not enough data available

Malware Detection

Discovers website and web application malware.

Not enough data available

Malware Removal

Facilitates the remediation of website and web application malware.

Not enough data available

Functionality

API / Integrations

API / Integrations

Not enough data available

Extensibility

Provides the ability to extend the platform to include additional features and functionalities

Not enough data available

Performance and Reliability

Performance and Reliability

Not enough data available

Resolution

Attack Mitigation

Monitors for and rids systems of bots, or other threats suspected of committing unauthorized actions.

Not enough data available

Network Monitoring

Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.

Not enough data available

Security Monitoring

Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data available

Anomoly Detection

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.

Not enough data available

Integration

API

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

74%
(Based on 21 reviews)

CMS Integration

Standard integrations for common CMS tools.

76%
(Based on 16 reviews)