34 Integrations with Imperva WAF

View a list of Imperva WAF integrations and software that integrates with Imperva WAF below. Compare the best Imperva WAF integrations as well as features, ratings, user reviews, and pricing of software that integrates with Imperva WAF. Here are the current Imperva WAF integrations in 2025:

  • 1
    Teradata VantageCloud
    Teradata VantageCloud: The complete cloud analytics and data platform for AI. Teradata VantageCloud is an enterprise-grade, cloud-native data and analytics platform that unifies data management, advanced analytics, and AI/ML capabilities in a single environment. Designed for scalability and flexibility, VantageCloud supports multi-cloud and hybrid deployments, enabling organizations to manage structured and semi-structured data across AWS, Azure, Google Cloud, and on-premises systems. It offers full ANSI SQL support, integrates with open-source tools like Python and R, and provides built-in governance for secure, trusted AI. VantageCloud empowers users to run complex queries, build data pipelines, and operationalize machine learning models—all while maintaining interoperability with modern data ecosystems.
    View Software
    Visit Website
  • 2
    Amazon Web Services (AWS)
    Amazon Web Services (AWS) is the world’s most comprehensive cloud platform, trusted by millions of customers across industries. From startups to global enterprises and government agencies, AWS provides on-demand solutions for compute, storage, networking, AI, analytics, and more. The platform empowers organizations to innovate faster, reduce costs, and scale globally with unmatched flexibility and reliability. With services like Amazon EC2 for compute, Amazon S3 for storage, SageMaker for AI/ML, and CloudFront for content delivery, AWS covers nearly every business and technical need. Its global infrastructure spans 120 availability zones across 38 regions, ensuring resilience, compliance, and security. Backed by the largest community of customers, partners, and developers, AWS continues to lead the cloud industry in innovation and operational expertise.
    Leader badge
    View Software
    Visit Website
  • 3
    Microsoft 365

    Microsoft 365

    Microsoft

    Microsoft 365 for Individuals is a complete productivity suite that combines powerful applications, secure cloud storage, and AI-driven tools to help users achieve more in their daily lives. It integrates popular apps like Word, Excel, PowerPoint, Outlook, OneNote, and OneDrive, all enhanced with Copilot—Microsoft’s intelligent AI companion. The platform enables seamless collaboration, creativity, and organization across devices, including PC, Mac, iPhone, iPad, and Android. With Microsoft Designer, users can create stunning visuals, while Clipchamp adds professional-grade video editing capabilities. Built-in Microsoft Defender provides advanced security for personal data and devices. Microsoft 365 empowers individuals to imagine, create, and accomplish with greater efficiency and confidence.
    Leader badge
    Starting Price: $9.99/month
  • 4
    PayPal

    PayPal

    PayPal

    9 million merchants rely on PayPal to build, run, and grow their business. Get the tools, products, financing, and support you need to help establish or grow your business – from processing payments and building a website to shipping and marketing. We even give you access to business loans* that can provide merchant funding to help you start and drive future growth. Get paid online or in-person. Whether you need online invoicing, a customized checkout for your website, or a card reader for processing on-the-go transactions, we have a solution for your business. Choose from a selection of products and services designed to simplify your day-to-day operations, like tools for tracking payments, printing shipping labels, and so much more. Explore merchant lending options that can provide you with fast access to the money your business needs now, plus a way to offer your customers financing that lets them pay over time, while you get paid upfront.
    Leader badge
    Starting Price: Free
  • 5
    Microsoft Azure
    Microsoft's Azure is a cloud computing platform that allows for rapid and secure application development, testing and management. Azure. Invent with purpose. Turn ideas into solutions with more than 100 services to build, deploy, and manage applications—in the cloud, on-premises, and at the edge—using the tools and frameworks of your choice. Continuous innovation from Microsoft supports your development today, and your product visions for tomorrow. With a commitment to open source, and support for all languages and frameworks, build how you want, and deploy where you want to. On-premises, in the cloud, and at the edge—we’ll meet you where you are. Integrate and manage your environments with services designed for hybrid cloud. Get security from the ground up, backed by a team of experts, and proactive compliance trusted by enterprises, governments, and startups. The cloud you can trust, with the numbers to prove it.
  • 6
    IBM Cloud
    IBM Cloud® capabilities enable business agility and resiliency. Explore the platform that gives you 2.5x value. Designed for industry, security and the freedom to build and run anywhere. Business workflow transformation with automation and AI. Strong technology partner ecosystem that delivers value for industry needs. Industry and business domain expertise and solutions. Automated and auditable processes. Unique capabilities for the highest levels of cloud security and monitoring. Consistent security and controls posture across all applications. Containerized capabilities for DevOps, automation, data and security. Ease of integration and a consistent application development lifecycle. Advanced technologies including IBM Watson®, analytics, IoT, and edge.
  • 7
    SolarWinds Access Rights Manager
    SolarWinds® Access Rights Manager is designed to assist IT & security administrators in quickly & easily provisioning, deprovisioning, managing, & auditing user access rights to systems, data, & files, so they can help protect their organizations from the potential risks of data loss and breaches. By analyzing user authorizations & access permissions, you get visualization of who has access to what, and when they accessed it. Customized reports can be generated to help demonstrate compliance with many regulatory requirements. Provision & deprovision users via role-specific templates to help assure conformity of access privilege delegation, in alignment with security policies.
  • 8
    Acunetix

    Acunetix

    Invicti Security

    As the market leader in automated web application security testing, Acunetix by Invicti is the go-to security tool for Fortune 500 companies. DevSecOps teams can cut through the noise to uncover unseen risks and mitigate dangerous exploits, detecting and reporting on a wide array of vulnerabilities. With an industry-leading crawler that fully supports HTML5, JavaScript, and Single-page applications, Acunetix enables the auditing of complex, authenticated applications for deeper insight into an organization's risk posture. It's a leader for a reason: the technology behind Acunetix delivers the only product on the market that can automatically detect out-of-band vulnerabilities to enable comprehensive management, prioritization, and control for vulnerability threats by criticality. Plus, it's available both online and as an on-prem solution, integrating with popular issue trackers and WAFs so that DevSecOps teams don't have to slow down when building innovative apps.
  • 9
    Siemens Opcenter APS
    Digitalization is changing everything, and manufacturers must react quickly and intelligently to unexpected changes, while being able to respond to shorter lead times and satisfy customer demands. These challenges are faced not only by large enterprises, but also small and medium businesses. Siemens Opcenter APS (formerly Preactor APS) products have been specifically developed to meet this need, using advanced algorithms that balance demand and capacity to generate achievable production schedules. Siemens Opcenter APS products can be used for long-term strategic planning covering months and years, medium-term tactical planning with a few weeks planning horizon and for detailed sequencing and scheduling. Siemens Opcenter APS can be installed out of the box, and can be customized and configured where necessary. It can be used standalone to manage planning and scheduling, and is also designed for integration with other software.
  • 10
    Cisco ACI
    Achieve resource elasticity with automation through common policies for data center operations. Extend consistent policy management across multiple on-premises and cloud instances for security, governance, and compliance. Get business continuity, disaster recovery, and highly secure networking with a zero-trust security model. Transform Day 2 operations to a more proactive model and automate troubleshooting, root-cause analysis, and remediation. Optimizes performance, and single-click access facilitates automation and centralized management. Extend on-premises ACI networks into remote locations, bare-metal clouds, and colocation providers without hardware. Cisco's Multi-Site Orchestrator offers provisioning and health monitoring, and manages Cisco ACI networking policies, and more. This solution provides automated network connectivity, consistent policy management, and simplified operations for multicloud environments.
  • 11
    Intelligent Management Center

    Intelligent Management Center

    Hewlett Packard Enterprise

    Aruba AirWave is the only multi-vendor wired and wireless network management solution designed with mobile devices, users and apps in mind. By proactively monitoring the health and performance of all things connected, AirWave gives IT the insights needed to support today’s digital workplace. As network management becomes more complex, the risks associated with compromised data flow have also increased. HPE Intelligent Management Center (IMC) delivers comprehensive management across campus core and data center networks. IMC converts meaningless network data to actionable information to keep your network, and your business, moving. HPE network and service management solutions support telco networks from the core to the edge allowing operators to seize the profits of 5G. Simplify the management of data center and the Fibre Channel (FC) storage area network (SAN) fabrics. HPE IMC Branch Intelligent Management System. Enable remote network management of Customer Premises Equipment (CPE).
    Starting Price: $2000.00/one-time
  • 12
    Praetorian Chariot
    Chariot is the first all-in-one offensive security platform that comprehensively catalogs Internet-facing assets, contextualizes their value, identifies and validates real compromise paths, tests your detection response program, and generates policy-as-code rules to prevent future exposures from occurring. As a concierge managed service, we operate as an extension of your team to reduce the burden of day-to-day blocking and tackling. Dedicated offensive security experts are assigned to your account to assist you through the full attack lifecycle. We remove the noise by verifying the accuracy and importance of every risk before ever submitting a ticket to your team. Part of our core value is only signaling when it matters and guaranteeing zero false positives. Gain the upper-hand over attackers by partnering Praetorian. We put you back on the offensive by combining security expertise with technology automation to continuously focus and improve your defensive.
  • 13
    LogRhythm SIEM
    We know your job isn’t easy. That’s why we combine log management, machine learning, SOAR, UEBA, and NDR to give you broad visibility across your environment so you can quickly uncover threats and minimize risk. But a mature SOC doesn’t just stop threats. With LogRhythm, you’ll easily baseline your security operations program and track your gains — so you can easily report your successes to your board. Defending your enterprise comes with great responsibility — that’s why we built our NextGen SIEM Platform with you in mind. With intuitive, high-performance analytics and a seamless incident response workflow, protecting your business just got easier. With the LogRhythm XDR Stack, your team has an integrated set of capabilities that deliver on the fundamental mission of your SOC — threat monitoring, threat hunting, threat investigation, and incident response — at a low total cost of ownership.
  • 14
    NTT Application Security
    The NTT Application Security Platform provides all of the services required to secure the entire software development lifecycle. From solutions for the security team, to fast and accurate products for developers in DevOps environments, we help organizations enjoy all of the benefits of digital transformation without the security headaches. Get smart about application security. With the best in-class application security technology, our always-on assessments are constantly detecting attack vectors and scanning your application code. NTT Sentinel Dynamic accurately identifies and verifies vulnerabilities in your websites and web applications. NTT Sentinel Source and NTT Scout scan your entire source code, identify vulnerabilities, and provide detailed vulnerability descriptions and remediation advice.
  • 15
    Proofpoint Cloud App Security Broker (CASB)
    Proofpoint Cloud App Security Broker (Proofpoint CASB) helps you secure applications such as Microsoft Office 365, Google G Suite, Box, and more. Our solution gives you people-centric visibility and control over your cloud apps, so you can deploy cloud services with confidence. Our powerful analytics help you grant the right levels of access to users and third-party add-on apps based on the risk factors that matter to you. Proofpoint CASB solution provides granular visibility into users and data at risk. You get a people-centric view of cloud access and sensitive-data handling. With Proofpoint CASB's protection app, you can gain insight into cloud usage at global, app and user level, identify SaaS files at risk, including ownership, activity and who they were shared with, check suspicious logins, activity, and DLP alerts via drill-down dashboards.
  • 16
    Goldfish
    Synchronization with other holiday web portals enables real time data transmission. This increases the productivity of your booking manager. Also, the possibility of errors and double bookings is eliminated. Channel manager enables transfer of units together with their accompanied texts, images, prices, geo-location integrated in the Google Maps, etc. Custom development is a process which requires more involvement and communication between you and our team. Responsive web design adds value by responding to the devices your clients use. RWD alters the appearance of the web platform and adapts to the size and capabilities of the device’s screen.
    Starting Price: $299 per month
  • 17
    BMC AMI Data for Db2
    BMC AMI Data for Db2® Reduce data management costs by up to 65% or more. Leverage automation for world-class data management enabling 24x7 availability, greater resiliency, and the agility needed to provide a transcendent customer experience. Transform the management of your Db2 databases. Increase availability, improve performance, and ensure secure recovery of your critical data assets. Ensure highest availability so your business can run at peak performance to best serve your customers and provide them with the flawless, superior experience they deserve. See measurable results: 10% improvement in application performance; 6% reduction in MIPS consumption; and for files previously unable to be reorganized, a 90% boost in query response time. Avoid cumbersome reorganizations and costly CPU upgrades by making the most of your existing resources. Quickly diagnose performance problems and track them to their source.
  • 18
    Rapid7 InsightIDR
    With the cloud architecture and intuitive interface in InsightIDR, it's easy to centralize and analyze your data across logs, network, endpoints, and more to find results in hours—not months. User and Attacker Behavior Analytics, along with insights from our threat intel network, is automatically applied against all of your data, helping you detect and respond to attacks early. In 2017, 80% of hacking-related breaches used either stolen passwords and/or weak or guessable passwords. Users are both your greatest asset and your greatest risk. InsightIDR uses machine learning to baseline your users' behavior, automatically alerting you on the use of stolen credentials or anomalous lateral movement.
  • 19
    Archer

    Archer

    RSA Security

    Built upon decades of experience and hundreds of deployments across all domains of risk management. Whether your organization has an advanced Risk Management function looking to consolidate visibility or get started with one area of risk. Drive efficiency and coordination across stakeholders on a platform tailor-made for risk analysis and management. Archer enables a common understanding of risk, making it easier to work together to manage it. Applying the same taxonomies, policies and metrics to the management of all risk data enhances visibility for everyone, improves collaboration and increases efficiencies. Explore our comprehensive approach to integrated risk management with a demo of Archer. See the UI and discover how the features, dashboards, and capabilities can best address your organization’s unique risk and compliance challenges, whether you deploy our on-premises or SaaS offering.
  • 20
    Gigamon

    Gigamon

    Gigamon

    Fuel Your Digital Transformation Journey. Manage complex digital apps on your network with unparalleled depth and breadth of intelligence. Managing your network daily to ensure constant availability is daunting. Networks are getting faster, data volumes are growing and users and apps are everywhere, which makes monitoring and managing difficult. How are you supposed to drive Digital Transformation? What if you could ensure network uptime while gaining visibility into your data-in-motion across physical, virtual and cloud environments? Gain visibility across all networks, tiers and applications — while getting intelligence across your complex structures of applications. Gigamon solutions can radically improve the effectiveness of your entire network ecosystem. Ready to learn how?
  • 21
    Oracle Cloud Infrastructure
    Oracle Cloud Infrastructure supports traditional workloads and delivers modern cloud development tools. It is architected to detect and defend against modern threats, so you can innovate more. Combine low cost with high performance to lower your TCO. Oracle Cloud is a Generation 2 enterprise cloud that delivers powerful compute and networking performance and includes a comprehensive portfolio of infrastructure and platform cloud services. Built from the ground up to meet the needs of mission-critical applications, Oracle Cloud supports all legacy workloads while delivering modern cloud development tools, enabling enterprises to bring their past forward as they build their future. Our Generation 2 Cloud is the only one built to run Oracle Autonomous Database, the industry's first and only self-driving database. Oracle Cloud offers a comprehensive cloud computing portfolio, from application development and business analytics to data management, integration, security, AI & blockchain.
  • 22
    VMware Cloud
    Build, run, manage, connect and protect all of your apps on any cloud. The Multi-Cloud solutions from VMware deliver a cloud operating model for all applications. Support your digital business initiatives with the world’s most proven and widely deployed cloud infrastructure. Leverage the same skills you use in the data center, while tapping into the depth and breadth of six global hyperscale public cloud providers and 4,000+ VMware Cloud Provider Partners. With hybrid cloud built on VMware Cloud Foundation, you get consistent infrastructure and operations for new and existing cloud native applications, from data center to cloud to edge. This consistency improves agility and reduces complexity, cost and risk. Build, run and manage modern apps on any cloud, meeting diverse needs with on-premises and public cloud resources. Manage both container-based workloads and traditional VM-based workloads on a single platform.
  • 23
    Splunk APM
    Innovate faster in the cloud, elevate user experience and future-proof your applications. Built for the cloud-native enterprise, Splunk helps you solve modern issues. Detect any issue before it turns into a customer problem. Reduce MTTR with our real-time, AI-driven Directed Troubleshooting. Flexible, open-source instrumentation eliminates lock-in. Maximize performance by seeing everything in your application, and act on AI-driven analytics. To deliver a flawless end-user experience, you need to observe everything. With NoSample™ full-fidelity trace ingestion, leverage all your trace data to identify any anomaly. Reduce MTTR with Directed Troubleshooting to quickly understand service dependencies, correlation with underlying infrastructure and root-cause error mapping. Breakdown and explore any transaction by any metric or dimension. Quickly and easily understand how your application behaves for different regions, hosts, versions or users.
    Starting Price: $660 per Host per year
  • 24
    Azure Marketplace
    Azure Marketplace is a comprehensive online store that provides access to thousands of certified, ready-to-use software applications, services, and solutions from Microsoft and third-party vendors. It enables businesses to discover, purchase, and deploy software directly within the Azure cloud environment. The marketplace offers a wide range of products, including virtual machine images, AI and machine learning models, developer tools, security solutions, and industry-specific applications. With flexible pricing options like pay-as-you-go, free trials, and subscription models, Azure Marketplace simplifies the procurement process and centralizes billing through a single Azure invoice. It supports seamless integration with Azure services, enabling organizations to enhance their cloud infrastructure, streamline workflows, and accelerate digital transformation initiatives.
  • 25
    DigiCert CertCentral
    CertCentral simplifies the entire lifecycle by consolidating tasks for issuing, installing, inspecting, remediating, and renewing certificates. Every part of the cycle on one pane of glass. With ACME + CertCentral, you can automate deployment using virtually any client and any server type, any way you prefer. That means less time spent completing tedious manual tasks—or worse, putting out fires. With DigiCert, you use ACME protocol to automate deployment of OV and EV certificates with custom validity periods. The benefits just keep adding up. To enable ACME in CertCentral, simply contact your sales rep. You used to run into two bottlenecks with certificates: approval and renewal. Now, automating these tasks—and more—is as easy as a few clicks. If this were a race, you’d be winning. Receive alerts about potential vulnerabilities and know when each cert is about to expire. Because guessing is just gambling.
  • 26
    SAP Cloud Platform
    Extend your business processes in the cloud. Extend SAP solutions in a fast and agile way without disrupting key business processes - leveraging existing investments and expertise. Rapidly develop robust and scalable cloud-native applications. Leverage your existing ABAP expertise to create new extensions or renovate existing custom apps. Innovate for business agility with cloud-native, low-code, and responsive event-driven applications. Accelerate outcomes with intelligent business process optimization. Discover, configure, extend and optimize business processes, connecting experience data to operational workflows. Gain impactful and actionable insights to anticipate business outcomes and uncover new revenue and growth opportunities. Harness the power of predictive analytics and machine learning capabilities. Embed real-time intelligence into your business applications. Advance and personalize the user experience for your customers, partners and employees.
  • 27
    The Reporting Solution (TRS)
    The Reporting Solution (TRS) is a web-based application that allows local governments to prepare their Annual Report. Users create the entire report using database driven financial statements, an online word processor, and proprietary spreadsheet technology. A change made to the financial statements will update in real-time throughout the narrative portions of the Annual Report. Being web-based, multiple users can work simultaneously. The report can be exported at any time as a formatted .PDF or .DOCX file.
  • 28
    Cloudera

    Cloudera

    Cloudera

    Manage and secure the data lifecycle from the Edge to AI in any cloud or data center. Operates across all major public clouds and the private cloud with a public cloud experience everywhere. Integrates data management and analytic experiences across the data lifecycle for data anywhere. Delivers security, compliance, migration, and metadata management across all environments. Open source, open integrations, extensible, & open to multiple data stores and compute architectures. Deliver easier, faster, and safer self-service analytics experiences. Provide self-service access to integrated, multi-function analytics on centrally managed and secured business data while deploying a consistent experience anywhere—on premises or in hybrid and multi-cloud. Enjoy consistent data security, governance, lineage, and control, while deploying the powerful, easy-to-use cloud analytics experiences business users require and eliminating their need for shadow IT solutions.
  • 29
    Qualys TruRisk Platform
    Qualys TruRisk Platform (formerly Qualys Cloud Platform). The revolutionary architecture that powers Qualys’ IT, security, and compliance cloud apps. Qualys TruRisk Platform gives you a continuous, always-on assessment of your global IT, security, and compliance posture, with 2-second visibility across all your IT assets, wherever they reside. And with automated, built-in threat prioritization, patching and other response capabilities, it’s a complete, end-to-end security solution. On premises, at endpoints, on mobile, in containers or in the cloud, Qualys TruRisk Platform sensors are always on, giving you continuous 2-second visibility of all your IT assets. Remotely deployable, centrally managed and self-updating, the sensors come as physical or virtual appliances, or lightweight agents. Qualys TruRisk Platform provides an end-to-end solution, allowing you to avoid the cost and complexities that come with managing multiple security vendors.
    Starting Price: $500.00/month
  • 30
    Forcepoint CASB
    Give your company the full potential of the cloud. But don't let it cost you the control of your data. Now a Cloud Access Security Broker solution can support any cloud app, managed or unmanaged, securely. Forcepoint CASB works with IdP like Ping and Okta. Segments you’ve already built can be re-used with CASB. Don’t have IdP yet? CASB works like an IdP allowing your team to easily add apps and control individual access to apps. The simple interface is easy for employees to use too. Shadow IT puts data outside of your control. Quickly identify managed and unmanaged cloud apps in real-time using your web proxy and firewall logs. Detect stolen credentials sooner with a patent-pending Zero Trust Impossible Travel which shows individual device method, location, and time of day. Data moves up to the cloud, down from it, and from cloud to cloud. Protect data in motion or at rest. Block data in transit, encrypt or mask it, redact it, or watermark it to track sensitive data.
  • 31
    Vormetric Data Security Platform
    The Vormetric Data Security Platform makes it easy and efficient to manage data-at-rest security across your entire organization. Built on an extensible infrastructure, the data security protection platform features multiple data security products that can be deployed individually or in combination to deliver advanced encryption, tokenization and centralized key management. This data security solution prepares your organization for the next security challenge and new compliance requirements at the lowest TCO. The Vormetric Data Security Platform is one data security platform, centrally managed for delivering comprehensive data security solutions.
  • 32
    Buyer Discovery

    Buyer Discovery

    Gartner Digital Markets

    Expand your funnel to target, market and convert buyer prospects into highly-qualified leads with traffic insights. Identify sales-ready prospects actively looking for your product. Buyer Discovery leverages Gartner Digital Markets’ unparalleled volume of more than 9 million monthly software buyers to identify new marketing and sales prospects. Enhance your sales and marketing efforts with targeted lists of in-market software buyers interested in products like yours. Identifiable sales prospecting with the Buyer Discovery API. Daily access to download your recent buyer intent data. Visual analysis for ad-hoc discovery and tailored data deliverables.
  • 33
    Veracode

    Veracode

    Veracode

    Veracode offers a holistic, scalable way to manage security risk across your entire application portfolio. We are the only solution that can provide visibility into application status across all testing types, including SAST, DAST, SCA, and manual penetration testing, in one centralized view.
  • 34
    Red Hat Cloud Suite
    Red Hat® Cloud Suite provides a container-based application development platform, built on massively scalable cloud infrastructure, all managed through a common management framework. Customers can move existing workloads to scale-out cloud infrastructure and accelerate new cloud-based services for private cloud and application development. With Red Hat Cloud Suite, the operations team can deliver public cloud-like services to developers and the business while maintaining control and visibility. Key product advantages include: Integrated components — Tightly integrated, fully supported components that act in concert to provide an open hybrid cloud. Unified management — A single management framework across infrastructure and application development layers, plus complete operation and life cycle management with proactive risk mitigation. Full-featured application development and containers — Flexible container-based application development abilities via OpenShift Enterprise
  • Previous
  • You're on page 1
  • Next