Audience

IT Professionals and Application Developers searching for an Application Security platform

About Imperva RASP

Imperva RASP detects and blocks attacks from inside the application. Using patented LangSec techniques which treat data as code, RASP has full context of potentially malicious payloads before the application completes its processes. The result? Fast and accurate protection with NO signatures and NO learning mode. Imperva RASP is a key component of Imperva’s market-leading, full stack application security solution which brings defense-in-depth to a new level.

Integrations

No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Imperva
Founded: 2002
United States
www.imperva.com/products/runtime-application-self-protection-rasp/

Videos and Screen Captures

You Might Also Like
Our Free Plans just got better! | Auth0 by Okta Icon
Our Free Plans just got better! | Auth0 by Okta

With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
Try free now

Product Details

Platforms Supported
SaaS
Windows
Linux
Training
Documentation
Support
Phone Support

Imperva RASP Frequently Asked Questions

Q: What kinds of users and organization types does Imperva RASP work with?
Q: What languages does Imperva RASP support in their product?
Q: What kind of support options does Imperva RASP offer?
Q: What type of training does Imperva RASP provide?

Imperva RASP Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation